2018
DOI: 10.1155/2018/4036815
|View full text |Cite
|
Sign up to set email alerts
|

Robust Visual Secret Sharing Scheme Applying to QR Code

Abstract: Different color patterns of quick response (QR) codes, such as RGB, grayscale, and binary QR codes, are widely used in applications. In this paper, we propose a novel XOR-based visual secret sharing (VSS) scheme using grayscale QR codes as cover images and binary QR code as secret image. First, all the codewords of the secret QR code image are encoded into n temporary binary QR code images, which are substituted for the second significant bit planes of the grayscale QR code cover images to generate n shares. E… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
(33 reference statements)
0
3
0
Order By: Relevance
“…Between April 10 and June 15, 2020, students completed the survey by scanning QR codes during breaks in their college English classes. A QR code is a black-and-white graphic recording of data symbol information with a specific geometric pattern distributed regularly on a two-dimensional plane ( Tan et al, 2018 ), which is widely used and accepted in China for activities such as online payment, daily travel and data entry. Participants completed the questionnaire voluntarily.…”
Section: Methodsmentioning
confidence: 99%
“…Between April 10 and June 15, 2020, students completed the survey by scanning QR codes during breaks in their college English classes. A QR code is a black-and-white graphic recording of data symbol information with a specific geometric pattern distributed regularly on a two-dimensional plane ( Tan et al, 2018 ), which is widely used and accepted in China for activities such as online payment, daily travel and data entry. Participants completed the questionnaire voluntarily.…”
Section: Methodsmentioning
confidence: 99%
“…Visual cryptography (VC) [11,12], which is a secretsharing technology aimed at images, can be applied to digital devices with limited computing in an untrusted networking environment. Using the threshold and secret-sharing features of VC, we can use simple Boolean operations to achieve real-time encryption of large amounts of image data while removing the dependence on keys.…”
Section: Introductionmentioning
confidence: 99%
“…To meet the error correction conditions, the larger the secret image, the more share images are generated. Tan et al 11 proposed an XOR-based VCS applying to grayscale QR codes. The scheme substitutes a bit of a share for the second significant bit of the QR code cover image, which can resist common image attacks.…”
Section: Introductionmentioning
confidence: 99%