2022
DOI: 10.1038/s41598-022-11871-9
|View full text |Cite
|
Sign up to set email alerts
|

A QR code-based user-friendly visual cryptography scheme

Abstract: Benefiting from the development of the Internet and smart devices, it is now convenient to transmit images anywhere and anytime, which poses a new challenge for image security. The Visual Cryptography Scheme (VCS) is a secret sharing method for protecting an image without a key, the merit of VCS is the human visual system (HVS) can restore the secret image by simply superimposing qualified shares, without any computation. To eliminate noise-like shares in traditional VCS, this paper presents a novel QR code-ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…But traditional cryptography sufered from two limitations. First, the generated shares were random and meaningless [17]. It becomes difcult to manage random shares.…”
Section: Extended Visual Cryptographymentioning
confidence: 99%
“…But traditional cryptography sufered from two limitations. First, the generated shares were random and meaningless [17]. It becomes difcult to manage random shares.…”
Section: Extended Visual Cryptographymentioning
confidence: 99%
“…Although high-quality VCS can be realized by using XOR operation and QR code, it often needs additional noise shares [ 23 ]. The size of standard QR codes and the capacity of error correction codes are limited, which cannot meet the needs of image transmission [ 25 ].…”
Section: Related Workmentioning
confidence: 99%
“…[97][98][99] Active research is going on developing lattice cryptography, multivariate cryptography, code-based cryptography, supersingular isogeny key exchange protocol, and symmetric key systems like AES and SNOW-3G. [100][101][102][103][104] Campagna recently postulated that there will be three main questions about the number of years needed to fulfill our health sector needs: (a) Our encryption to be secure; (b) to make our IT infrastructure quantum-safe; and (c) before a large-scale quantum computer will be built. 105 The physical hardware required to build qubits includes transmons and superconductivity traps, and we will also need insights into cavity quantum electrodynamics.…”
Section: Future Possibilitiesmentioning
confidence: 99%