2016
DOI: 10.1007/978-3-319-40253-6_25
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing

Abstract: This paper investigates a novel approach to secret sharing using QR codes. The proposed QR code secret sharing approach exploits the error correction mechanism inherent in the QR code structure, to distribute and encode information about a secret message in a number of shares. Each share in the scheme is constructed from a cover QR code, and each share itself is a valid QR code which can be scanned and decoded by a QR code reader. The secret message can be recovered by combining the information contained in th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
54
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 52 publications
(55 citation statements)
references
References 24 publications
0
54
0
1
Order By: Relevance
“…The use of QR codes in information security has been proposed for a variety of different purposes, such as for authenticating visual cryptography shares [22], e-voting authentication [23], digital watermarking [24], data hiding [7] and secret sharing [10,12,13]. This section presents several studies that are related to the work in this paper.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The use of QR codes in information security has been proposed for a variety of different purposes, such as for authenticating visual cryptography shares [22], e-voting authentication [23], digital watermarking [24], data hiding [7] and secret sharing [10,12,13]. This section presents several studies that are related to the work in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…A cheater prevention mechanism was also incorporated in this approach. A different (n, n) QR code secret sharing technique was presented in Chow et al [12]. This approach also exploits the error correction feature that is a characteristic part of the QR code structure by distributing and embedding information from a secret QR code within n cover QR code shares.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Solution of this problem is a challenging task that should improve existing equipment for QR code processing. Finally, decoding and visualization of stored in QR code information are provided by using Reed-Solomon error correction procedure that supports accurate data recognition even though 7%, 15%, 25%, or 30% of bits of symbol are damaged [7,17,18].…”
Section: Modern Techniques For Qr Code Detection and Recognitionmentioning
confidence: 99%
“…Any device equipped with a camera and QR code reader can retrieve the information encoded within a QR code. Other than for authentication, QR codes have been used for a variety of security applications including secret sharing [5] and digital watermarking [16]. While our approach does not specifically require the use of QR codes, as any method that is able to pass data to the mobile device will suffice, we chose to adopt the QR code because of its intuitiveness.…”
Section: The Qr Codementioning
confidence: 99%