Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography Source: Mobile Information Systems, vol. 2017, 2017. Authors: Lu Jianfeng, Yang Zaorang, Li Lina, Yuan Wenqiang, Li Li, Chang Chin-Chen Speaker: HuangPeng-Cheng Date: 11/28/2018
Outline Introduction Related Works Proposed Scheme Scheme I Based on QR Module and XOR Mechanism of RS Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR Conclusions Comments
Introduction—motivation(1/2)
Introduction(2/2)
Related Works(1/3) L. Feng and Q. Y. Wei, Cheating Prevention of Visual Cryptography, Springer International, Berlin, Germany, 2015.
Related works(2/3) --Visual Cryptography
Related works(3/3) --QR code
Scheme I Based on QR Module and XOR Mechanism of RS(1/9)
Scheme I Based on QR Module and XOR Mechanism of RS (2/9)
Scheme I Based on QR Module and XOR Mechanism of RS (3/9)
Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (4/9) there are somewhat differences between the modifed region and the surrounding region. Such flaw can cause attackers’ suspicion easily and reduce the security of QR code to some extent
Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (5/9)
Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (6/9)
Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (7/9)
Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR (8/9)
Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR (9/9)
Conclusions The hiding region looks like garbled. Attackers are impossible to recover the secret information from each individual shadow.
comments Low capacity.