You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

8 October 2021

A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code

,
,
and
1
Department of Management Information Systems, National Chung Hsing University, Taichung 402, Taiwan
2
Language Center, National Chin-Yi University of Technology, Taichung 411, Taiwan
3
Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404, Taiwan
*
Author to whom correspondence should be addressed.
This article belongs to the Section Computer

Abstract

The information technique has developed rapidly. The technique of QR codes is widely applied in our daily life, and the mechanism is suitable to share data. A QR code uses symmetric encryption to store and retrieve data efficiently. However, the security issues of QR codes are seldom discussed by the wider community. Moreover, if the sender wishes only the authorized participant to attain the private data which are shared, the data must be encrypted. Furthermore, we do not know who should be censured when problems arise. In view of this, to maintain the integrity and the confidentiality of information security, this paper proposed a new puzzle-based data sharing scheme to share the private information safely. Firstly, we generated the digital signature of the information, then applied the random grids algorithm to obtain the shares. Then, we disarrayed the shares which contain the information and the digital signature with a puzzle-based encoding method. Afterwards, we concealed them into the cover QR codes. With the QR code mechanism of error correction, the marked QR code remain meaningful. Finally, we could send marked QR codes via transmission. The receiver could use XOR operation to obtain the private information after solving the puzzles and verify whether it was tampered with by the digital signature. The proposed system can recover the lossless data and protect them from being divulged. To deal with the potential hazard of transmission in a public environment, there are more and more studies on data hiding and image authentication.

1. Introduction

With the rapid development of the Internet and information technology, the amount of people using smart phones has risen. Additionally, it is notable that the usage of smart phones has been enriched with functions such as sending e-mails, searching information on the Internet, or shopping on websites, paying online or credit transferring with confidential information features. Therefore, the security when transferring sensitive data should be ensured, otherwise people might suffer from the theft of personal property.
It is noteworthy that QR codes can store data and be used for obtaining data when the device is offline. They have been used widely in daily life for functions such as ticketing systems, product tracing, electronic transactions, social networks, etc. However, people usually scan them directly, without confirming their trustworthiness. Cryptography is a common method to assure the information security in the digital transmission. There are two ways to encrypt private data via cryptography, symmetric cryptography and asymmetric cryptography [1]. A QR code uses an asymmetric encryption scheme to store and retrieve data efficiently [2,3]; QR codes are not readable with the naked eye and people usually rely on optical instruments when scanning for data. When operating the information obtained from public environments, it is possible that the users might expose their sensitive information, as they are not aware that the QR code might have been tampered with, and the website address they are accessing could possibly be a phishing website [4,5,6,7,8]. Therefore, it is necessary that people have a way to validate if the website address is issued by the publisher. If paying information is usurped, it might bring about financial losses. Moreover, if the personal and private information is leaked to a phishing website, it could endanger the personal safety of the user. In other words, it is more and more important to verify the data or website addresses from QR codes in this information based society we live in.
Owing to the designed mechanism, anyone who has a camera built into their smart phone and installs QR code scanning software could scan a QR code to acquire the information of it. That shows the potential risks: it is possible that the information of QR code might be divulged to hackers. For the most part, to protect the private data that would be shared by QR code, the administrator will store the message in the database in the cloud, and replace the message with an URL showing a website address that could link to the backend database. Only a user who has right to pass the access permission can retrieve the data. However, this method of showing the database website address may attract attackers’ attention to try to access the secret message.
Recently, in order to prevent the data which have to be hidden from exposure to the public, many studies have focused on QR codes. In 2009, Chen et al. [9] proposed a scheme that utilizes steganography. It firstly generates a QR code with a text, then removes some functional patterns of QR code. As a result of removing the position detecting pattern and alignment pattern, the QR code would only retain the important information, such as version, error correction level, data and error correction codewords, etc. Then, flatten them from a 2-D bit stream into 1-D bit stream. Finally, after choosing the coefficients of discrete cosine transform (DCT), the 1-D bit stream would be embedded into the cover image. The secret payload would depend on the version of QR code image. However, this scheme would cost lots of computational resources.
On the other hand, Sun et al. [10] proposed a watermarking scheme applied to QR codes. There are two algorithms in the scheme; both of them are utilized with Discrete Wavelet Transform (DWT). One firstly generates random serial numbers as secret key, then embeds them into the cover of the QR code for authentication. The other one embeds a binary image, such as a logo, into the cover of the QR code, preventing counterfeits. However, neither algorithm modifies modules in the QR code, which would make the cover QR code, and the fact that it is embedded with some information, easily found.
There are distributed data sharing schemes [11,12,13,14,15,16,17] that allow the message to be segmented into numerous shadows. The original message can be recovered when the participants hold enough shares which contain the shadows. Furthermore, these data sharing schemes use QR codes as cover images, and all of them modify the modules to share the data (except Chuang et al.’s scheme [13]). Utilizing the error correction characteristic of QR codes, the schemes could allow the marked QR code to remain meaningful. However, Lin et al.’s scheme [12] would cause additional issues on distributing the keys, though it could hold more space for data. In [15], Huang et al. proposed an efficient QR code data embedding mechanism based on the Hamming code. The (8, 4) Hamming code is utilized for embedding the secret message into the cover of a QR code. In [16], Alajmi et al. proposed a steganographic system that adopts the notion of quick response (QR) code as a container for hiding the payload. By doing so, misleading information can easily be exposed to the adversary.
Although Chuang et al.’s scheme [13] and Huang et al.’s scheme [15] can share data without additional information, the message would be obtained as a meaningless number stream by anyone who has a QR code reader. It would be a serious problem if everyone can access the shadow of secret bits without any permission or requirement. In another aspect, Lin’s scheme can make the marked QR codes be meaningful, but it needs to manage key distribution. Without knowing the keys, the scheme cannot recover the original message.
To overcome the above-mentioned issues, Huang et al. [11] proposed a scheme that utilizes a Sudoku puzzle to encode secret message and embed it into QR codes. However, using Sudoku puzzle to encode data would raise two issues: (1) a low capacity for the message and (2) a limited position of the puzzle. The issue of low capacity for the message is due to the fact that embedding a whole Sudoku puzzle would cost lots of bits. However, using a Sudoku puzzle to encode a message may cost a lot of digits of QR code for embedding the puzzle into QR code. For example, it could be referred that novenary × Sudoku puzzle size = 4 bits × (9 × 9) = 364 bits for each share when we embed a message with 0 bits. Moreover, the method of Sudoku puzzle encoding is coordinate-like, which leads to the issue of a limited position of the puzzle. As a result, it would cost additional bits to represent the coordinates of each cell of the Sudoku embedded in QR codes. As shown in Huang et al.’s work [11], when the secret message is “2015”, firstly transform it into novenary: ( 2015 ) 10 = ( 2678 ) 9 . Then, it would be represented as ( 6 DA 122 EC ) accordingly. Finally, it will cost 4 bits hexadecimal × 8 = 32 bits, simply for sharing a 4-digit number. To address the issues raised by the Sudoku puzzle-based QR code scheme, in this paper, we propose a new breed of puzzle which is coordinate-free. Based on our proposed coordinate-free puzzle, we propose a new scheme which can preserve more capacity for data. Through a series of experiments, we provide sufficient evidence to prove that our proposal outperforms state-of-the-art QR code data embedding schemes.
The rest of this paper is organized as follows. We first introduce some related work in Section 2. Section 3 explains the deep learning-based approaches for Image Authentication and Recovery System. Section 4 presents the experiment and discussion, and Section 5 contains the conclusion.

3. Proposed Method

The proposed method is a (2,2)-threshold random grids data sharing system based on the QR code technique and a new method, which is puzzle based, to encode a bit stream. The secret sharing procedure of the proposed system is shown in Figure 3. There would be one dealer and two participants in the proposed system. The dealer is in charge of generating the digital signature and appending it to the message, then transforming it into a binary bit stream. Afterwards, the dealer encrypts it into two shares then encodes them as puzzles, which will be discussed in Section 3.1.2, and conceals them to in two QR codes. Finally, the dealer distributes them to the participants. The shared data can be restored by solving the puzzles when both marked QR code images are obtained. It will not leak any secret message if there is a marked QR code image missing, or without knowing the solution of puzzles. Moreover, the proposed system can achieve cheater prevention by comparing the technique of digital signature.
Figure 3. The secret sharing procedure of the proposed system.

3.1. Secret Sharing Procedure

In this section, the process of generating marked QR codes will be described clearly, with some instances for illustration.

3.1.1. Shadow Derivation Phase

Step 1. Generate public key and private key.
For instance, two random prime numbers: p = 13,990,592,845,718,003,597 and q = 15,765,429,783,677,334,361 then determine e = 65,537. Afterwards, d could be calculated as 147,609,429,104,525,097,256,750,152,470,343,671,393 by formula (1) and (2). Finally, e is the public key and d is the private key.
Step 2. Generate message digest by one-way hash function.
V = h a s h ( S )
There would be a one-way hash process to do in the process of a digital signature. Take MD5 as example; it would output a 128-bit length message digest, no matter how long the input is [29], and the output bit stream can be represented as characters. For instance, regard “NCHU” as input then the message digest V = MD 5 ( NCHU ) =   beca 06031 f 14907 b .
Step 3. Encrypt the hash value by RSA encrypting function to Generate digital signature
D = R S A ( d , V )
For instance, the digital signature should be produced as below:
D = V d   m o d   ( p × q ) = 332 d 82590 cc 95078 abd 5 a 7 eb 5 f 9 e 9 a 66
Notice that the public key is distributed, and the private key is kept carefully by the publisher.
Step 4. Let B = ( S D ) and convert it into a binary bit stream.
Step 5. Calculate the length of B as l B then apply random grids algorithm described below where i = 0 ,   1 , , l B 1 .
S h a r e 1 ( i ) = r a n d o m ( { 0 , 1 } )
S h a r e 2 ( i ) = { S h a r e 1 ( i )     if     B ( i ) = 0 ! S h a r e 1 ( i )     if     B ( i ) = 1

3.1.2. Puzzle-Based Encoding

In this section, the process of generating marked QR codes will be described clearly with some instances for illustration.

Preliminary Phase

Step 1. The idea of puzzle: let 8 digital bits with 0 or 1, which mean white and black, respectively, be put into a size of 3 × 3 grids in sequence, but skip the middle center to fit its size, as shown in Figure 4b. The sequence is arranged as the order of codeword, which is read by zig-zag, as shown in Figure 4a, then regard it as the puzzle.
Figure 4. Basic idea of puzzle.
Step 2. The rules of the puzzle: the solution of the puzzle is making it to be full of 1 (black), as shown in Figure 4a show, by choosing the position in the grids to change its state. If we choose the n t h position of the grids to change, then the neighbors of the n t h which means n 1 t h , n + 1 t h and itself would change the state of them, e.g., if the state of the n t h position is 0 then it would be change into 1, otherwise 1 would do so into 0. When the puzzle is full of 1, it has been solved with the rules. Then, we consider those grids we have chosen is the original secret.
For example: there is an unsolved puzzle, and the bit stream is “00101111”; to solve it, the 1 t h grid should be chosen, and the other grids are not selected. Then, mapping those grids which is chosen into 1, the others are 0. There will be an 8-bit stream and find out the original secret is “10000000”.
Step 3. Examine the collision: generate whole set and check the solutions of itself whether there are collisions of it. Firstly, produce two sets with all possibilities of the 8-bit stream: one is for the puzzle set and the other is the solution set. Then, apply Algorithm 2 described below:
Algorithm 2 Examine the collision
Produce two set, Setp and Sets and an empty set Setc for mapping
for i in each Setp:
        for j in each Sets:
                solve Setp(i) by applying Sets(j)
                candicate_answer = Sets(j)
                if (candicate_answer could be the solution of Setp(i))
                          solution_count++
        end for
        if solution_count < 1:
                  alert “no solution”
        else if solution_count > 1:
                  alert “collision”
        else put the candicate_answer into Setc(i)
end for
The result shows that there is only one solution for each puzzle, so it can be regarded as a one-to-one mapping encoding method.

Phase I. Encoding Phase:

Step 1. Generate B l o c k s n ( i ) by splitting every 8 bits of S h a r e n ,   i = 0 ,   1 , , l ,   n = 1 ,   2 where l = ( length   of   S h a r e 1 ) / 8 1 which would be same as S h a r e 2 .
Step 2. Produce P n , i = puzzle of B l o c k s n ( i ) by mapping each bit stream blocks, i = 0 ,   1 , , l ,   n = 1 ,   2
P n , i = S e t p ( index   of   B l o c k s n ( i )   i n   S e t c )
Step 3. Append each block value of P n , i into bit steam as B n where i = 0 ,   1 , , l ,   n = 1 ,   2
B n = ( P n , 1     P n , 2     P n , i )

Phase II. Concealment Phase:

Step 1. Calculate the length of B n then choose the best version and EC level for generating public QR code image Q R p u b l i c with public message P M .
Step 2. Replace the data codewords of Q R p u b l i c with bit stream B n which is in compliance with the codewords format of QR code.
  • Then, there would be two marked QR codes, Q R 1 and Q R 2 . Both of them could be scanned with a QR code decoder and only come up with public message of Q R p u b l i c instead of the camouflage bit stream B n .
  • Notice that if someone replaces the data codewords of a QR code, it will lead to massive errors of the QR code. Therefore, make sure that the numbers of error correction codes which belongs to Q R p u b l i c could work with the amount of those replaced data codewords; in other words, the marked QR code should still be able to be decoded by a common QR code decoder and bring out the public message.

3.2. Secret Retrieval Procedure

Firstly, scan the marked QR codes, then obtain the public messages and B n . Note that B n are separated from the data codeword blocks of Q R n by the QR code decoder.

3.2.1. Phase I. Puzzle Decoding Phase:

Step 1. Convert B n into P n , i by splitting with every 8 bits of it.
Step 2. Generate B l o c k s n ( i ) by mapping P n , i with S e t c
B l o c k s n ( i ) = S e t c ( index   of   P n , i   i n   S e t p )

3.2.2. Phase II. Secret Recovering Phase:

Step 1. Recover S h a r e n by appending B l o c k s n ( i )
S h a r e n = ( B l o c k s n ( 1 )     B l o c k s n ( 2 )     B l o c k s n ( i ) )
Step 2. Restore B by random grids algorithm.
B = S h a r e 1     S h a r e 2  
Step 3. Transform B with ASCII table and obtain S and D

3.2.3. Phase III. Cheater Identification:

Step1. Generate authentication bit stream value by hash the S .
V =   Hash ( S )
Step 2. Decrypt the digital signature D into V ¯ by applying RSA decrypting function.
For instance, the digital signature should be decoded as follows:
D e   m o d   ( p × q ) =   beca 06031 f 14907 b
Step 3. Compare V ¯ to V ; if V ¯ is different from V , that means the secret message S has been tampered with, and it is not the original secret message S . Then, S is not trustworthy, and should be discarded. If not, we can trust S is same as S .

4. Experimental Result

To evaluate the practical applicability of the proposed scheme, an application is developed with the open-source library, ZXing library [19] which is based on Java program language and used to generate and decode QR codes. According to the QR code standard, the 5-H version of QR code consists of 134 codewords. There would be 46 data codewords and 88 error correction codewords in the QR code. We choose the byte mode to generate QR code images in the proposed system. Then, Figure 5 shows the other example of the proposed scheme with version 10, and the error correction level is Q. Figure 5a,b show the public message of QR codes with “https://www.nchu.edu.tw/” (accessed date: 9 September 2021) and http://mis.nchu.edu.tw/ (accessed date: 28 September 2021), the website addresses to the homepages of National Chung Hsing University and Management Information System Department of National Chung Hsing University. Figure 5c,d are the marked QR codes. The result shows that the higher version of QR code may cause delay time as the camera of smart phone needs to focus on the QR code image when the size of itself is fixed.
Figure 5. Examples of the proposed scheme with version 10 and error correction level with Q. (a) Cover QR code 1. (b) Cover QR code 2. (c) Marked QR code of (a). (d) Marked QR code of (b).
The feature of meaningful QR codes could decrease the curiosity of common QR code users when scanning in public environment. Moreover, the designed scheme, which is puzzle-based and cheater preventing, could protect the secret message from a malicious attack of altering the QR code image. According to the cheater identification phase of the proposed scheme, the digital signature will be obviously different, as the technique can distinguish if even one bit from the real marked QR code is modified. In addition, the designed puzzle in the proposed scheme would be totally changed if there is a bit different from original bit stream of puzzle.
Table 2 illustrates the capacity of private data storage of the proposed scheme. The digital signature is composed of 32 bytes which is equal to at least 256 bits. The more bits of public and private keys chosen, the more bytes the digital signature would need. Additionally, the minimum secret message is one character; in other words, 1 byte of secret message is needed. Then, the digital signature appended after the minimal secret message will result in a 33-bytes camouflage message. Beside the least length calculation, the mechanism of error correction of the QR code is generated by the Reed Solomon Code algorithm [30], therefore, there should be two error correction codewords to recover one data codeword for the marked QR code.
Table 2. The capacity of secret storage of the marked QR code applied with proposed scheme, in different versions, and the error correction levels according to the QR code standard.
In a drastic situation, the 33 bytes of camouflage message with the minimum amount of data, there must be more than 66 error correction codewords on the QR code image. By calculating with the QR code standard, it can be found that version 5, with error correction level Q, could be in accordance with the minimum that the bytes of the least camouflaged message needs. The schemes mentioned in Section 2 will be discussed and compared to the proposed scheme. Table 3 shows the summary of feature comparison among them. To overcome the drawback brought from the Sudoku puzzle, a new puzzle-based scheme has been proposed in this paper. By applying the puzzle algorithm, the shadows can be protected in an efficient way, and there is no need to put additional information with it. In addition, the technique of a digital signature could not only verify the publisher, but also procure the purpose of authentication. Though it requires more bits than only utilizing the one-way hash function, it can protect the information with better security.
Table 3. Feature comparisons among the previous schemes and the proposed method.
Aside from providing an efficient encoding method, the marked QR code can resist many kinds of defects which may be caused by the transmission process. Table 4 shows that the marked QR code version 10, with error correction level Q, suffered from Gaussian noise by standard deviations of 10 to 100, and can still be scanned for data. Table 5 points out that the same mark QR code could still be decodable after Gaussian blur with different radii of pixels. Table 6 indicates that the marked QR code can perform well under JPEG compression with disparities of compression rates. Table 7 illustrates the fact that the marked QR code can still be scanned for information from different angles of rotation. Figure 6a shows the tempered marked QR code with different blocks alteration. Figure 6b indicates the tempered marked QR code with a large block modification. All could be decoded for a meaningful message.
Table 4. The results of the marked QR code of Figure 5d after Gaussian noise.
Table 5. The results of the marked QR code of Figure 5d after Gaussian blur.
Table 6. The results of the marked QR code of Figure 5c after JPEG compression.
Table 7. The results of the marked QR code of Figure 5d after different angles rotated.
Figure 6. Results of marked QR code after different blocks alteration.
The feature comparison among the proposed method and previous schemes is shown in Table 3. The proposed scheme can not only ensure the marked QR code remains meaningful, but can also accomplish cheater identification. Moreover, the proposed scheme can use a lower version of QR code, which means the size of QR code image could be smaller. The capacity of the proposed scheme can hold more data than the others, except Lin’s scheme. Though Lin’s scheme could hold more bits than ours, the ability of identifying cheater is varied down to nothing. Notice that in the data capacity of Huang’s scheme, the maximum is 9260 bits with careful calculation, and not 9260 guaranteed, which is pointed out in Huang et al.’s scheme.

5. Conclusions

This paper presents a new puzzle based QR code data embedding scheme to share the private information safely. To enhance the capacity for embedding private data, we propose a new breed of puzzle which is coordinate-free. Instead of a Sudoku puzzle, our proposed puzzle is utilized for encoding the shadows in an efficient way without any collisions. As a result, our proposal can offer the capability of cheater identification and feasibility of adjustable secret message. According to experimental results, we can see that our proposed puzzle-based encoding method has low computational complexity but still promises a certain extent of security when encoding. Concealing the shadows into the QR codes with the characteristic of error correction can keep the shares meaningful. For future work, we plan to design a new breed of puzzle to integrate the notion of homomorphic encryption, so that QR codes can represent one character with higher security, meaning retention, and cheater identification.

Author Contributions

Writing—original draft preparation, H.-L.C.; writing—review and editing, J.J.-C.Y.; supervision, H.-C.W.; project administration, C.-S.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Ministry of Science and Technology, R.O.C., grant number: MOST 109-2221-E-005 -057 -MY2.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to cybersecurity restrictions used in the study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Minaam, D.S.A.; Abdual-Kader, H.M.; Hadhoud, M.M. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. Int. J. Netw. Secur. 2010, 11, 78–87. [Google Scholar]
  2. Zhou, Y.; Hu, B.; Zhang, Y.; Cai, W. Implementation of Cryptographic Algorithm in Dynamic QR Code Payment System and Its Performance. IEEE Access 2021, 9, 122362–122372. [Google Scholar] [CrossRef]
  3. Wang, L.; Xu, L.; Zheng, Z.; Liu, S.; Li, X.; Cao, L.; Li, J.; Sun, C. Smart Contract-Based Agricultural Food Supply Chain Traceability. IEEE Access 2021, 9, 9296–9307. [Google Scholar] [CrossRef]
  4. Kharraz, A.; Kirda, E.; Robertson, W.; Balzarotti, D.; Francillon, A. Optical Delusions: A Study of Malicious QR Codes in the Wild. In Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, USA, 23–26 June 2014; pp. 192–203. [Google Scholar]
  5. Kieseberg, P.; Schrittwieser, S.; Leithner, M.; Mulazzani, M.; Weippl, E.; Munroe, L.; Sinha, M. Malicious Pixels Using QR Codes as Attack Vector. In Trustworthy Ubiquitous Computing; Atlantis Press: Paris, France, 2012; pp. 21–38. [Google Scholar]
  6. Vidas, T.; Owusu, E.; Wang, S.; Zeng, C.; Cranor, L.F.; Christin, N. QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks. In International Conference on Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2013; pp. 52–69. [Google Scholar]
  7. Ministry of Communications and Information [SG]. QR Code—Falling Prey to Malicious Websites. Available online: https://www.csa.gov.sg/gosafeonline/go-safe-for-me/homeinternetusers/qr-code-falling-prey-to-malicious-website (accessed on 10 August 2019).
  8. Maslennikov, D. Malicious QR Codes Pushing Android Malware. Kaspersky Securelist Blog. Available online: https://securelist.com/malicious-qr-codes-pushing-android-malware/31386 (accessed on 10 August 2019).
  9. Wang, J.-W.; Chen, W.-Y. Nested image steganography scheme using QR-barcode technique. Opt. Eng. 2009, 48, 57004. [Google Scholar] [CrossRef]
  10. Sun, M.; Si, J.; Zhang, S. Research on embedding and extracting methods for digital watermarks applied to QR code images. N. Z. J. Agric. Res. 2007, 50, 861–867. [Google Scholar] [CrossRef]
  11. Huang, P.-C.; Chang, C.-C.; Li, Y.-H. Sudoku-based secret sharing approach with cheater prevention using QR code. Multimedia Tools Appl. 2018, 77, 25275–25294. [Google Scholar] [CrossRef]
  12. Lin, P.-Y. Distributed Secret Sharing Approach with Cheater Prevention based on QR Code. IEEE Trans. Ind. Inform. 2016, 12, 384–392. [Google Scholar] [CrossRef]
  13. Chuang, J.C.; Hu, Y.C.; Ko, H.J. A novel secret sharing technique using QR code. Int. J. Image Process. 2010, 4, 468–475. [Google Scholar]
  14. Naor, M.; Shamir, A. Visual cryptography. In Workshop on the Theory and Application of of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1994; pp. 1–12. [Google Scholar]
  15. Huang, P.-C.; Chang, C.-C.; Li, Y.-H.; Liu, Y. Efficient QR Code Secret Embedding Mechanism Based on Hamming Code. IEEE Access 2020, 8, 86706–86714. [Google Scholar] [CrossRef]
  16. Alajmi, M.; Elashry, I.; El-Sayed, H.S.; Allah, O.S.F. Steganography of Encrypted Messages Inside Valid QR Codes. IEEE Access 2020, 8, 27861–27873. [Google Scholar] [CrossRef]
  17. Ali, A.M.; Farhan, A.K. Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document. IEEE Access 2020, 8, 27448–27458. [Google Scholar] [CrossRef]
  18. Denso-Wave Inc. QR Code Standardization. Available online: www.qrcode.com/en/about/standards.html (accessed on 10 August 2019).
  19. ZXing Organization. ZXing Project. Available online: https://github.com/zxing (accessed on 10 August 2019).
  20. Kafri, O.; Keren, E. Encryption of pictures and shapes by random grids. Opt. Lett. 1987, 12, 377–379. [Google Scholar] [CrossRef] [PubMed]
  21. Shyu, S.J. Image encryption by random grids. Pattern Recognit. 2007, 40, 1014–1031. [Google Scholar] [CrossRef]
  22. Chao, H.-C.; Fan, T.-Y. XOR-based progressive visual secret sharing using generalized random grids. Displays 2017, 49, 6–15. [Google Scholar] [CrossRef]
  23. Yan, X.; Wang, S.; El-Latif, A.A.A.; Niu, X. Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimedia Tools Appl. 2013, 74, 3231–3252. [Google Scholar] [CrossRef]
  24. Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  25. Diffie, W.; Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef] [Green Version]
  26. Bakhtiari, S. Cryptographic Hash Functions: A Survey; Technical Report 95–09; Department of Computer Science, University of Wollongong: Wollongong, NSW, Australia, 1995. [Google Scholar]
  27. Sheng, Y.; Xin, Z.; Alam, M.S.; Xi, L.; Xiao-Feng, L. Information hiding based on double random-phase encoding and pub-lic-key cryptography. Opt. Express 2009, 17, 3270–3284. [Google Scholar] [CrossRef] [PubMed]
  28. Shi Wei-Min Lab. The Process of Digital Signature, 14th ed.; Flag Technology: Taipei, Taiwan, 2015; pp. 13–15. [Google Scholar]
  29. MIT Laboratory for Computer Science and RSA Data Security, Inc. The MD5 Message-Digest Algorithm. Available online: https://tools.ietf.org/html/rfc1321 (accessed on 10 August 2019).
  30. Reed, I.S.; Solomon, G. Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 1960, 8, 300–304. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.