Secured Picode: Using Visual Cryptography

Tharani. R, JCT College of Engineering and Technology, Coimbatore, Tamil Nadu; Manjusha P M ,JCT College of Engineering and Technology, Coimbatore, Tamil Nadu; Silpa S ,JCT College of Engineering and Technology, Coimbatore, Tamil Nadu; Athira. S. Nair ,JCT College of Engineering and Technology, Coimbatore, Tamil Nadu

QR Code, 2Dbarcode, Picode, Datamatrixcode, Visual Cryptography, Security, Distortion, Perceptual Quality, Fixed Pattern, Secret

In this paper, we propose a new technology which combines the visual cryptography with a picture embedding pictode for the security of information. Hence the paper combines both the advantages of the modified visual cryptography and improved picture embedded 2D barcode. Actually, there are two methods used to introduce confidentiality and security when visual data are transmitted through unsecured channels: data hiding and visual cryptography. Data hiding usually tries to embed data in digital media and transmit it in an imperceptible way so that the confidential messages is send securely and with visual cryptography the original input is shared between a set of participants by a secret image holder. Visual cryptography is a method of protecting the image-based secrets that has a computation free decoding process. The scheme provides an efficient way to hide the natural image among different shares. The two-dimensional barcodes have been widely used as an interface to connect potential customers and advertisement contents. However, the appearance of a conventional 2D barcode pattern is often too obtrusive for integrating into an aesthetically designed advertisement.
    [1] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT’ 94, Berlin, Germany, 1995, vol. 950, pp. 1–12, Springer-Verlag, LNCS [2] Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, “Novel Authentication System Using Visual Cryptography”, in 2011 World Congress on Information and Communication Technologies. [3] F. Liu1, C.K. Wu X.J. Lin , “Colour Visual Cryptography Schemes”, IET Information Security,vol. 2, No. 4, pp 151-165, 2008. [4] Y. C. Hou, “Visual cryptography for color images,” Pattern Recognition, vol. 36, pp. 1619-1629, 2003. [5] Siddharth Malik, Anjali Sardana, Jaya “A Keyless Approach to Image Encryption”, 2012 International Conference on Communication Systemsand Network Technologies [6] L. W. Hawkes, A. Yasinsac and C. Cline, "An Application of Visual Cryptography to Financial Documents," Technical report TR001001, Florida State University, 2000. [7] George Abboud, Jeffrey Marean, Roman V. Yampolskiy, “Steganography and Visual Cryptography in Computer Forensics”, in 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering [8] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979. [9] H.-C. Wu, C.-C. Chang, “Sharing Visual Multi-Secrets Using Circle Shares”, Comput. Stand. Interfaces 134 (28) ,pp. 123–135, (2005). [10] Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin , “Sharing A Secret Two-Tone Image In Two Gray-Level Images”, Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05), 2005. [11] Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei, “Multiple-Image Encryption By Rotating Random Grids”, Eighth International Conference on Intelligent Systems Design and Applications, pp. 252-256 , 2008. [12] C. Chen and W. H. Mow, “Poster: A Coarse-fine Corner Detection Approach for Two-dimensional Barcode Decoding,” in Proceedings of the International Conference on Mobile Computing and Networking, ser. MobiCom ’14, 2014, pp. 351–354. [13] E. Ohbuchi, H. Hanaizumi, and L. Hock, “Barcode readers using the camera device in mobile phones,” in International Conference on Cyberworlds, Nov 2004, pp. 260–265. [14] J. McCune, A. Perrig, and M. Reiter, “Seeing-is-believing: using camera phones for human-verifiable authentication,” in IEEE Symposium on Security and Privacy, May 2005, pp. 110–124. [15] T.-Y. Liu, T.-H. Tan, and Y.-L. Chu, “2D Barcode and Augmented Reality Supported English Learning System,” in International Conferenceon Computer and Information Science, July 2007, pp. 5–10. [16] J. Gao, L. Prakash, and R. Jagatesan, “Understanding 2D-BarCode Technology and Applications in M-Commerce - Design and Implementation of A 2D Barcode Processing Solution,” in International Computer Software and Applications Conference, vol. 2, July 2007, pp. 49–56. [17] “Information technology – Automatic identification and data capture techniques – QR Code 2005 bar code symbology specification,” ISO/IEC 16022. [18] “O2O Startup Visualead Secures Investment from Alibaba Group,” Available at http://press.visualead.com/en/89/28/. [19] H. Kato, K. Tan, and D. Chai, Barcodes for Mobile Devices. Cambridge University Press, 2010. [20] H. Kato and K. Tan, “2D barcodes for mobile phones,” in International Conference on Mobile Technology, Applications and Systems, Nov 2005,
Paper ID: GRDCF007035
Published in: Conference : National Conference on Emerging Trends in Electrical, Electronics and Computer Engineering (ETEEC - 2018)
Page(s): 191 - 196