Abstract
QR codes as public patent are widely used to acquire the information in various fields. However, the characteristic of its public readability hinders its usage for delivering private messages. To overcome this weakness, we propose a Sudoku-based secret sharing scheme to protect the privacy QR code message with the functionality of cheater prevention. The secret messages will be divided into several shadows and concealed to the QR code by replacing the QR code public message bits. And the private messages can be faithfully reproduced when all the involved participants cooperate. In our secret sharing scheme, the QR code public message still can be fully decoded publicly from the marked QR codes via a QR code reader, which helps to reduce uninvolved users’ curiosity. Experiments show that the proposed scheme is feasible, with high security protection level, and resistant to common image post-processing attacks.
Similar content being viewed by others
References
Blakley GR (1979) Safeguarding cryptographic keys. Proceedings of the 1979 National Computer Conference 48:313–317
Bobmath (2011) Structure of a QR code. https://en.wikipedia.org/wiki/QR_code#/media/File:QR_Code_Structure_Example_3.svg. Accessed 02 Jun 2017
Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A sudoku-based secret image sharing scheme with reversibility. J Commun 5(1):5–12
Chen W-Y, Wang J-W (2009) Nested image steganography scheme using QR-barcode technique. Opt Eng 48(5):057004-1–057004-10
Chou Y-C, Lin C-H, Li P-C, Li Y-C (2010) A (2, 3) Threshold secret sharing scheme using sudoku. In: 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, pp 43–46
Chuang J-C, Hu Y-C, Ko H-J (2010) A novel secret sharing technique using QR code. Int J Image Process (IJIP) 4(5):468
Denso-Wave Inc (2000) QR code standardization. www.qrcode.com/en/about/standards.html. Accessed 02 Jun 2017
Dey S, Mondal K, Nath J, Nath A (2012) Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: ASA_QR algorithm. Int J Modern Educ Comput Sci 4(6):59
Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923–3935
Li L, Wang R-l (2011) A digital watermarking algorithm for QR code. J Hangzhou Dianzi Univ 31(2):46–49
Lin P-Y (2016) Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code. IEEE Trans Ind Inf 12(1):384–392
Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for QR code based on watermark by compare DCT with DFT domain. In: 3rd international conference on computer and communication technologies, India, pp 144–148
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Sun M, Si J, Zhang S (2007) Research on embedding and extracting methods for digital watermarks applied to QR code images. N Z J Agric Res 50(5):861–867
Wang Z-H, Guo C, Chang C-C (2013) A novel (n, n) secret image sharing scheme based on Sudoku. J Electron Sci Technol 11(1):44–50
Xing M, Li W (2015) A Fair (t, n) Threshold Secret Sharing Scheme. International Conference on Computer Science and Intelligent Communication (CSIC 2015):140–143
Acknowledgments
This research was partially supported by the Foundation of Fujian Educational Committee of China (No. JAT160357).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, PC., Chang, CC. & Li, YH. Sudoku-based secret sharing approach with cheater prevention using QR code. Multimed Tools Appl 77, 25275–25294 (2018). https://doi.org/10.1007/s11042-018-5784-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5784-0