Presentation is loading. Please wait.

Presentation is loading. Please wait.

A new two-level QR code with visual cryptography scheme

Similar presentations


Presentation on theme: "A new two-level QR code with visual cryptography scheme"— Presentation transcript:

1 A new two-level QR code with visual cryptography scheme
Zhengzhou Information Science and Technology Institute Source: Multimedia Tools and Applications (2017): 1-21. Authors: Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen Speaker: Huang Peng-Cheng Date: 11/26/2018

2 Outline Related works Proposed scheme Simulation results Comparison
References Conclusions Comments

3 Related works (1/1) --visual cryptography scheme(VCS)

4 Proposed scheme (1/5) -- encoding flowchart(1/1)
Encoding procedure {P1,…,Pn} n-1 {S1,…,Sn-1}

5 Proposed scheme (2/5) --decoding flowchart(1/1)
Threshold T1 = {P1} T2 = {P2} Threshold T3 = {P3} {S2}

6 Proposed scheme(1/5) -- Structure of a cell (1/2)
Cell VS Subcell Module VS Submodule

7 Proposed scheme(2/5) --Structure of a cell (2/2)
1 2 3 4 9 5 6 7 8

8 Proposed scheme (5/5) --An example for encoding process
χ3= n=3 Case 1: p1=1 1 2 3 4 9 5 6 7 8 Public module 1 10010 χ1= 1 2 3 4 9 5 6 7 8 Case 2: p2=0 1 Secret module χ2= 1 2 3 4 9 5 6 7 8

9 Simulation results (1/7)

10 Simulation results (2/7)

11 Simulation results (3/7)

12 Simulation results (4/7)

13 Simulation results (5/7)

14 Simulation results (6/7)

15 Simulation results (7/7)

16 Comparison(1/3) –Error correction capacity

17 Comparison(2/3) –Secret payload

18 Comparison(3/3) –Computational complexity

19 References 3. Chen C (2016) QR code authentication with embedded message authentication code. Mob Netw Appl 22:383–394. 4. Chow YW, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the error correctionmechanism in QR codes for secret sharing. Australasian conference on information security and privacy, pp409–425. Springer International Publishing. doi: _25 9. Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE TransInd Inf 12:384– Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP J Image VideoProcess. 12. Liu Y, Fu ZX, Wang YW (2016) Two-level information management scheme based on visual cryptographyand QR code. Appl Res Comput 33:3460– 18. Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-level QR code forprivate message sharing and document authentication. IEEE Trans Inf Forensics Secur 11:571–583. 20. Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based onQR code with multiple decryptions. J Real-Time Image Proc.

20 Conclusions Two-level information storage Low computational complexity
High error correction

21 Comments Need threshold set for each module; {l1,…,ln},{h1,…,hn}
High computation complexity in encoding procedure; Have to process every module, no matter how long the secret message is; Poor robustness. The correctness of the theory?


Download ppt "A new two-level QR code with visual cryptography scheme"

Similar presentations


Ads by Google