Skip to main content
Log in

Visual secret sharing scheme for (kn) threshold based on QR code with multiple decryptions

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

In this paper, a novel visual secret sharing (VSS) scheme based on QR code (VSSQR) with (kn) threshold is investigated. Our VSSQR exploits the error correction mechanism in the QR code structure, to generate the bits corresponding to shares (shadow images) by VSS from a secret bit in the processing of encoding QR. Each output share is a valid QR code that can be scanned and decoded utilizing a QR code reader, which may reduce the likelihood of attracting the attention of potential attackers. Due to different application scenarios, two different recovered ways of the secret image are given. The proposed VSS scheme based on QR code can visually reveal secret image with the abilities of stacking and XOR decryptions as well as scan every shadow image, i.e., a QR code, by a QR code reader. The secret image could be revealed by human visual system without any computation based on stacking when no lightweight computation device. On the other hand, if the lightweight computation device is available, the secret image can be revealed with better visual quality based on XOR operation and could be lossless revealed when sufficient shares are collected. In addition, it can assist alignment for VSS recovery. The experiment results show the effectiveness of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Beimel, A.: Secret-sharing schemes: a survey. In: International Workshop, pp. 11–46 (2011)

  2. Naor, M., Shamir, A.: Visual cryptography. Lect. Notes Comput. Sci. 950(9), 1–12 (1999)

    MathSciNet  MATH  Google Scholar 

  3. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  4. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)

    Article  MATH  Google Scholar 

  5. Weir, J., Yan, W.Q.: A Comprehensive Study of Visual Cryptography. Springer, Berlin (2010)

    Book  Google Scholar 

  6. Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recognit. 42(11), 3071–3082 (2009)

    Article  MATH  Google Scholar 

  7. Yan, X., Wang, S., Li, L., El-Latif, A.A.A., Wei, Z., Niu, X.: A new assessment measure of shadow image quality based on error diffusion techniques. JIHMSP 4(2), 118–126 (2013)

    Google Scholar 

  8. Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)

    Article  MATH  Google Scholar 

  9. Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimed. Tools Appli. 74, 1–22 (2013)

  10. Jtc1/Sc, I.: Information technology–automatic identification and data capture techniques–qr code 2005 bar code symbology specification. (2006)

  11. Snyder, A.J.: Visual cryptography and secret image sharing. Pattern Recognit. Lett. 34(3), 283–291 (2012)

    MathSciNet  Google Scholar 

  12. Weir, J., Yan, W.: Authenticating visual cryptography shares using 2D barcodes. In: Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23–26, 2011, Revised Selected Papers. Springer, Berlin, pp. 196–210 (2012)

  13. Wang, G., Liu, F., Yan, W.Q.: 2D barcodes for visual cryptography. Multimed. Tools Appl. 75, 1–19 (2016)

  14. Chow, Y.W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. Springer International Publishing, New York (2016)

    Book  MATH  Google Scholar 

  15. Denso, W.I.: http://www.qrcode.com (2002)

  16. Yan, X., Guan, S., Niu, X.: Research on the capacity of error-correcting codes-based information hiding. IEEE Comput. Soc. 1158–1161 (2008)

  17. Saito, K., Morii, M.: Efficient decoding of qr code using error correcting capability: decoding method using erasure error correction and the ability. Tech. Report Ieice Isec 111, 79–84 (2011)

    Google Scholar 

  18. Wan, S., Lu, Y., Yan, X., Liu, L.: High capacity embedding methods of qr codes error correction. In: Accepted by 9th EAI International Wireless Internet Conference (2016)

  19. Yan, X., Wang, S., Niu, X.: Threshold progressive visual cryptography construction with unexpanded shares. Multimed. Tools Appl. 75, 1–18 (2015)

  20. Yan, X., Chen, G., Yang, C.N., Cai, S.R.: Random girds-based threshold visual secret sharing with improved contrast by Boolean operations. In: Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1–4, 2014. Revised Selected Papers. Springer International Publishing, Cham, pp. 319–332 (2015)

  21. Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forens. Secur. 2(3), 321–330 (2007)

    Article  Google Scholar 

  22. Yan, X., Liu, X., Yang, C.N.: An enhanced threshold visual secret sharing based on random grids. J. Real Time Image Process. 1–13 (2015)

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their valuable discussions and comments. This work is supported by the National Natural Science Foundation of China (Grant No. 61602491).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Song Wan or Xuehu Yan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wan, S., Lu, Y., Yan, X. et al. Visual secret sharing scheme for (kn) threshold based on QR code with multiple decryptions. J Real-Time Image Proc 14, 25–40 (2018). https://doi.org/10.1007/s11554-017-0678-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-017-0678-3

Keywords

Navigation