4.7 Article

A QR code-based user-friendly visual cryptography scheme

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Visual cryptography scheme for secret color images with color QR codes

Jeng-Shyang Pan et al.

Summary: This paper proposes two new visual cryptography schemes to solve the problems of incomplete restoration of secret color images and generating meaningful shares. The first scheme generates meaningless shares, while the second scheme generates n-1 meaningful shares and one meaningless share, with some shares being transformed into color QR codes.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2022)

Article Engineering, Electrical & Electronic

A Novel Raster Map Exchange Scheme Based on Visual Cryptography

Lijing Ren

Summary: The study proposes a novel extended visual cryptography scheme to securely store a raster map into two meaningful halftone maps, avoiding the vulnerabilities associated with traditional visual cryptography schemes. By applying halftone and color decomposition methods, encoding secret map block by block, and optimizing the selection of encrypted blocks, the scheme achieves high-quality secret recovery from generated shares. The proposed scheme significantly improves the performance of recovered raster maps compared to previous work.

ADVANCES IN MULTIMEDIA (2021)

Article Computer Science, Information Systems

HP-VCS: A high-quality and printer-friendly visual cryptography scheme*

Denghui Zhang et al.

Summary: Visual Cryptography Scheme is a method of encrypting secret messages into multiple shares and transmitting them to participants over untrusted communication channels. This paper introduces a high-quality and printer-friendly VCS that maintains the same size as the secret image, significantly improving the performance of recovered images compared to previous methods.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2021)

Article Engineering, Multidisciplinary

Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention

Lina Zhang et al.

Summary: This study focuses on the problem of share cheating in traditional Secret Image Sharing (SIS) schemes, proposing two authentication code generation schemes based on XOR operations and hash algorithms to prevent cheating. Experimental results demonstrate the feasibility and effectiveness of these schemes, which are applicable to different environments and devices.

MATHEMATICAL PROBLEMS IN ENGINEERING (2021)

Proceedings Paper Automation & Control Systems

Beautified QR Code with Security Based on Data Hiding

Huili Cai et al.

ADVANCES IN COMPUTATIONAL INTELLIGENCE SYSTEMS (UKCI 2019) (2020)

Review Radiology, Nuclear Medicine & Medical Imaging

Cybersecurity in PACS and Medical Imaging: an Overview

Marco Eichelberg et al.

JOURNAL OF DIGITAL IMAGING (2020)

Article Engineering, Multidisciplinary

A self-verifiable computational visual cryptographic protocol for secure two-dimensional image communication

G. Selva Mary et al.

MEASUREMENT SCIENCE AND TECHNOLOGY (2019)

Article Computer Science, Information Systems

A new two-level QR code with visual cryptography scheme

Yuqiao Cheng et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions

Song Wan et al.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2018)

Article Computer Science, Theory & Methods

Improved Visual Secret Sharing Scheme for QR Code Applications

Yuqiao Cheng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Robust Visual Secret Sharing Scheme Applying to QR Code

Longdan Tan et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Proceedings Paper Computer Science, Theory & Methods

A Survey on the New Development of Medical Image Security Algorithms

Yun Tan et al.

CLOUD COMPUTING AND SECURITY, PT III (2018)

Article Computer Science, Information Systems

An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information

Ta Minh Thanh et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

Jie Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Software Engineering

Halftone QR Codes

Hung-Kuo Chu et al.

ACM TRANSACTIONS ON GRAPHICS (2013)