2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW) 2018
DOI: 10.1109/icce-china.2018.8448586
|View full text |Cite
|
Sign up to set email alerts
|

Secret Sharing Application for Two-dimensional QR Barcode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The main operations of Chuang In the aspect of secret payload, the randomly embedding strategy of Lin's scheme results have too many error codewords in the QR code, the secret payload is dramatically reduced, it is in the range of [2,1215] bits. The QR code error correction capacity determines the secret payload of Chow et al's scheme and He et al's scheme, their payloads are in the range of [16,9620] bits. At the same time, beside the secret share, Huang et al's scheme also embedded many side information to implement the cheating preventions function and embedding key reconstruction.…”
Section: Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…The main operations of Chuang In the aspect of secret payload, the randomly embedding strategy of Lin's scheme results have too many error codewords in the QR code, the secret payload is dramatically reduced, it is in the range of [2,1215] bits. The QR code error correction capacity determines the secret payload of Chow et al's scheme and He et al's scheme, their payloads are in the range of [16,9620] bits. At the same time, beside the secret share, Huang et al's scheme also embedded many side information to implement the cheating preventions function and embedding key reconstruction.…”
Section: Comparisonsmentioning
confidence: 99%
“…The meaningful QR code pseudoshares reduce malevolent people's attentions with the help of the cheater detection function which makes it difficult to forge a fake QR code pseudo-shares. Chow et al [15] and He et al [16] proposed two QR code secret sharing scheme to improve the security of Chuang's scheme. Their schemes employed the symmetric encryption algorithm to encrypt shares before embedding shares into the meaningful cover QR codes.…”
Section: Introductionmentioning
confidence: 99%