Skip to main content
Log in

Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a visual secret sharing (VSS) scheme with (n, n)(n ≥ 2) threshold for selective secret content using QR codes is investigated. Firstly, the secret message which can include different types of information(selective secret content) could be encoded into a secret QR code. Secondly, the secret QR code can be embedded into n cover QR codes. Finally, the proposed QR code visual secret sharing scheme(QRVSS) can visually reveal secret QR code with the abilities of stacking and XOR decryptions. Our QRVSS exploits the error correction mechanism inherent in the QR code structure, to embed the bits corresponding to shares that generated by VSS from a secret QR code bit into the same locations of the cover QR codes in the processing of encoding QRs. Each output share is a valid QR code that can be decoded and it may reduce the likelihood of attracting the attention of potential attackers. The reconstructed secret QR code can be decoded as same as the secret contents. In addition, QR codes can assist alignment for VSS recovery and the proposed scheme can be applied to many applications, such as express delivery. The experiment results show the effectiveness of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Beimel A (2011) Secret-sharing schemes: a survey. In: International workshop, pp 11–46

    Google Scholar 

  2. Buckley N, Nagar AK, Arumugam S (2014) Visual secret sharing between remote participants. Int J Comput Appl 8-17:103

    Google Scholar 

  3. Cheng Y, Fu Z, Yu B (2018) Improved visual secret sharing scheme for QR code applications. IEEE Trans Inf Foren Sec 99:1–1

    Google Scholar 

  4. Chow YW, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the error correction mechanism in QR codes for secret sharing. Springer International Publishing

  5. Denso WI (2002) http://www.qrcode.com

  6. Jtc1/Sc I (2006) Information technology – automatic identification and data capture techniques – QR code 2005 bar code symbology specification

  7. Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Foren Sec 2(3):321–330

    Article  Google Scholar 

  8. Li L, Qiu J, Lu J, Chang CC (2016) An aesthetic QR code solution based on error correction mechanism. Journal of Systems & Software 116(C):85–94

    Article  Google Scholar 

  9. Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE Trans Ind Informat 12(1):1–1

    Article  MathSciNet  Google Scholar 

  10. Liu Y, Chang C (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools and Applications 77:1–16

    Article  Google Scholar 

  11. Liu Z, Zeng Q, Wang C, Lu Q (2011) Application research of qrcode barcode in validation of express delivery. Communications in Computer & Information Science 143:346–351

    Article  Google Scholar 

  12. Naor M, Shamir A (1999) Visual cryptography. Lect Notes Comput Sci 950 (9):1–12

    MathSciNet  MATH  Google Scholar 

  13. Snyder AJ (2012) Visual cryptography and secret image sharing. Pattern Recogn Lett 34(3):283–291

    Google Scholar 

  14. Wan S, Lu Y, Yan X, Liu L (2016) High capacity embedding methods of QR codes error correction accepted by 9th EAI International Wireless Internet Conference

  15. Wan S, Lu Y, Yan X, Wan Y, Chang C (2017) Visual secret sharing scheme with (k, n) threshold based on QR codes with multiple decryptions. Accepted by Journal of Real-Time Image Processing

  16. Wang D, Yi F, Li X (2009) On general construction for extended visual cryptography schemes. Pattern Recogn 42(11):3071–3082

    Article  Google Scholar 

  17. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785

    Article  Google Scholar 

  18. Wang G, Liu F, Yan WQ (2016) 2d barcodes for visual cryptography. Multimedia Tools and Applications, pp 1–19

  19. Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensics Security 4(3):383–396

    Article  Google Scholar 

  20. Weir J, Yan W (2012) Authenticating visual cryptography shares using 2D barcodes. In: Digital forensics and watermarking: 10th international workshop, IWDW 2011, Atlantic City, NY, October 23–26, 2011, Revised selected papers. Springer, Berlin, pp 196–210

    Chapter  Google Scholar 

  21. Weir J, Yan WQ (2010) A comprehensive study of visual cryptography. Springer, Berlin

    Book  Google Scholar 

  22. Yan X, Guan S, Niu X (2008) Research on the capacity of error-correcting codes-based information hiding. IEEE Computer Society, pp 1158–1161

  23. Yan X, Lu Y, Huang H, Liu L, Wan S (2016) Clarity corresponding to contrast in visual cryptography. Springer, Singapore

    Book  Google Scholar 

  24. Yan X, Wang S, El-Latif AAA, Niu X (2013) Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimedia Tools and Applications, pp 1–22

  25. Yan X, Shen W, El-Latif AA, Niu X (2015) Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimedia Tools and Applications 74:3231–3252

    Article  Google Scholar 

  26. Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuehu Yan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This research was funded by [the National Natural Science Foundation of China] grant number [61602491].

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wan, S., Qi, L., Yang, G. et al. Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes. Multimed Tools Appl 79, 2789–2811 (2020). https://doi.org/10.1007/s11042-019-08246-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08246-0

Keywords

Navigation