Browse > Article
http://dx.doi.org/10.3837/tiis.2019.10.018

Efficient secret sharing scheme with cheater identification based on QR code  

Huang, Peng-Cheng (Department of Computer Science and Technology, Xiamen University of Technology)
Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University)
Li, Yung-Hui (Department of Computer Science and Information Engineering, National Central University)
Liu, Yanjun (Department of Information Engineering and Computer Science, Feng Chia University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.10, 2019 , pp. 5144-5160 More about this Journal
Abstract
Secret sharing is an effective way of protecting secret messages. However, the traditional secret sharing schemes are considered meaningless due to malicious people attention which might raise risks. To overcome the weakness, this paper presents an effective secret sharing scheme with the functionality of cheater identification, based on meaningful QR code. The secret message will be split and concealed in the padding region of cover QR codes with the assistance of Latin square and it can be completely restored when all the involved participants cooperate. The concealing strategy exploits the characteristic of Reed-Solomon (RS) code to ensure the strong robustness of generated QR code pseudo-shares. The meaningful QR code pseudo-shares help to reduce the curious of unrelated persons. Some experiments were done to evaluate the performance of proposed scheme. The results showed that the proposed scheme is feasible, efficient and secure compared to the other existing schemes. It also achieves a higher secret payload and maintains stronger robustness.
Keywords
Secret sharing; cheater identification; QR code; Reed-Solomon code; Latin square;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C.-C. Chang, Y. Liu, and H.-L. Wu, “Distortion-Free Secret Image Sharing Method with Two Meaningful Shadows,” IET Image Processing, Vol. 10, No. 8, pp. 590-597, 2016.   DOI
2 K.-H. Lee, and P.-L. Chiu, “Digital Image Sharing by Diverse Image Media,” IEEE transactions on information forensics and security, Vol. 9, No. 1, pp. 88-98, 2014.   DOI
3 J.-C. Chuang, Y.-C. Hu, and H.-J. Ko, “A Novel Secret Sharing Technique Using QR Code,” International Journal of Image Processing (IJIP), Vol. 4, No. 5, pp. 468, 2010.
4 P.-Y. Lin, “Distributed Secret Sharing Approach with Cheater Prevention Based on QR Code,” IEEE Transactions on Industrial Informatics, Vol. 12, No. 1, pp. 384-392, 2016.   DOI
5 J. Fridrich, M. Goljan, and D. Soukal, “Wet Paper Codes with Improved Embedding Efficiency,” IEEE Transactions on Information Forensics and Security, Vol. 1, No. 1, pp. 102-110, 2006.   DOI
6 Y.-W. Chow, W. Susilo, J. Tonien, E. Vlahu-Gjorgievska, and G. Yang, “Cooperative Secret Sharing Using Qr Codes and Symmetric Keys,” Symmetry, Vol. 10, No. 4, pp. 95, 2018.   DOI
7 C.-W. He, P.-Y. Lin, and C.-Y. Lin, "Secret Sharing Application for Two-Dimensional Qr Barcode," in Proc. of 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), pp. 1-2, 2018.
8 P.-C. Huang, C.-C. Chang, and Y.-H. Li, "Sudoku-Based Secret Sharing Approach with Cheater Prevention Using QR Code," Multimedia Tools and Applications, vol. 77, no. 19, pp. 25275-25294, 2018.   DOI
9 R. Cox, "Qart Codes," 2012 [Online]. Available: http://research.swtch.com/qart, Dec. , 2017.
10 J.-y. Shao, “A Formula for the Number of Latin Squares,” Discrete mathematics, Vol. 110, No. 1-3, pp. 293-296, 1992.   DOI
11 N. Sloane, "A002860: Number of Latin Squares of Order N; or Labeled Quasigroups," On-Line Encyclopedia of Integer Sequences, 1964.
12 C.-C. Lee, H.-H. Chen, H.-T. Liu, G.-W. Chen, and C.-S. Tsai, “A New Visual Cryptography with Multi-Level Encoding,” Journal of Visual Languages & Computing, Vol. 25, No. 3, pp. 243-250, 2014.   DOI
13 D.-W. Inc., "QR Code Standardization," 2003 [Online]. Available: www.qrcode.com/en/about/standards.html, 24 Nov. , 2017.
14 A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.   DOI
15 G. R. Blakley, "Safeguarding Cryptographic Keys," in Proc. of the 1979 National Computer Conference, Vol. 48, pp. 313-317, Jun. 1979.
16 C. Asmuth, and J. Bloom, “A Modular Approach to Key Safeguarding,” IEEE transactions on information theory, Vol. 29, No. 2, pp. 208-210, 1983.   DOI
17 S. Zhai, F. Li, C.-C. Chang, and Q. Mao, “A Meaningful Scheme for Sharing Secret Images Using Mosaic Images,” IJ Network Security, Vol. 17, No. 5, pp. 643-649, 2015.
18 A. A. A. El-Latif, X. Yan, L. Li, N. Wang, J.-L. Peng, and X. Niu, "A New Meaningful Secret Sharing Scheme Based on Random Grids, Error Diffusion and Chaotic Encryption," Optics & Laser Technology, Vol. 54, pp. 389-400, 2013.   DOI
19 P.-Y. Lin, and C.-S. Chan, “Invertible Secret Image Sharing with Steganography,” Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010.   DOI
20 C.-C. Chang, Y.-H. Chen, and H.-C. Wang, “Meaningful Secret Sharing Technique with Authentication and Remedy Abilities,” Information Sciences, Vol. 181, No. 14, pp. 3073-3084, 2011.   DOI
21 D.-S. Tsai, G. Horng, T.-H. Chen, and Y.-T. Huang, “A Novel Secret Image Sharing Scheme for True-Color Images with Size Constraint,” Information Sciences, Vol. 179, No. 19, pp. 3247-3254, 2009.   DOI