2018
DOI: 10.1109/tifs.2018.2819125
|View full text |Cite
|
Sign up to set email alerts
|

Improved Visual Secret Sharing Scheme for QR Code Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
27
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(30 citation statements)
references
References 19 publications
0
27
0
Order By: Relevance
“…Therefore, this paper presents a novel NMF framework to factorize a Chinese character represented as a binary image (or matrix). Furthermore, we evaluate the performance of the proposed NMF technique by applying it to the application of visual secret sharing (a visual cryptographic technique [31][32][33][34][35] in information security [36][37][38]) that securely shares secret messages encoded as binary images of partial Chinese characters.…”
Section: Main Objective Of This Papermentioning
confidence: 99%
“…Therefore, this paper presents a novel NMF framework to factorize a Chinese character represented as a binary image (or matrix). Furthermore, we evaluate the performance of the proposed NMF technique by applying it to the application of visual secret sharing (a visual cryptographic technique [31][32][33][34][35] in information security [36][37][38]) that securely shares secret messages encoded as binary images of partial Chinese characters.…”
Section: Main Objective Of This Papermentioning
confidence: 99%
“…Note that the ( , , ) values are different for certain level of error correction in some QR code versions. It can be found that there are 5 error correction blocks in version 7 with an level of error correction of H. The ( , , ) values for the first four blocks are (39, 13,13) where the value for the last one is (40, 14,13).…”
Section: Qr Codesmentioning
confidence: 99%
“…Wan et al [10] proposed a scheme that deeply integrated the QR code error correction mechanism with the theory of VSS and the region shared with the secret image is continuous. Chen et al [14] proposed a VSS scheme with high security and flexible access structures for QR code applications. Chow et al [15] investigated a method to distribute shares through embedding them into QR codes cover by a secure way using cryptographic keys.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Wan et al [13] continuously embedded a secret image into QR codes by integrating the theory of VSS and the error correction mechanism of QR codes. Chen et al [1] presented a scheme using QR codes for applications involving security and flexible access structures. Chow et al [2] used cryptographic keys to encrypt QR codes when embedding them into cover QR codes.…”
Section: Introductionmentioning
confidence: 99%