Article Preview
TopIntroduction
A secret sharing scheme is a method of encoding a secret image into a number of shares where each share reveals no information about the secret image. Only qualified shares can reconstruct the secret message (Beimel, 2011). Visual cryptography (VC), also called Visual Secret Share (VSS), is a kind of secret sharing scheme (Naor & Shamir, 1994; Wang et al., 2007; m Wang, Arce & Crescenzo, 2009; Weir & Yan, 2010; Yang, 2004) where the secret image can be recovered by stacking the qualified number of shares based on the human visual system without any computation. Similarly, as secret sharing. VSS (Feng et al., 2008; Wang et al., 2009; Yang et al., 2014) can overcome the problem of storing a secret in a single information-carrier which would be damaged and lost easily by splitting and encoding a secret into a number of shares. However, as each share in VSS looks like a random pattern of pixels, it will raise suspicion and increase the likelihood of attracting the attention of potential attackers. Furthermore, the alignment is also an important issue for VSS recovery.
QR code (Jtc1/Sc, 2006) is a popularly used two-dimensional barcode recently with the advantages of larger QR content and error correction capability. Also, the appearance of QR code is similar to the share of VSS. Based on the above advantages, the technology of combining QR code and VSS can be applied in many scenes, such as transferring secret information via public channels (Cimato & Yang, 2012; Tkachenko et al., 2016).
Recently, many researchers have proposed some schemes combining the technologies of QR code and VSS. Jonathan and Yan (2011) presented a scheme that uses a QR code to authenticate the shares. It attempts to embed the verification information inside the recovered secret in the form of a QR code. In their scheme, the QR code can be used as the secret transport mechanism which a long string of alphanumeric characters can be embedded inside the barcode. Wang et. al (2016) proposed a scheme by embedding QR codes into given shares to prevent cheating. They search the best region of a given share where the QR code could be embedded into so as to keep the visual quality of the revealed secret and the embedding will not affect the visual cryptography secret revealing too much. However, the shares are random in the schemes above, which may attract suspicion of encryption, due to embed QR codes into VSS shares.
Chow et. al (2016) proposed a secret sharing scheme for (n, n)
threshold based on XOR operation by distributing and encoding the information of a QR code containing a secret message into a set of QR codes. Each QR code share is a valid QR code that can be recognized by a QR code reader. The secret message can be recovered by first XORing the light and dark modules contained in the encoding region of all the n QR code shares and adding the function patterns. Nevertheless, the scheme needs a computational device with XOR ability and a QR code reader for secret recovery as well as is only for cases that n is larger than 3.