Skip to main content

2016 | OriginalPaper | Buchkapitel

Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing

verfasst von : Yang-Wai Chow, Willy Susilo, Guomin Yang, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi

Erschienen in: Information Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper investigates a novel approach to secret sharing using QR codes. The proposed QR code secret sharing approach exploits the error correction mechanism inherent in the QR code structure, to distribute and encode information about a secret message in a number of shares. Each share in the scheme is constructed from a cover QR code, and each share itself is a valid QR code which can be scanned and decoded by a QR code reader. The secret message can be recovered by combining the information contained in the QR code shares. Since each share is a valid QR code, the proposed scheme has the advantage of reducing the likelihood of attracting the attention of potential attackers. In addition, the shares can be distributed via public channels without raising suspicion. Moreover, shares do not have to be stored or transmitted electronically, as QR codes can be distributed via printed media.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
For a comprehensive description of the QR code structure and error correction mechanism, please refer to the ISO standard (ISO/IEC18004) [13].
 
2
In practice, it is not advisable to introduce this much error in the QR code shares, because any damage or dirt may make the QR code symbol undecodable.
 
3
Please note that all QR codes presented in this paper are valid QR codes that can be decoded by a QR code reader.
 
Literatur
1.
Zurück zum Zitat Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1–2), 143–161 (2001)MathSciNetCrossRef Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1–2), 143–161 (2001)MathSciNetCrossRef
2.
Zurück zum Zitat Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11–46. Springer, Heidelberg (2011)CrossRef Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11–46. Springer, Heidelberg (2011)CrossRef
3.
Zurück zum Zitat Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313–317 (1979) Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313–317 (1979)
4.
Zurück zum Zitat Blundo, C., D’Arco, P., Santis, A.D., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16(2), 224–261 (2003)MathSciNetCrossRef Blundo, C., D’Arco, P., Santis, A.D., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16(2), 224–261 (2003)MathSciNetCrossRef
5.
Zurück zum Zitat Bui, T.V., Vu, N.K., Nguyen, T.T., Echizen, I., Nguyen, T.D.: Robust message hiding for QR code. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520–523. IEEE (2014) Bui, T.V., Vu, N.K., Nguyen, T.T., Echizen, I., Nguyen, T.D.: Robust message hiding for QR code. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520–523. IEEE (2014)
6.
Zurück zum Zitat Chen, W.-Y., Wang, J.-W.: Nested image steganography scheme using QR-barcode technique. Opt. Eng. 48(5), 057004 (2009)CrossRef Chen, W.-Y., Wang, J.-W.: Nested image steganography scheme using QR-barcode technique. Opt. Eng. 48(5), 057004 (2009)CrossRef
7.
Zurück zum Zitat Chow, Y.-W., Susilo, W., Au, M.H., Barmawi, A.M.: A visual one-time password authentication scheme using mobile devices. In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2015. LNCS, vol. 8958, pp. 243–257. Springer, Heidelberg (2015)CrossRef Chow, Y.-W., Susilo, W., Au, M.H., Barmawi, A.M.: A visual one-time password authentication scheme using mobile devices. In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2015. LNCS, vol. 8958, pp. 243–257. Springer, Heidelberg (2015)CrossRef
8.
Zurück zum Zitat Chow, Y.-W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10–21. Springer, Heidelberg (2012)CrossRef Chow, Y.-W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10–21. Springer, Heidelberg (2012)CrossRef
9.
Zurück zum Zitat Chung, C.-H., Chen, W.-Y., Tu, C.-M.: Image hidden technique using QR-barcode. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP 2009, pp. 522–525. IEEE (2009) Chung, C.-H., Chen, W.-Y., Tu, C.-M.: Image hidden technique using QR-barcode. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP 2009, pp. 522–525. IEEE (2009)
11.
Zurück zum Zitat Falkner, S., Kieseberg, P., Simos, D.E., Traxler, C., Weippl, E.: E-voting authentication with QR-codes. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 149–159. Springer, Heidelberg (2014)CrossRef Falkner, S., Kieseberg, P., Simos, D.E., Traxler, C., Weippl, E.: E-voting authentication with QR-codes. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 149–159. Springer, Heidelberg (2014)CrossRef
12.
Zurück zum Zitat Huang, H.-C., Chang, F.-C., Fang, W.-C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011)CrossRef Huang, H.-C., Chang, F.-C., Fang, W.-C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011)CrossRef
13.
Zurück zum Zitat International Organization for Standardization: Information technology – automatic identification and data capture techniques – QR code 2005 bar code symbology specification. ISO/IEC 18004:2006 (2006) International Organization for Standardization: Information technology – automatic identification and data capture techniques – QR code 2005 bar code symbology specification. ISO/IEC 18004:2006 (2006)
14.
Zurück zum Zitat Lee, H.-C., Dong, C.-R., Lin, T.-M.: Digital watermarking based on JND model and QR code features. In: Pan, J.-S., Yang, C.-N., Lin, C.-C. (eds.) Advances in Intelligent Systems and Applications. Smart Innovation, Systems and Technologies, vol. 2, pp. 141–148. Springer, Heidelberg (2013) Lee, H.-C., Dong, C.-R., Lin, T.-M.: Digital watermarking based on JND model and QR code features. In: Pan, J.-S., Yang, C.-N., Lin, C.-C. (eds.) Advances in Intelligent Systems and Applications. Smart Innovation, Systems and Technologies, vol. 2, pp. 141–148. Springer, Heidelberg (2013)
15.
Zurück zum Zitat Lin, P.-Y., Chen, Y.-H., Lu, E.J.-L., Chen, P.-J.: Secret hiding mechanism using QR barcode. In: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 22–25. IEEE (2013) Lin, P.-Y., Chen, Y.-H., Lu, E.J.-L., Chen, P.-J.: Secret hiding mechanism using QR barcode. In: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 22–25. IEEE (2013)
16.
Zurück zum Zitat Liu, F., Guo, T., Wu, C.K., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)CrossRef Liu, F., Guo, T., Wu, C.K., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)CrossRef
17.
Zurück zum Zitat Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRef Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRef
19.
Zurück zum Zitat Thien, C.-C., Lin, J.-C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)CrossRef Thien, C.-C., Lin, J.-C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)CrossRef
20.
Zurück zum Zitat Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recognit. 42(11), 3071–3082 (2009)CrossRef Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recognit. 42(11), 3071–3082 (2009)CrossRef
21.
Zurück zum Zitat Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)CrossRef Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)CrossRef
22.
Zurück zum Zitat Weir, J., Yan, W.: A comprehensive study of visual cryptography. Trans. Data Hiding Multimed. Secur. 5, 70–105 (2010)CrossRef Weir, J., Yan, W.: A comprehensive study of visual cryptography. Trans. Data Hiding Multimed. Secur. 5, 70–105 (2010)CrossRef
23.
Zurück zum Zitat Weir, J., Yan, W.Q.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012)CrossRef Weir, J., Yan, W.Q.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012)CrossRef
24.
Zurück zum Zitat Wu, W.-C., Lin, Z.-W., Wong, W.-T.: Application of QR-code steganography using data embedding technique. In: Park, J.J., Barolli, L., Xhafa, F., Jeong, H.-Y. (eds.) Information Technology Convergence: Security, Robotics, Automations and Communication. Lecture Notes in Electrical Engineering, vol. 253, pp. 597–605. Springer, Dordrecht (2013)CrossRef Wu, W.-C., Lin, Z.-W., Wong, W.-T.: Application of QR-code steganography using data embedding technique. In: Park, J.J., Barolli, L., Xhafa, F., Jeong, H.-Y. (eds.) Information Technology Convergence: Security, Robotics, Automations and Communication. Lecture Notes in Electrical Engineering, vol. 253, pp. 597–605. Springer, Dordrecht (2013)CrossRef
25.
Zurück zum Zitat Yan, W., Wier, J., Kankanhalli, M.S.: Image secret sharing. In: Cimato, S., Yang, C.-N. (eds.) Visual Cryptography and Secret Image Sharing, pp. 381–402. CRC Press, Boca Raton (2012) Yan, W., Wier, J., Kankanhalli, M.S.: Image secret sharing. In: Cimato, S., Yang, C.-N. (eds.) Visual Cryptography and Secret Image Sharing, pp. 381–402. CRC Press, Boca Raton (2012)
26.
Zurück zum Zitat Yang, C.-N., Peng, A.-G., Chen, T.-S.: MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty. Signal Process. 89(8), 1602–1624 (2009)CrossRef Yang, C.-N., Peng, A.-G., Chen, T.-S.: MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty. Signal Process. 89(8), 1602–1624 (2009)CrossRef
Metadaten
Titel
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing
verfasst von
Yang-Wai Chow
Willy Susilo
Guomin Yang
James G. Phillips
Ilung Pranata
Ari Moesriami Barmawi
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-40253-6_25