Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code

被引:50
|
作者
Lin, Pei-Yu [1 ,2 ]
机构
[1] Yuan Ze Univ, Dept Informat Commun, Taoyuan, Taiwan
[2] Yuan Ze Univ, Innovat Ctr Big Data & Digital Convergence, Taoyuan, Taiwan
关键词
Cheater prevention; error correction capability; QR barcode; secret sharing;
D O I
10.1109/TII.2015.2514097
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
QR barcodes are used extensively due to their beneficial properties, including small tag, large data capacity, reliability, and high-speed scanning. However, the private data of the QR barcode lacks adequate security protection. In this article, we design a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system. The proposed approach differs from related QR code schemes in which it uses the QR characteristics to achieve secret sharing and can resist the print-and-scan operation. The secret can be split and conveyed with QR tags in the distribution application, and the system can retrieve the lossless secret when authorized participants cooperate. General browsers can read the original data from the marked QR tag via a barcode reader, and this helps reduce the security risk of the secret. Based on our experiments, the new approach is feasible and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode.
引用
收藏
页码:384 / 392
页数:9
相关论文
共 50 条
  • [21] Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction
    Liu, Tao
    Yan, Bin
    Pan, Jeng-Shyang
    APPLIED SCIENCES-BASEL, 2019, 9 (21):
  • [22] A Robust Secret Sharing QR Code via Texture Pattern Design
    Zhang, Xin
    Duan, Jia
    Zhou, Jiantao
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 903 - 907
  • [23] Verifiable Image Secret Sharing with Cheater Identification
    Patil, Sonali D.
    Ithape, Priya K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1238 - 1241
  • [24] Cheater identifiable visual secret sharing scheme
    Gan Zhi & Chen Kefei1. Computer Science Department
    Journal of Systems Engineering and Electronics, 2005, (01) : 233 - 236
  • [25] A dynamic secret sharing scheme with cheater detection
    Hwang, SJ
    Chang, CC
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 48 - 55
  • [26] Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions
    Wan, Song
    Lu, Yuliang
    Yan, Xuehu
    Wang, Yongjie
    Chang, Chao
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (01) : 25 - 40
  • [27] Improved Extended Polynomial-based Secret Image Sharing Scheme using QR Code
    Fu, Zhengxin
    Liu, Sijia
    Xia, Kun
    Yu, Bin
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 233 - 237
  • [28] Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions
    Song Wan
    Yuliang Lu
    Xuehu Yan
    Yongjie Wang
    Chao Chang
    Journal of Real-Time Image Processing, 2018, 14 : 25 - 40
  • [29] An immune secret QR-Code sharing based on a twofold zero-watermarking scheme
    School of information Science and Engineering, Central South University, Changsha, China
    不详
    不详
    不详
    Int. J. Multimedia Ubiquitous Eng., 4 (399-412): : 399 - 412
  • [30] Efficient QR Code Secret Embedding Mechanism Based on Hamming Code
    Huang, Peng-Cheng
    Chang, Chin-Chen
    Li, Yung-Hui
    Liu, Yanjun
    IEEE ACCESS, 2020, 8 (08): : 86706 - 86714