A Novel Visual Secret Sharing Scheme Based on QR Codes
نویسندگان
چکیده
Inthispaper,anovelvisualsecretsharing(VSS)schemeusingQRcodesisinvestigated.Theproposed visualsecretsharingschemebasedonQRcodes(VSSQR)canvisuallyrevealsecretimagebystacking sufficient(shadowimages)sharesaswellasscantheQRcodebyaQRcodereader.OurVSSQR exploitstheerrorcorrectionmechanismintheQRcodestructure,toembedthebitscorresponding tosharesgeneratedbyVSSfromasecretbitintothesamelocationsofQRcodesintheprocessing ofencodingQR.EachoutputshareisavalidQRcode,whichmayreducethelikelihoodofattracting theattentionofpotentialattackers.ThesecretimagecanberecoveredbystackingsufficientQRcode sharesbasedonthehumanvisualsystemwithoutanycomputation.Inaddition,itcanassistalignment forVSSrecovery.Theexperimentresultsshowtheeffectivenessofourscheme. KeywoRDS Error Correction, QR Code, Visual Cryptography Application, Visual Secret Sharing
منابع مشابه
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing
This paper investigates a novel approach to secret sharing using QR codes. The proposed QR code secret sharing approach exploits the error correction mechanism inherent in the QR code structure, to distribute and encode information about a secret message in a number of shares. Each share in the scheme is constructed from a cover QR code, and each share itself is a valid QR code which can be sca...
متن کاملA NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications
Visual cryptography (VC) is a distinct type of secret sharing scheme which hides secret images in share images such that, when the shares are superimposed, a hidden secret image is revealed. It does not require the complex computational method to decode the secret information. The paper proposes a novel Quick Response (QR) code authentication system using Visual Cryptography. The passwords for ...
متن کاملAnti-Phishing framework based on Extended Visual Cryptography and QR code
Nowadays Online transactions are become very common and there are various attacks occur behind this. In these types of various attacks, phishing is very common attack. For detecting this attack various anti-phishing mechanisms are used. Propose a new authentication scheme for se-cure OTP distribution in phishing website detection through EVC and QR codes. The Website Detection using extended vi...
متن کاملSharing several secrets based on Lagrange's interpolation formula and Cipher feedback mode
In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJDCF
دوره 9 شماره
صفحات -
تاریخ انتشار 2017