Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism

Journal of Information Security and Applications - Tập 58 - Trang 102719 - 2021
Peng-Cheng Huang1,2, Chin-Chen Chang2,3, Yung-Hui Li4, Yanjun Liu2
1Department of Computer Science and Technology, Xiamen University of Technology, Xiamen 361024, China
2Department of Information Engineering and Computer Science, Feng Chia University, Taichung 207, Taiwan
3School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
4Department of Computer Science and Information Engineering, National Central University, Taoyuan 320, Taiwan

Tài liệu tham khảo

Shamir, 1979, How to share a secret, Commun ACM, 22, 612, 10.1145/359168.359176 Blakley, 1979, Safeguarding cryptographic keys, 48, 313 Nguyen, 2016, Adaptive image sharing based on the quadri-directional search strategy with meaningful shadows, Multimed Tools Appl, 76, 2627, 10.1007/s11042-016-3251-3 Zhai, 2015, A meaningful scheme for sharing secret images using mosaic images, IJ Network Security, 17, 643 El-Latif, 2013, A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption, Opt Laser Technol, 54, 389, 10.1016/j.optlastec.2013.04.018 Chang, 2011, Meaningful secret sharing technique with authentication and remedy abilities, Inf Sci, 181, 3073, 10.1016/j.ins.2011.03.002 Chang, 2016, Distortion-free secret image sharing method with two meaningful shadows, IET Image Process, 10, 590, 10.1049/iet-ipr.2015.0568 Yan, 2015, Generalized random grids-based threshold visual cryptography with meaningful shares, Signal Process, 109, 317, 10.1016/j.sigpro.2014.12.002 Huang, 2018, Efficient access control system based on aesthetic QR code, Pers Ubiquitous Comput, 22, 81, 10.1007/s00779-017-1089-y Li, 2019, To scan or not to scan: the question of consumer behavior and QR codes on food packages, J Agric Resource Econ, 44, 311 Kim, 2016, Consumer acceptance of a quick response (QR) code for the food traceability system: application of an extended technology acceptance model (TAM), Food Res Int, 85, 266, 10.1016/j.foodres.2016.05.002 Park, 2019, Development and evaluation of a quick response code–based nursing education program for operating and recovery room nurses, Comput Inform Nurs, 37, 599, 10.1097/CIN.0000000000000550 Barros, 2019, Development of an educational tool in human anatomy with the use of QR codes, FASEB J, 33 Ramalingam, 2020, As simple as taking a picture—how use of QR codes improved evaluation response rates, documentation, and timeliness, J Gen Internal Med, 1 Kim, 2019, Securely storing personal health data by using QR code, Basic Clin Pharmacol Toxicol, 125 Lin, 2015, Efficient QR code beautification with high quality visual content, IEEE Trans Multimed, 17, 1515, 10.1109/TMM.2015.2437711 Garateguy, 2014, Qr images: optimized image embedding in qr codes, IEEE Trans Image Process, 23, 2842, 10.1109/TIP.2014.2321501 Gao, 2009, A 2D barcode-based mobile payment system, 2019, 320 Lu, 2017, Multiple schemes for mobile payment authentication using QR code and visual cryptography, Mob Inf Syst, 2017, 1 Chuang, 2010, A novel secret sharing technique using QR code, Int J Image Process (IJIP), 4, 468 Huang, 2018, Sudoku-based secret sharing approach with cheater prevention using QR code, Multimed Tools Appl, 77, 25275, 10.1007/s11042-018-5784-0 Lin, 2016, Distributed secret sharing approach with cheater prevention based on QR code, IEEE Trans Ind Inform, 12, 384, 10.1109/TII.2015.2514097 Fridrich, 2005, Writing on wet paper, IEEE Trans Signal Process, 53, 3923, 10.1109/TSP.2005.855393 Huang, 2019, Efficient secret sharing scheme with cheater identification based on QR code, KSII Trans Internet Inf Syst, 13, 5144 Y.-W. Chow, W. Susilo, J. Tonien, E. Vlahu-Gjorgievska, and G. Yang, "Cooperative secret sharing using QR codes and symmetric keys," symmetry, vol. 10, no. 4, pp. 95-107, 2018. Naor, 1994, Visual cryptography, 1 Wan, 2017, Visual secret sharing scheme for (k,n) threshold based on QR code with multiple decryptions, J Real-Time Image Process, 1 Fu, 2018, Visual cryptography scheme with meaningful shares based on QR Codes, IEEE Access, 6, 59567, 10.1109/ACCESS.2018.2874527 Chow, 2016, Exploiting the error correction mechanism in QR codes for secret sharing, 409 Cheng, 2018, Improved visual secret sharing scheme for QR code applications, IEEE Trans Inf Forensics Security, 13, 2393, 10.1109/TIFS.2018.2819125 Inc, 2003