Presentation is loading. Please wait.

Presentation is loading. Please wait.

Source: Mobile Information Systems, vol. 2017, 2017.

Similar presentations


Presentation on theme: "Source: Mobile Information Systems, vol. 2017, 2017."— Presentation transcript:

1 Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography
Source: Mobile Information Systems, vol. 2017, 2017. Authors: Lu Jianfeng, Yang Zaorang, Li Lina, Yuan Wenqiang, Li Li, Chang Chin-Chen Speaker: HuangPeng-Cheng Date: 11/28/2018

2 Outline Introduction Related Works Proposed Scheme
Scheme I Based on QR Module and XOR Mechanism of RS Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR Conclusions Comments

3 Introduction—motivation(1/2)

4 Introduction(2/2)

5 Related Works(1/3) L. Feng and Q. Y. Wei, Cheating Prevention of Visual Cryptography, Springer International, Berlin, Germany, 2015.

6 Related works(2/3) --Visual Cryptography

7 Related works(3/3) --QR code

8 Scheme I Based on QR Module and XOR Mechanism of RS(1/9)

9 Scheme I Based on QR Module and XOR Mechanism of RS (2/9)

10 Scheme I Based on QR Module and XOR Mechanism of RS (3/9)

11 Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (4/9)
there are somewhat differences between the modifed region and the surrounding region. Such flaw can cause attackers’ suspicion easily and reduce the security of QR code to some extent

12 Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (5/9)

13 Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (6/9)

14 Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (7/9)

15 Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR (8/9)

16 Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR (9/9)

17 Conclusions The hiding region looks like garbled. Attackers are impossible to recover the secret information from each individual shadow.

18 comments Low capacity.


Download ppt "Source: Mobile Information Systems, vol. 2017, 2017."

Similar presentations


Ads by Google