QR Code Based Secret Sharing Approach in a Distributed Way
Abstract
QR barcodes are
mainly used for its security protection. There are more benefits in using QR
code. Users can gain reliability and high speed scanning solution. In our proposed
system we implemented secret QR approach to protect the data. The feature of
this algorithm is splitting the QR tags and pass through distribution method to
maintain the secrecy of the data under the code. The other end can retrieve the
data shared by grasping this secret tags with authorization. In our experiments
implementation, the proposed approach is feasible and provides content
readability, cheater detectability, and an adjustable secret payload of the QR
barcode. The main advantage of the system is the maintain of secret application with a password. The password will be split into 5 parts and
stored in a QR code. If someone is in need of data they should be aware of
credentials. The password can be getting by scanning those QR codes. The admin
will share the QR to the cloud. On the file requirement the user will send a
query to the admin the admin will send the file name to the user the user has
to use the file name and has to get the five qr codes which contains the key
and getting the key he or she has to form the password for the file and can
download the details.
Country : India
1 Ambadi Vijetha
Assistant Professor, Department of Computer Science And Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India
IRJIET, Volume 3, Issue 10, October 2019 pp. 51-55
Distributed Secret Sharing Approach
With Cheater Prevention Based on QR Code Pei-Yu Lin, Member, IEEE
J. C. Chuang, Y. C. Hu, and H. J. Ko,
“A novel secret sharing technique using QR code,” Int. J. Image Process., vol.
4, pp. 468– 475, 2010.
H. C. Huang, F. C. Chang, and W. C.
Fang, “Reversible data hiding with histogram-based difference expansion for QR
code applications,” IEEE Trans. Consum. Electron., vol. 57, no. 2, pp. 779–787,
May 2011.
S. Dey, K. Mondal, J. Nath, and A.
Nath, “Advanced steganography algorithm using randomized intermediate QR host
embedded with any encrypted secret message: ASA_QR algorithm,” Int. J. Mod.
Educ. Comput. Sci., vol. 6, pp. 59–67, 2012.
C. H. Chung, W. Y. Chen, and C. M.
Tu, “Image hidden technique using QR-Barcode,” in Proc. 5th Int. Conf. Intell.
Inf. Hiding Multimedia Signal Process, 2009, pp. 522–525.
W. Y. Chen and J. W. Wang, “Nested
image steganography scheme using QR-barcode technique.