Abstract

The Visual Secret Sharing is the technique in which secret information is hidden in the form image which then divided into shares and these shares are used to decrypt the secret information. The number of shares required is given by the creator of the secret. Minimum those many shares are needed in order to decrypt the secret. If a single share is missing then the secret cannot be decrypted. The Quick Response (QR) code gives quick access to the information contained in it. QR code is 2D representation of the barcode which has capability to store information and can be easily read by machine. Due to easy access to the information stored in it, it is necessary to use some encryption or other protection to the data. Proposed approach to visual secret sharing scheme divides a secret QR code into different shares. In addition, the secret message is recovered by using XOR operation of the shares. This can effortlessly be achieved with the use of smartphones or different QR scanning gadgets. Using optimal partitioning methods the decryption of the message is made difficult to the hackers giving additional security to the data. The message accuracy can be checked by comparing the original message with shared message using hashing techniques. Because the QR code are small in size and has high data storage capacity, it is also resistant to damage so that is information is not lost even if some portion of the QR code is damaged it is best image to be used in visual secret sharing. The proposed approach reduces the risk of data transmission attacks.

Highlights

  • Visual Cryptographic System is the secret sharing scheme in which the secret is printed on different transparencies and by overlying those transparencies the secret is revealed and it can be done and very fast

  • In day by day life, Quick Response (QR) codes can be used in different scenarios like storing information, links to web pages, authentication and identification

  • The designed approach is to hide the secret into a tiny QR codes as the purpose of visual sharing schema

Read more

Summary

Introduction

Visual Cryptographic System is the secret sharing scheme in which the secret is printed on different transparencies and by overlying those transparencies the secret is revealed and it can be done and very fast. The number of transparencies required is specified earlier and if any of the required transparencies is missing the secret cannot be revealed [11]. In day by day life, QR codes can be used in different scenarios like storing information, links to web pages, authentication and identification. The QR code is easy to use computerized. Revised Manuscript Received on February 20, 2020. QR code has a large storage capacity, anti-damage property, strong, cheap and so on

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.