2019
DOI: 10.1155/2019/7937816
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code

Abstract: Quick Response (QR) code, a machine-readable symbol, is widely employed in all walks of life due to its large information capacity, strong error correction ability, and fast reading speed. However, anyone with a standard decoder could obtain stored information. In this paper, utilizing the characteristics of the Hamming code, wet paper code, and the recognition mechanism of the QR code, we introduce a high-capacity QR code with three-layer information to protect the sensitive information. In the proposed schem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…This approach encodes the binary QR codes into three color shares and recovers the QR code by stacking them. Yu et al [32] present a three-level QR coding scheme, embedding sensitive information within a carrier QR code in three steps, revealing only the public information of the carrier at the first layer.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach encodes the binary QR codes into three color shares and recovers the QR code by stacking them. Yu et al [32] present a three-level QR coding scheme, embedding sensitive information within a carrier QR code in three steps, revealing only the public information of the carrier at the first layer.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The authors report complete recovery and decoding of a 41 × 41 QR code in [31] without obvious performance analysis of the (3,3) secret-sharing approach on a complete dataset. Similarly, in [32] only subjective results are presented for a small set of QR codes without objective results. Lack of comparative analysis with a standard dataset and quantitative measures restricts further explorations regarding the enhancement of the approaches.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…Several studies have been conducted using secret hiding schemes based on hamming code and visual secret sharing schemes to protect QR code content and private information during online transactions [30][31][32][33][34][35][36]. e study described in [33] was related to computational security by supposing that the attacker technique was restricted to the QR code scanner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Liu et al [20] propose a Cloud computing data security algorithm. Yu et al [21] propose a novel three-layer QR code based on the secret sharing scheme and liner code.…”
Section: Introductionmentioning
confidence: 99%