Skip to main content
Log in

A new two-level QR code with visual cryptography scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Quick Response (QR) code is designed for information storage recognizable by machine vision. With the popularity of QR code applications, the security of QR codes becomes hot issues concerned by many scholars. In this paper, a novel QR code with two-level information storage is designed to protect private messages. In the meantime, the public level can be directly decoded by any standard QR reader. In contrast to other studies, the computational complexity of the proposed scheme is reduced by combining with the theory of visual cryptography scheme (VCS). In addition, an important characteristic of the QR code, error correction capability, is preserved in this paper, guaranteeing the robustness to QR code damage. Experimental results and analysis show that the proposed scheme is both feasible and reasonably secure, further enriching the application fields and outperforming the previous schemes significantly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Arumugam S, Lakshmanan R, Nagar AK (2014) On (k, n)*-visual cryptography scheme. Des Codes Crypt 71:153–162. https://doi.org/10.1007/s10623-012-9722-2

    Article  MATH  Google Scholar 

  2. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86–106. https://doi.org/10.1006/inco.1996.0076

    Article  MathSciNet  MATH  Google Scholar 

  3. Chen C (2016) QR code authentication with embedded message authentication code. Mob Netw Appl 22:383–394. https://doi.org/10.1007/s11036-016-0772-y

    Article  Google Scholar 

  4. Chow YW, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the error correction mechanism in QR codes for secret sharing. Australasian conference on information security and privacy, pp 409–425. Springer International Publishing. doi:https://doi.org/10.1007/978-3-319-40253-6 _25

  5. Chu HK, Chang CS, Lee RR, Mitra NJ (2013) Halftone QR codes. ACM Trans Graph 32:217. https://doi.org/10.1145/2508363.2508408

    Article  Google Scholar 

  6. Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low- and high-dimensional approaches. IEEE Trans Syst Man Cybern B 43:996–1002. https://doi.org/10.1109/TSMCA.2012.2223670

    Article  Google Scholar 

  7. ISO, IEC 18004: 2006 (2006) Information technology – Automatic identification and data capture techniques – QR Code 2005 bar code symbology specification, International Organization for Standardization, Geneva, Switzerland

  8. Krishna MB, Dugar A (2016) Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel Pers Commun 90:381–398. https://doi.org/10.1007/s11277-016- 3374-x

    Article  Google Scholar 

  9. Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE Trans Ind Inf 12:384–392. https://doi.org/10.1109/TII.2015.2514097

    Google Scholar 

  10. Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP J Image Video Process. https://doi.org/10.1186/s13640-016-0155-0

  11. Liu Y, Zhang X, Cui J, Wu C, Aghajan H, Zha H (2010) Visual analysis of child-adult interactive behaviors in video sequences. International conference on virtual systems and multimedia, pp 26–33. IEEE. doi:https://doi.org/10.1109/VSMM.2010.5665969

  12. Liu Y, Fu ZX, Wang YW (2016) Two-level information management scheme based on visual cryptography and QR code. Appl Res Comput 33:3460–3463. https://doi.org/10.3969/j.issn.1001-3695.2016.11.057

    Google Scholar 

  13. Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2016) Action2activity: recognizing complex activities from sensor data. Proceedings of the twenty-fourth international joint conference on artificial intelligence, pp 1617–1623

  14. Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115. https://doi.org/10.1016/j.neucom.2015.08.096

    Article  Google Scholar 

  15. Naor M, Shamir A (1995) Visual cryptography. EUROCRYPT 1994. Advances in cryptology — EUROCRYPT'94, vol 950, pp 1–12. doi:https://doi.org/10.1007/BFb0053419

  16. Patvardhan C, Kumar P, Lakshmi CV (2017) Effective Color image watermarking scheme using YCbCr color space and QR code. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4909-1

  17. Shyu SJ, Chen MC (2015) Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Trans Circuits Syst Video Technol 25:1557–1561. https://doi.org/10.1109/TCSVT.2015.2389372

    Article  Google Scholar 

  18. Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-level QR code for private message sharing and document authentication. IEEE Trans Inf Forensics Secur 11:571–583. https://doi.org/10.1109/TIFS.2015.2506546

    Article  Google Scholar 

  19. Tuyls P, Hollmann HD, Lint JH, Tolhuizen L (2005) XOR-based visual cryptography schemes. Des Codes Crypt 37:169–186. https://doi.org/10.1007/s10623-004-3816-4

    Article  MathSciNet  MATH  Google Scholar 

  20. Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc. https://doi.org/10.1007/s11554-017-0678-3

  21. Wang J, Song L, Liang X, Liu Y, Liu P (2016) Secure and noise-free nonlinear optical cryptosystem based on phase-truncated Fresnel diffraction and QR code. Opt Quant Electron 48:523. https://doi.org/10.1007/s11082-016-0796-3

    Article  Google Scholar 

  22. Weir J, Yan WQ (2011) Authenticating visual cryptography shares using 2D barcodes. IWDW 2011: Digital Forensics and Watermarking, vol 7128, pp 196–210. doi:10.1007/978–3–642-32205-1_17

  23. Xie X, Livermore C (2016) A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach. Proc. of International Conference on MICRO Electro Mechanical Systems, In, pp 75–78. https://doi.org/10.1109/MEMSYS.2016.7421561

    Google Scholar 

  24. Xie X, Livermore C (2017) Passively self-aligned assembly of compact barrel hinges for high-performance, out-of-plane mems actuators. In: Proc of international conference on MICRO electro mechanical systems doi:https://doi.org/10.1109/MEMSYS.2017.7863532

  25. Xie X, Zaitsev Y, Velasquezgarcía LF, Teller SJ, Livermore C (2014) Compact, scalable, high-resolution, MEMS-enabled tactile displays. In: Proc. of solid-state sensors, actuators, and microsystems workshop, pp 127–30

  26. Xie X, Zaitsev Y, Velasquezgarcía LF, Teller SJ, Livermore C (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24:125014. https://doi.org/10.1088/0960–1317/24/12/125014

    Article  Google Scholar 

  27. Yang CN, Liao JK, Wu FH, Yamaguchi Y (2016) Developing visual cryptography for authentication on smartphones. doi:https://doi.org/10.1007/978-3-319-44350-8_19

  28. Yang CN, Wu CH, Yeh ZX, Wang DS, Kim C (2017) A new sharing digital image scheme with clearer shadow images. Comput Stand Interfaces 51:118–131. https://doi.org/10.1016/j.cs i.2016.11.015

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the anonymous reviewers for their valuable comments. This work was supported in part by the National Natural Science Foundation of China under Grant No.61602513 and the Outstanding Youth Foundation of Zhengzhou Information Science and Technology Institute under Grant No.2016611303.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuqiao Cheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cheng, Y., Fu, Z., Yu, B. et al. A new two-level QR code with visual cryptography scheme. Multimed Tools Appl 77, 20629–20649 (2018). https://doi.org/10.1007/s11042-017-5465-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5465-4

Keywords

Navigation