“…Figure 2 , if 7 · y mod 8 = 0; 7·y+8−7·y mod 8 8 , if 7 · y mod 8 = 0. An identification (ID) sequence is generated using the SHA-256 hash function over the k bytes and generates a 64 hexadecimal string [12]. This ID works as storage address for further redundancy retrieval.…”
QR Codes are used as information channel on several cryptographic architectures due to their technical properties, such as data capacity and retrieval reliability. This paper presents a novel string data validation system using QR Codes and meaningless reversible degradation. The proposed scheme exploits reversible degradation properties, using the systematic Berlekamp Reed-Solomon error correction algorithm and the QR Code. This new mechanism encodes up to 388 characters in two information channels: a dynamic version QR Code (channel 1) and a wireless network (channel 2). A byte mode QR Code stores partial corrupted and masked data input bits. Its version size varies between 1 and 11 according the stored data quantity. The wireless channel downloads a previous generated Reed-Solomon redundancy file to correct the QR Code retrieved information and decode the secret message. The QR Code information is meaningless when scanned by a standard QR Code reader. Compared to real-time retransmission data validation systems, the proposed scheme reduces the download data (channel 2) up to 50%.
“…Figure 2 , if 7 · y mod 8 = 0; 7·y+8−7·y mod 8 8 , if 7 · y mod 8 = 0. An identification (ID) sequence is generated using the SHA-256 hash function over the k bytes and generates a 64 hexadecimal string [12]. This ID works as storage address for further redundancy retrieval.…”
QR Codes are used as information channel on several cryptographic architectures due to their technical properties, such as data capacity and retrieval reliability. This paper presents a novel string data validation system using QR Codes and meaningless reversible degradation. The proposed scheme exploits reversible degradation properties, using the systematic Berlekamp Reed-Solomon error correction algorithm and the QR Code. This new mechanism encodes up to 388 characters in two information channels: a dynamic version QR Code (channel 1) and a wireless network (channel 2). A byte mode QR Code stores partial corrupted and masked data input bits. Its version size varies between 1 and 11 according the stored data quantity. The wireless channel downloads a previous generated Reed-Solomon redundancy file to correct the QR Code retrieved information and decode the secret message. The QR Code information is meaningless when scanned by a standard QR Code reader. Compared to real-time retransmission data validation systems, the proposed scheme reduces the download data (channel 2) up to 50%.
“…The use of QR codes in information security has been proposed for a variety of different purposes, such as for authenticating visual cryptography shares [22], e-voting authentication [23], digital watermarking [24], data hiding [7] and secret sharing [10,12,13]. This section presents several studies that are related to the work in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…A distributed secret sharing approach using QR codes was proposed by Lin [13]. This approach is an (n, n) secret sharing scheme, where a secret is split into shares and encrypted before concealing them within marked QR codes.…”
Section: Related Workmentioning
confidence: 99%
“…There are also existing (n, n) QR code secret sharing approaches where normal looking QR codes are used [12,13]. However, (n, n) secret sharing requires that all participants must be present to recover the secret.…”
Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR) codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.
“…To enhance system security, Lin [13] exploited the QR code error correction capacity by proposing an ( , ) n n -threshold secret sharing scheme. Lin's scheme employed the technology of wet paper code [14] to randomly embed both the secret share and authentication message in cover QR codes.…”
Secret sharing is an effective way of protecting secret messages. However, the traditional secret sharing schemes are considered meaningless due to malicious people attention which might raise risks. To overcome the weakness, this paper presents an effective secret sharing scheme with the functionality of cheater identification, based on meaningful QR code. The secret message will be split and concealed in the padding region of cover QR codes with the assistance of Latin square and it can be completely restored when all the involved participants cooperate. The concealing strategy exploits the characteristic of Reed-Solomon (RS) code to ensure the strong robustness of generated QR code pseudo-shares. The meaningful QR code pseudo-shares help to reduce the curious of unrelated persons. Some experiments were done to evaluate the performance of proposed scheme. The results showed that the proposed scheme is feasible, efficient and secure compared to the other existing schemes. It also achieves a higher secret payload and maintains stronger robustness.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.