Efficient secret sharing scheme with cheater identification based on QR code |
Huang, Peng-Cheng
(Department of Computer Science and Technology, Xiamen University of Technology)
Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University) Li, Yung-Hui (Department of Computer Science and Information Engineering, National Central University) Liu, Yanjun (Department of Information Engineering and Computer Science, Feng Chia University) |
1 | C.-C. Chang, Y. Liu, and H.-L. Wu, “Distortion-Free Secret Image Sharing Method with Two Meaningful Shadows,” IET Image Processing, Vol. 10, No. 8, pp. 590-597, 2016. DOI |
2 | K.-H. Lee, and P.-L. Chiu, “Digital Image Sharing by Diverse Image Media,” IEEE transactions on information forensics and security, Vol. 9, No. 1, pp. 88-98, 2014. DOI |
3 | J.-C. Chuang, Y.-C. Hu, and H.-J. Ko, “A Novel Secret Sharing Technique Using QR Code,” International Journal of Image Processing (IJIP), Vol. 4, No. 5, pp. 468, 2010. |
4 | P.-Y. Lin, “Distributed Secret Sharing Approach with Cheater Prevention Based on QR Code,” IEEE Transactions on Industrial Informatics, Vol. 12, No. 1, pp. 384-392, 2016. DOI |
5 | J. Fridrich, M. Goljan, and D. Soukal, “Wet Paper Codes with Improved Embedding Efficiency,” IEEE Transactions on Information Forensics and Security, Vol. 1, No. 1, pp. 102-110, 2006. DOI |
6 | Y.-W. Chow, W. Susilo, J. Tonien, E. Vlahu-Gjorgievska, and G. Yang, “Cooperative Secret Sharing Using Qr Codes and Symmetric Keys,” Symmetry, Vol. 10, No. 4, pp. 95, 2018. DOI |
7 | C.-W. He, P.-Y. Lin, and C.-Y. Lin, "Secret Sharing Application for Two-Dimensional Qr Barcode," in Proc. of 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), pp. 1-2, 2018. |
8 | P.-C. Huang, C.-C. Chang, and Y.-H. Li, "Sudoku-Based Secret Sharing Approach with Cheater Prevention Using QR Code," Multimedia Tools and Applications, vol. 77, no. 19, pp. 25275-25294, 2018. DOI |
9 | R. Cox, "Qart Codes," 2012 [Online]. Available: http://research.swtch.com/qart, Dec. , 2017. |
10 | J.-y. Shao, “A Formula for the Number of Latin Squares,” Discrete mathematics, Vol. 110, No. 1-3, pp. 293-296, 1992. DOI |
11 | N. Sloane, "A002860: Number of Latin Squares of Order N; or Labeled Quasigroups," On-Line Encyclopedia of Integer Sequences, 1964. |
12 | C.-C. Lee, H.-H. Chen, H.-T. Liu, G.-W. Chen, and C.-S. Tsai, “A New Visual Cryptography with Multi-Level Encoding,” Journal of Visual Languages & Computing, Vol. 25, No. 3, pp. 243-250, 2014. DOI |
13 | D.-W. Inc., "QR Code Standardization," 2003 [Online]. Available: www.qrcode.com/en/about/standards.html, 24 Nov. , 2017. |
14 | A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979. DOI |
15 | G. R. Blakley, "Safeguarding Cryptographic Keys," in Proc. of the 1979 National Computer Conference, Vol. 48, pp. 313-317, Jun. 1979. |
16 | C. Asmuth, and J. Bloom, “A Modular Approach to Key Safeguarding,” IEEE transactions on information theory, Vol. 29, No. 2, pp. 208-210, 1983. DOI |
17 | S. Zhai, F. Li, C.-C. Chang, and Q. Mao, “A Meaningful Scheme for Sharing Secret Images Using Mosaic Images,” IJ Network Security, Vol. 17, No. 5, pp. 643-649, 2015. |
18 | A. A. A. El-Latif, X. Yan, L. Li, N. Wang, J.-L. Peng, and X. Niu, "A New Meaningful Secret Sharing Scheme Based on Random Grids, Error Diffusion and Chaotic Encryption," Optics & Laser Technology, Vol. 54, pp. 389-400, 2013. DOI |
19 | P.-Y. Lin, and C.-S. Chan, “Invertible Secret Image Sharing with Steganography,” Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010. DOI |
20 | C.-C. Chang, Y.-H. Chen, and H.-C. Wang, “Meaningful Secret Sharing Technique with Authentication and Remedy Abilities,” Information Sciences, Vol. 181, No. 14, pp. 3073-3084, 2011. DOI |
21 | D.-S. Tsai, G. Horng, T.-H. Chen, and Y.-T. Huang, “A Novel Secret Image Sharing Scheme for True-Color Images with Size Constraint,” Information Sciences, Vol. 179, No. 19, pp. 3247-3254, 2009. DOI |