Download presentation
Presentation is loading. Please wait.
Published byGarey Dean Modified over 6 years ago
1
A new two-level QR code with visual cryptography scheme
Zhengzhou Information Science and Technology Institute Source: Multimedia Tools and Applications (2017): 1-21. Authors: Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen Speaker: Huang Peng-Cheng Date: 11/26/2018
2
Outline Related works Proposed scheme Simulation results Comparison
References Conclusions Comments
3
Related works (1/1) --visual cryptography scheme(VCS)
4
Proposed scheme (1/5) -- encoding flowchart(1/1)
Encoding procedure {P1,…,Pn} n-1 {S1,…,Sn-1}
5
Proposed scheme (2/5) --decoding flowchart(1/1)
Threshold T1 = {P1} T2 = {P2} Threshold T3 = {P3} {S2}
6
Proposed scheme(1/5) -- Structure of a cell (1/2)
Cell VS Subcell Module VS Submodule
7
Proposed scheme(2/5) --Structure of a cell (2/2)
1 2 3 4 9 5 6 7 8
8
Proposed scheme (5/5) --An example for encoding process
χ3= n=3 Case 1: p1=1 1 2 3 4 9 5 6 7 8 Public module 1 10010 χ1= 1 2 3 4 9 5 6 7 8 Case 2: p2=0 1 Secret module χ2= 1 2 3 4 9 5 6 7 8
9
Simulation results (1/7)
10
Simulation results (2/7)
11
Simulation results (3/7)
12
Simulation results (4/7)
13
Simulation results (5/7)
14
Simulation results (6/7)
15
Simulation results (7/7)
16
Comparison(1/3) –Error correction capacity
17
Comparison(2/3) –Secret payload
18
Comparison(3/3) –Computational complexity
19
References 3. Chen C (2016) QR code authentication with embedded message authentication code. Mob Netw Appl 22:383–394. 4. Chow YW, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the error correctionmechanism in QR codes for secret sharing. Australasian conference on information security and privacy, pp409–425. Springer International Publishing. doi: _25 9. Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE TransInd Inf 12:384– Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP J Image VideoProcess. 12. Liu Y, Fu ZX, Wang YW (2016) Two-level information management scheme based on visual cryptographyand QR code. Appl Res Comput 33:3460– 18. Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-level QR code forprivate message sharing and document authentication. IEEE Trans Inf Forensics Secur 11:571–583. 20. Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based onQR code with multiple decryptions. J Real-Time Image Proc.
20
Conclusions Two-level information storage Low computational complexity
High error correction
21
Comments Need threshold set for each module; {l1,…,ln},{h1,…,hn}
High computation complexity in encoding procedure; Have to process every module, no matter how long the secret message is; Poor robustness. The correctness of the theory?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.