2021
DOI: 10.1016/j.jisa.2020.102719
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The proposed scheme can encrypt all versions of QR codes. This is a non-pixel-expansible scheme [ 46 ]. It can produce meaningful shares.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The proposed scheme can encrypt all versions of QR codes. This is a non-pixel-expansible scheme [ 46 ]. It can produce meaningful shares.…”
Section: Methodsmentioning
confidence: 99%
“…It is hard to extend the -threshold scheme. These schemes are schemes [ 42 , 45 , 46 ]. However, they cannot restore the secret QR code with errors.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Second, QR codes are closely related to some issues of information security, such as secret sharing via QR codes 25 , 35 , QR security in mobile payments 34 and QR detection against a malicious URL 26 .…”
Section: Comparisons Between This Work and Related Onesmentioning
confidence: 99%
“…However, the secret information recovered from the stego image by this method may still be leaked. In the research of Huang et al [20], the secret information is a QR code that is first divided into n blocks, and then each block is encoded into a marketed QR code together with a cover QR code. The recovery of secret QR codes can be obtained by the XOR operation of these marked QR codes.…”
Section: Introductionmentioning
confidence: 99%