Secretly Shared QR Code and Its Applications

  • G.S. Devisree
  • K. Praveen
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)


Quick response codes (QR codes) are widely being used for various applications such as user authentication and advertisements. The data in QR codes can easily be read with the help of a QR code reader application installed in a smartphone with camera. Here, we cannot neglect the possibility of an attacker tampering the QR code data. For example, in authentication, the attacker can forge the text password. In order to avoid such attacks as well as hide this data from the public, we propose a secret sharing scheme with reversing. This scheme not only splits the QR code into different shares, but also allows us to perfectly reconstruct back the original QR code.


Quick response codes Visual cryptography Stenographic technique Secret sharing scheme 


  1. 1.
    C. Blundo, A. De Santis, Visual cryptography schemes with perfect reconstruction of black pixels. J. Comp. Graphics 22(4), 449–455 (1998)CrossRefGoogle Scholar
  2. 2.
    P. Kieseberg, M. Leithner, M. Mulazzani, L. Munroe, S. Schrittwieser, M. Sinha, E. Weippl, QR code security, in Proceedings of 8th International conference on Advances in Mobile Computing (2010)Google Scholar
  3. 3.
    Omprasad Deshmukh, Shefali Sonavane, Multi-share crypt-stego authentication system. IJCSMC 2(2), 80–90 (2013)Google Scholar
  4. 4.
    M. Naor, A. Shamir, Visual cryptography, advances in cryptology: eurpocrypt’94 (Springer, Berlin, 1994), pp. 1–12Google Scholar
  5. 5.
    G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)CrossRefMATHGoogle Scholar
  6. 6.
    K.C. Liao, W.H. Lee, A novel user authentication scheme based on QR-Code. J. Netw. 5, 937–941 (2010)Google Scholar
  7. 7.
    M.A. Sharma, M.C. Rao, Visual cryptography authentication for data matrix code. Int. J. Comp. Sci. Telecommun. 2(8), 58–62 (2011)Google Scholar
  8. 8.
    S. Cimato, A. De Santis, A.L. Ferrara, B. Masucci, ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93, 199–206 (2005)CrossRefMATHGoogle Scholar
  9. 9.
    Jayanta Kumar Pal, J.K. Mandal, Kousik Dasgupta, A (2, N) visual cryptographic technique for banking applications. Int. J. Netw. Secur. Appl. (IJNSA) 2(4), 118–127 (2010)Google Scholar
  10. 10.
    Chuang Jun-Chou, Hu Yu-Chen, Ko Hsien-Ju, A novel secret sharing technique using QR code. Int. J. Image Process.(IJIP) 4(5), 468–475 (2010)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.TIFAC CORE in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations