Error-induced inverse pixel visual cryptography for secure QR code communication
Abstract
The rapid proliferation of Quick Response (QR) codes in various applications, particularly in sensitive domains like banking and financial transactions, necessitates robust data protection measures. Visual cryptography techniques are used to encode confidential information into multiple shares called shadows, which are communicated to the receivers. The receiving side decodes the shadows by stacking them together physically or digitally. In this research, an innovative solution titled “Error-induced inverse pixel visual cryptography (EIIPVC) for secure QR code communication” is proposed to enhance the security. The proposed EIIPVC leverages complementary shadows and introduces controlled errors during the sharing process. This feature makes it exceedingly challenging for potential malpractice to access or tamper with the data, ensuring a higher level of security. In this research, a single grayscale secret source (GSS) image in the form of QR code is used. This research also contributes to improving traditional issues, such as the quality of the reconstructed image and pixel expansion. The experimental results demonstrate that the EIIPVC approach significantly ensures enhanced security, safeguarding the transmitted data against potential attacks. The quality of the reconstructed image is improved by minimizing the mean square error (MSE) value up to 5%, indicating its superiority in preserving the visual clarity.
Keywords
Full Text:
PDFReferences
1. John Blesswin A, Raj C, Sukumaran R, et al. Enhanced semantic visual secret sharing scheme for secure image communication. Multimedia Tools and Applications 2020; 79: 17057–17079. doi: 10.1007/s11042-019-7535-2
2. Tan L, Lu Y, Yan X, et al. XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multimedia Tools and Applications 2020; 79: 5719–5741. doi: 10.1007/s11042-019-08351-0
3. Chang CC, Chang YH, Lai JS. Enhanced QR code authentication using visual cryptography and watermarking techniques. International Journal of Pattern Recognition and Artificial Intelligence 2019; 33(9): 1950028.
4. Das A, Kundu S, Dey A. An enhanced security scheme for QR code using visual cryptography. Journal of Information Security and Applications 2020; 53: 102477.
5. Guo X, Xu H, Chen W, Wang J. A novel approach to QR code sharing based on visual cryptography. Multimedia Tools and Applications 2019; 78(11): 14671–14686.
6. Hsieh YH, Hwang MS. QR code authentication using visual cryptography and multiple watermarks. Multimedia Tools and Applications 2018; 77(15): 19759–19774.
7. Pan Y, Zhu X, Qi C. A novel reversible data hiding technique for QR code based on visual cryptography and histogram shifting. Multimedia Tools and Applications 2019; 78(3): 3133–3154.
8. Zhang X, Yang Y, Yang C, Zhao J. A privacy-preserving QR code authentication system based on visual cryptography and blockchain. Journal of Network and Computer Applications 2020; 160: 102523.
9. Ma Y, Chen Z, Zhou Y, Xie Y. A robust visual cryptography scheme for QR code based on double random-phase encoding and interference-free technique. Information Sciences 2019; 480: 78–94.
10. Yao Q, Li B. Enhanced reversible data hiding scheme for QR codes based on visual cryptography. Multimedia Tools and Applications 2019; 78(11): 14649–14670.
11. Liu X, Huang Q. Robust watermarking of QR codes based on visual cryptography. Digital Signal Processing 2019; 92: 190–198.
12. Selva Mary G, Kumar SM. A self-verifiable computational visual cryptographic protocol for secure two-dimensional image communication. Measurement Science and Technology 2019; 30(12): 125404. doi: 10.1088/1361-6501/ab2faa
13. Selva Mary G, Blesswin AJ, Kumar SM. Self-authentication model to prevent cheating issues in grayscale visual secret sharing schemes. Wireless Personal Communications 2022; 125: 1695–1714. doi: 10.1007/s11277-022-09628-8
14. Wu Y, Liu W, Jiang C, Xu X. A secure and robust QR code watermarking scheme based on complementary visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology 2021; 31(1): 46–58.
15. Selva Mary G, Manoj Kumar S. Secure grayscale image communication using significant visual cryptography scheme in real-time applications. Multimedia Tools and Applications 2020; 79: 10363–10382. doi: 10.1007/s11042-019-7202-7
16. John Blesswin A, Selva Mary G, Manoj Kumar S. Multiple secret image communication using visual cryptography. Wireless Personal Communications 2022; 122: 3085–3103. doi: 10.1007/s11277-021-09041-7
17. Cheng Y, Fu Z, Yu B. Improved visual secret sharing scheme for QR code applications. IEEE Transactions on Information Forensics and Security 2018;13(9): 2393–2403. doi: 10.1109/TIFS.2018.2819125
18. Zhao J, Yu W, Jiang H, Du J. An adaptive QR code watermarking scheme based on visual cryptography. Multimedia Tools and Applications 2020; 79(1–2): 1105–1122.
19. Fu Z, Cheng Y, Liu S, Yu B, A new two-level information protection scheme based on visual cryptography and QR code with multiple decryptions. Measurement 2019; 141: 267–276. doi: 10.1016/j.measurement.2019.03.080
20. Li-na Z, Chen-yu C, Xiao-yu Z, Wei W. Adaptive visual cryptography scheme design based on QR codes. Mathematical Biosciences and Engineering 2022; 19(12): 12160–12179. doi: 10.3934/mbe.2022566
21. Blesswin AJ, Visalakshi P. Secret sharing approach on electrocardiography with heart tone images using visual cryptography for secure healthcare communications. Journal of Pure and Applied Microbiology 2015; 9: 665–672.
22. Fu Z, Cheng Y, Yu B. Perfect recovery of XOR-based visual cryptography scheme. Multimedia Tools and Applications 2019; 78: 2367–2384. doi: 10.1007/s11042-018-6364-z
23. Wan S, Qi L, Yang G. Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes. Multimedia Tools and Applications 2020; 79: 2789–2811. doi: 10.1007/s11042-019-08246-0
24. Blesswin AJ, Mary GS. Optimal grayscale visual cryptography using error diffusion to secure image communication. International Journal of Control Theory Applications 2015; 8(4): 1511–1519.
25. John Blesswin A, Selva Mary G, Suryawanshi S, et al. Secure transmission of grayscale images with triggered error visual sharing. Journal of Autonomous Intelligence 2023; 6(2): 957. doi: 10.32629/jai.v6i2.957
DOI: https://doi.org/10.32629/jai.v7i1.1129
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 John Blesswin, Selva Mary, T. Gobinath, Maheshwari Divate, Catherine Esther Karunya A., Alfiya Abid Shahbad, Deepak Patil, Shibani Raju S.
License URL: https://creativecommons.org/licenses/by-nc/4.0/