ICPCSEE 2017: Data Science pp 231-241 | Cite as

Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR Codes

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 727)

Abstract

In this paper, a novel secret data-driven carrier-free (semi structural formula) visual secret sharing (VSS) scheme with (2, 2) threshold based on the error correction blocks of QR codes is investigated. The proposed scheme is to search two QR codes that altered to satisfy the secret sharing modules in the error correction mechanism from the large datasets of QR codes according to the secret image, which is to embed the secret image into QR codes based on carrier-free secret sharing. The size of secret image is the same or closest with the region from the coordinate of (7, 7) to the lower right corner of QR codes. In this way, we can find the QR codes combination of embedding secret information maximization with secret data-driven based on Big data search. Each output share is a valid QR code which can be decoded correctly utilizing a QR code reader and it may reduce the likelihood of attracting the attention of potential attackers. The proposed scheme can reveal secret image visually with the abilities of stacking and XOR decryptions. The secret image can be recovered by human visual system (HVS) without any computation based on stacking. On the other hand, if the light-weight computation device is available, the secret image can be lossless revealed based on XOR operation. In addition, QR codes could assist alignment for VSS recovery. The experimental results show the effectiveness of our scheme.

Keywords

Visual secret sharing QR code Error correction blocks Carrier-free Big data Data-driven Multiple decryptions 

References

  1. 1.
    Beimel, A.: Secret-sharing schemes: a survey. In: International Workshop, pp. 11–46 (2011)Google Scholar
  2. 2.
    Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi: 10.1007/BFb0053419 Google Scholar
  3. 3.
    Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)CrossRefMATHGoogle Scholar
  4. 4.
    Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14298-7_5 CrossRefGoogle Scholar
  5. 5.
    Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimed. Tools and Appl. 74(9), 3231–3252 (2015)CrossRefGoogle Scholar
  6. 6.
    Jtc1/Sc, I.: Information technology - automatic identification and data capture techniques - QR code 2005 bar code symbology specification (2006)Google Scholar
  7. 7.
    Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 409–425. Springer, Cham (2016). doi: 10.1007/978-3-319-40253-6_25 CrossRefGoogle Scholar
  8. 8.
    Wan, S., Lu, Y., Yan, X., Wang, Y., Chang, C.: Visual secret sharing scheme for \((k, n)\) threshold based on QR code with multiple decryptions. J. Real-Time Image Proc. 1–16 (2017)Google Scholar
  9. 9.
    Yan, X., Lu, Y., Huang, H., Liu, L., Wan, S.: Clarity corresponding to contrast in visual cryptography. In: Che, W., et al. (eds.) ICYCSEE 2016. CCIS, vol. 623, pp. 249–257. Springer, Singapore (2016). doi: 10.1007/978-981-10-2053-7_23 CrossRefGoogle Scholar
  10. 10.
    Denso, W.I.: (2002). http://www.qrcode.com
  11. 11.
    Yan, X., Guan, S., Niu, X.: Research on the capacity of error-correcting codes-based information hiding. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 1158–1161 (2008)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Hefei Electronic Engineering InstituteHefeiChina

Personalised recommendations