[1]曹雪花,仲鑫玮,吉根林.基于扩展汉明码的二维码秘密分享方案[J].南京师大学报(自然科学版),2025,48(02):112-123138.[doi:10.3969/j.issn.1001-4616.2025.02.012]
 Cao Xuehua,Zhong Xinwei,Ji Genlin.Quick Response Code Secret Sharing Scheme Based on Extended Hamming Code[J].Journal of Nanjing Normal University(Natural Science Edition),2025,48(02):112-123138.[doi:10.3969/j.issn.1001-4616.2025.02.012]
点击复制

基于扩展汉明码的二维码秘密分享方案()

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

卷:
48
期数:
2025年02期
页码:
112-123138
栏目:
计算机科学与技术
出版日期:
2025-04-15

文章信息/Info

Title:
Quick Response Code Secret Sharing Scheme Based on Extended Hamming Code
文章编号:
1001-4616(2025)02-0112-12
作者:
曹雪花1仲鑫玮1吉根林2
(1.江阴职业技术学院计算机科学系,江苏 无锡 214405)
(2.南京师范大学计算机与电子信息学院,江苏 南京 210023)
Author(s):
Cao Xuehua1Zhong Xinwei1Ji Genlin2
(1.Department of Computer Science,Jiangyin Polytechnic College,Wuxi 214405,China)
(2.School of Computer and Electronic Information,Nanjing Normal University,Nanjing 210023,China)
关键词:
秘密分享二维码误码扩展汉明码纠错
Keywords:
secret sharingQuick Response Codebit errorsExtended Hamming Codeerror correction
分类号:
TP309.7
DOI:
10.3969/j.issn.1001-4616.2025.02.012
文献标志码:
A
摘要:
秘密分享作为隐私保护的重要手段,近来在云计算、物联网等领域迅猛发展. 二维码作为当下极为流行的信息载体,其使用频率远超传统图像,因此秘密分享技术在二维码上的应用前景广阔. 然而,由于二维码常以纸质形式呈现,容易遭受污渍沾染或破坏; 同时,隐写二维码在传输过程中可能遭到攻击者篡改. 这些情况必然导致隐写二维码中出现误码,而现有研究方案无力实现无损重构秘密信息. 鉴于此,本文提出一种基于扩展汉明码的二维码秘密分享方案. 该方案不但确保了载体的高嵌入容量,还实现了隐写二维码的可纠错性,能够准确检测并纠正隐写二维码中的误码,进而恢复秘密信息. 理论分析与实验充分证明了该方案的有效性和实用性.
Abstract:
Secret sharing,as a crucial method for privacy protection,has seen rapid development in fields such as cloud computing and the Internet of Things in recent years. As a very popular information cover at present,Quick Response Code(QR Code)is used far more frequently than traditional images,so the application of secret sharing in QR Code has highly promising. However,because the QR Code is often presented in paper form,it is easy to be stained or damaged; At the same time,stego-QR codes may be tampered by attackers during transmission. These issues will inevitably lead to bit errors in stego-QR code,and the existing research schemes are unable to recover the secret losslessly. To address this,this paper proposes a QR Code secret sharing scheme based on Extended Hamming Code. This scheme not only ensures high embedding capacity but also implements error correction capability of stego-QR Codes,which can accurately detect and correct bit errors in the stego-QR Code,and then recover the secret. Both theoretical analysis and experimental results demonstrate the effectiveness and practicality of this scheme.

参考文献/References:

[1]XIONG L,ZHONG X,YANG C. Transform domain-based invertible and lossless secret image sharing with authentication[J]. IEEE transactions on information forensics,2021,16:2912-2925.
[2]MASHHADI S,SAEEDI Z. A (t,n)-secret image sharing with steganography based on rook polynomial and LWE problem[J]. Multimedia tools and applications,2023,82(25):39077-39097.
[3]WU X,AN N,XU Z. Sharing multiple secrets in XOR-based visual cryptography by non-monotonic threshold property[J]. IEEE transactions on circuits and systems for video technology,2022,33(1):88-103.
[4]SHAMIR A. How to share a secret[J]. Communications of the ACM,1979,22(11):612-613.
[5]BLAKLEY G R. Safeguarding cryptographic keys[C]//Managing Requirements Knowledge,International Workshop On. New York,USA:IEEE Computer Society,1979:313.
[6]XIONG L,HAN X,ZHONG X,et al. RSIS:a secure and reliable secret image sharing system based on Extended Hamming Codes in industrial internet of things[J]. IEEE internet of things journal,2021,10(3):1933-1945.
[7]XIONG L,ZHONG X,XIONG N N,et al. QR-3S:a high payload QR code secret sharing system for industrial Internet of Things in 6G networks[J]. IEEE transactions on industrial informatics,2020,17(10):7213-7222.
[8]LI L L,HUANG P C,XIE R. QR Code secret sharing algorithm based on CRC[C]//2022 International Conference on Image Processing and Computer Vision. Okinawa,Japan:IEEE,2023:134-139.
[9]Information Technology:Automatic Identification and Data Capture Techniques:QR Code Bar Code Symbology Specification[M]. ISO/IEC 18004:2015. Geneva,Switzerland:ISO,2015.
[10]ZHANG L,SUN J,ZHANG X,et al. Two-level QR Code scheme based on region matrix image secret sharing algorithm[J]. Mathematical biosciences and engineering,2023,20(9):16678-16704.
[11]RAWAT A S,DESHMUKH M,SINGH M. QR shares based secret sharing scheme using DWT,random permutation and arithmetic modulo operation for QR secret[C]//2023 10th International Conference on Signal Processing and Integrated Networks. Noida,India:IEEE,2023:772-777.
[12]CHUANG J C,HU Y C,KO H J. A novel secret sharing technique using QR Code[J]. International journal of image processing,2010,4(5):468-475.
[13]CHOW Y W,SUSILO W,YANG G,et al. Exploiting the error correction mechanism in QR Codes for secret sharing[C]//Information Security and Privacy:21st Australasian Conference. Melbourne,VIC,Australia:Springer International Publishing,2016:409-425.
[14]CHENG Y,FU Z,YU B. Improved visual secret sharing scheme for QR Code applications[J]. IEEE transactions on information forensics and security,2018,13(9):2393-2403.
[15]LIN P Y. Distributed secret sharing approach with cheater prevention based on QR Code[J]. IEEE transactions on industrial informatics,2016,12(1):384-392.
[16]HUANG P C,CHANG C C,LI Y H. Sudoku-based secret sharing approach with cheater prevention using QR Code[J]. Multimedia tools and applications,2018,77:25275-25294.
[17]COX R. QArt codes[R/OL]. [2012-04-12]. http://research.swtch.com/qart.
[18]SAEIDI Z,YAZDI A,MASHHADI S,et al. High performance image steganography integrating IWT and Hamming Code within secret sharing[J]. IET image processing,2024,18(1):129-139.
[19]GOTTIMUKKALA A R,KUMAR N,DASH J K,et al. Image watermarking based on remainder value differencing and extended Hamming Code[J]. Journal of electronic imaging,2024,33(1):011003.
[20]MUNOZ-MEJIAS D,GONZALEZ-DIAZ I,DIAZ-DE-MARIA F. A low-complexity pre-processing system for restoring low-quality QR Code images[J]. IEEE transactions on consumer electronics,2011,57(3):1320-1328.

备注/Memo

备注/Memo:
收稿日期:2024-11-03.
基金项目:2024江苏省十四五规划重点课题“‘三融'视角下高职计算机专业赋能新质生产力的实施路径研究”(B-b/2024/02/28).
通讯作者:仲鑫玮,硕士,助教,研究方向:信息安全. E-mail:mxinm163@163.com
更新日期/Last Update: 2025-04-15