2016
DOI: 10.1007/978-3-319-44350-8_19
|View full text |Cite
|
Sign up to set email alerts
|

Developing Visual Cryptography for Authentication on Smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Chow et al [3] designed an (n, n)-threshold secret sharing scheme, in which n is no less than 3, by relying on QR code's error correction mechanism. Yang et al [23]combined VCS and 2D barcodes to perform authentication on smartphones. A scheme with two-level information management based QR codes being machine readable was proposed by Liu et al [8]; however, decoding shadows was difficult unless the appropriate scanning angle and distance were determined.…”
Section: Introductionmentioning
confidence: 99%
“…Chow et al [3] designed an (n, n)-threshold secret sharing scheme, in which n is no less than 3, by relying on QR code's error correction mechanism. Yang et al [23]combined VCS and 2D barcodes to perform authentication on smartphones. A scheme with two-level information management based QR codes being machine readable was proposed by Liu et al [8]; however, decoding shadows was difficult unless the appropriate scanning angle and distance were determined.…”
Section: Introductionmentioning
confidence: 99%
“…Particularly visual cryptography plays major part in the increased security level due to its complexity level. Encryption process involved in the visual cryptography technique increased its applicability and usage in various areas [6]. In this research work, discussion about those particular areas has been given.…”
Section: Introductionmentioning
confidence: 99%
“…The two shadows can also be stacked together and the original QR code is restored as shown in Figure 2(a). If the scheme [13] is applied on specific QR code payment, the shadows are only vulnerable.…”
Section: Introductionmentioning
confidence: 99%
“…In this study, the shadows are hidden in an undetectable state using the QR code background fusion on such basis [13]. Specifically, two shadows are respectively embedded into two similar images and the results are fused with two identical carrier QR code by using QR code background fusion strategy.…”
Section: Introductionmentioning
confidence: 99%