Home   >   CSC-OpenAccess Library   >    Manuscript Information
A Novel Secret Sharing Technique Using QR Code
Jun-Chou Chuang, Yu-Chen Hu, Hsien-Ju Ko
Pages - 468 - 475     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4   Issue - 5    |    Publication Date - December 2010  Table of Contents
Barcode, Secret Sharing, QR code
Any mobile device with capture function can read content from a barcode tag directly. When a barcode contains important data or privacy information, the risk of security becomes an important problem. In this paper, the QR code is employed to design the secret sharing mechanism so that the data privacy during data transmission can be enhanced. The secret data is divided into some shadows by the secret sharing mechanism and the results are embedded into barcode tags. The secret can be recovered only when the number of shadows is greater than or equal to the predefined threshold. In sum, the proposed technique improves data security for data transmission.
CITED BY (34)  
1 Norhikmah, N., Safitri, A. R., & Sholikhan, L. A. (2016). Penggunaan qr code dalam presensi berbasis android. semnasteknomedia online, 4(1), 4-7.
2 Verma, S., Wakode, J. S., & Kannurkar, P. S. Two Level Two Dimensional Wavelet Transform Based QR Code Watermarking Algorithm.
3 Sen, A., & Jou, Y. (2015). Secure Data Transmission Technique for iPhone using Quick Response (QR) Code.
4 Reddy, V. L., & Kumar, S. N. R. (2015). Novel QR Code Image Watermarking using Wavelet Transform. International Journal of Computer Applications, 123(17).
5 Shakil, M., Durbakula, K., Spoorti, K., & Jose, M. (2015). Yencode–its application in dentistry. Journal of Mobile Technology in Medicine, 4(2), 48-50.
6 Dube, S., Ndlovu, S., Nyathi, T., & Sibanda, K. QR Code Based Patient Medical Health Records Transmission: Zimbabwean Case.
7 Devisree, G. S., & Praveen, K. (2015). Secretly Shared QR Code and Its Applications. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 473-480). Springer India.
8 Meruga, J. M., Fountain, C., Kellar, J., Crawford, G., Baride, A., May, P. S., ... & Hoover, R. (2015). Multi-layered covert QR codes for increased capacity and security. International Journal of Computers and Applications, 37(1), 17-27.
9 Moidin Shakil, M. D. S. yencode áits application in dentistry.
10 JABEZ, T., & Srinivasarao, j. optimized qr code watermarking scheme for copyright protection based on discrete wavelet transform.
11 Ranjthkumar, t., & sathyaprabha, g. optimized dwt based watermarking approach for qr code in digital media.
12 Xu Jie, Jin Guoqing, Liu Yan '& l. (2015). Design and implementation of Internet QR code image monitoring system. Information Network Security, (6), 13-18.
13 Pramudyo, A. S. Knsi2014-284 penggunaan qr code untuk mempermudah sensus barang di kota cilegon.
14 Lestari, R. F. (2014). Pengembangan aplikasi qr code generator dan qr code reader dari data berbentuk gambar menggunakan teknik kompresi dengan algoritma lzw (Doctoral dissertation, University of Muhammadiyah Malang).
15 Sanz-Valero, J., Álvarez Sabucedo, L. M., Wanden-Berghe, C., & Santos Gago, J. M. (2014). QR codes: Outlook for food science and nutrition. Critical reviews in food science and nutrition, (just-accepted), 00-00.
16 Wu, A., Iqbal, Z., & Federici, J. (2014). U.S. Patent Application No. 14/471,463.
17 REDDY, J. C. qr code watermarking technique using wavelet transform in digital media.
18 Durga, A. V., & Srividya, S. A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation.
19 Xu, R., Lazaros, E. J., & Londt, S. C. (2014). Study of Factors Affecting Readability of Printed QR Codes. Refereed Articles, 19.
20 Shakil, M., Karteek, D., Spoorti, K., & Jose, M. (2014). Quick response code in Oral and Maxillofacial Radiology. Journal of Oral and Maxillofacial Radiology, 2(3), 95.
21 Wu, A., Gu, Y., Beck, C., Iqbal, Z., & Federici, J. F. (2014). Reversible chromatic sensor fabricated by inkjet printing TCDA-ZnO on a paper substrate. Sensors and Actuators B: Chemical, 193, 10-18.
22 Lin, P. Y., Chen, Y. H., Lu, E. J. L., & Chen, P. J. (2013, December). Secret hiding mechanism using QR barcode. In Signal-Image Technology & Internet-Based Systems (SITIS), 2013 International Conference on (pp. 22-25). IEEE.
23 Quigley, M., & Burke, M. (2013). Low-cost Internet of Things digital technology adoption in SMEs. International Journal of Management Practice, 6(2), 153-164.
24 Chu, L. C., Lee, C. L., & Wu, C. J. (2013). QR Code Application for Special Medical Material Management. Advances in Information Sciences and Service Sciences, 5(4), 103.
25 Chiang, Y. J., Lin, P. Y., Wang, R. Z., & Chen, Y. H. (2013). Blind QR Code Steganographic Approach Based upon Error Correction Capability. KSII Transactions on Internet & Information Systems, 7(10).
26 Zhou Qing Huang Zhi party. (2013). QR code encryption algorithm based on Ising model. Journal of Computer Applications, 33 (10), 2861-2864.
27 Wane, A. R., Jamankar, S. P., & Chandure, O. V. (2013). An Effective mechanism for Ensuring Security of QR Code. International Journal of Advanced Research in Computer Science, 4(6).
28 Santos, R., Reis, B., Teixeira, J. M., & Kelner, J. (2013, May). Dynamic QR Codes for Augmented Reality. In Virtual and Augmented Reality (SVR), 2013 XV Symposium on (pp. 191-199). IEEE.
29 Narayanan, A. S. (2012). QR codes and security solutions. International Journal of Computer Science and Telecommunications, 3(7), 69-71.
30 Pintor Maestre, D. (2012). QRP: An improved secure authentication method using QR codes.
31 Emek, M. (2012). Usage of QR code in tourism industry.
32 Lane, J., Sen, S., Alexandrov, A., Ranganathan, S., Brooks, J. R., & Madupu, V. (2012). Quick Response Code: A Review of its Applications and Factors Inhibiting its Adoption. LEaDinG THE Way, 159.
33 Sihombing, P., & Budiman, A. (2011). Analisis Dan Perancangan Kode Matriks Dua Dimensi Quick Response (QR) Code.
34 Gimmihwa, Choi, & Park, Young - Tack. (2011). Rules of the smartphone environment for providing information in accordance with differential rights based context modeling. Korea Society of Computer and Information Science Society Korea 2011 General Conference Article 38 No. 1 (A), 38 (1A), 131-134.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Socol@r  
5 Scribd 
6 SlideShare 
8 PdfSR 
A. Shamir, “How to Share a Secret”. Communication of the ACM, 22(11): 612-613, 1979.
B. Lingyan, F. Zewei, L. Min, and W. Weining, “Design and implementation of the airline luggage inspection system base on link structure of QR code”. In Proceedings of the Electronic Commerce and Security, Guangzhou, 2008.
Denso-wave, http://www.denso-wave.com/qrcode/index-e.html.
G. Starnberger, L. Froihofer, and K. M. Goeschka, “QR-TAN: Secure mobile transaction authentication”. In Proceedings of the Availability, Reliability and Security, Fukuoka, Japan, 2009.
H. S. Al-Khalifa, “Mobile SRS: a classroom communication and assessment service”. In Proceedings of the Innovations in Information Technology, United Arab Emirates, 2008.
ISO/IEC18004, “Information technology-automatic identification and data capture techniques”. Bar Code Symbology - QR Code.
J. Rouillard, “Contextual QR codes”. In Proceedings of the 3rd International Multi-Conference on Computing in the Global Information Technology, Athens, Greece, 2008.
J. Z. Gao, L. Prakash, and R. Jagatesan, “Understanding 2D-barcode technology and applications in m-commerce – design and implementation of a 2D barcode processing solution”. In Proceedings of the Computer Software and Applications Conference, Bejing, China, 2007.
N. Fujimura and M. Doi, “Collecting students’ degree of comprehension with mobile phones”. In Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services, Canada, 2006.
S. Reiser and R. Bruce, “Service learning meets mobile computing”. In Proceedings of the Annual Southeast Regional Conference, Auburn, Alabama, 2008.
T. Bouchard, M. Hemon, F. Gagnon, V. Gravel, and O. Munger, “Mobile telephones used as boarding passes: Enabling Technologies and Experimental Results”. In Proceedings of the 4th Autonomic and Autonomous Systems, Gosier, Guadeloupe, 2008.
T. Chen, “The application of bar code forgery - proof technology in the product sales management”. In Proceedings of the Intelligent Information Technology Application Workshops, Washington, DC, USA, 2008.
T. Falas and H. Kashani, “Two-dimensional barcode decoding with camera-equipped mobile phones”. In Proceedings of the Pervasive Computing and Communications Workshops, White Plains, NY, USA, 2007.
T. Kamina, T. Aoki, Y. Eto, N. Koshizuka, J. Yamada, and K. Sakamura, “Verifying identifierauthenticity in ubiquitous computing environment”. In Proceedings of the Advanced Information Networking and Applications Workshops, Ontario, Canada, 2007.
T. Y. Liu and Y. L. Chu “Handheld augmented reality supported immersive ubiquitous learning system”. In Proceedings of the Systems, Man and Cybernetics, Singapore, 2008.
U. B. Ceipidor, C. M. Medaglia, and A. Perrone, M. D. Marsico, and G. D. Romano, “A museum mobile game for children using QR-codes”. In Proceedings of the 8th International Conference on Interaction Design and Children, Italy, 2009.
Y. J. Chang, S. K. Tsai, and T. Y. Wang, “A context aware handheld wayfinding system for individuals with cognitive impairments”. In Proceedings of the 10th international ACM SIGACCESS conference on Computers and accessibility, Halifax, Nova Scotia, Canada, 2008.
Y. L. Yeh, J. C. You, and G. J. Jong, “The 2D bar-code technology applications in medical information management”. In Proceedings of the Intelligent Systems Design and Applications, Kaohsiung, Taiwan, 2008.
Dr. Jun-Chou Chuang
- Taiwan
Professor Yu-Chen Hu
Providence University - Taiwan
Dr. Hsien-Ju Ko
- Taiwan