Research article Special Issues

Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code

  • Received: 31 March 2019 Accepted: 11 June 2019 Published: 10 July 2019
  • In this paper, we propose a novel mechanism for QR code security anti-counterfeit based on the fusion of visual secret sharing (VSS) and QR code (called VSSQR scheme), which can greatly improve the security of QR code payment. Due to different application scenarios, the background security anti-counterfeit application and the prospects security anti-counterfeit application are shown for QR code payment authentication. The basic idea of the two applications can be characterized as follows. First, two QR code shares that contain the information of the merchant can be generated based on VSSQR scheme with an original secret image. Second, the secret image can be revealed by stacking two QR code shares to obtain the original information. Finally, whether the stacking result is the same as the original secret image or not can determine the authenticity of QR code share used for payment. The analyses show the security of our method. The applications are conducted to show the effectiveness and practicability.

    Citation: Song Wan, Guozheng Yang, Lanlan Qi, Longlong Li , Xuehu Yan, Yuliang Lu. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code[J]. Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318

    Related Papers:

  • In this paper, we propose a novel mechanism for QR code security anti-counterfeit based on the fusion of visual secret sharing (VSS) and QR code (called VSSQR scheme), which can greatly improve the security of QR code payment. Due to different application scenarios, the background security anti-counterfeit application and the prospects security anti-counterfeit application are shown for QR code payment authentication. The basic idea of the two applications can be characterized as follows. First, two QR code shares that contain the information of the merchant can be generated based on VSSQR scheme with an original secret image. Second, the secret image can be revealed by stacking two QR code shares to obtain the original information. Finally, whether the stacking result is the same as the original secret image or not can determine the authenticity of QR code share used for payment. The analyses show the security of our method. The applications are conducted to show the effectiveness and practicability.


    加载中


    [1] P. De, K. Dey, V. Mankar, et al., An assessment of qr code as a user interface enabler for mobile payment apps on smartphones, Proceedings of the 7th International Conference on HCI, 2015. Available from: https://dl.acm.org/citation.cfm?id=2835977.
    [2] E. H. Diniz, P. D. A. Jo£o and A. K. Cernev, Mobile money and payment: A literature review based on academic and practitioner - oriented publications (2001 - 2011), Soc. Sci. Electron. Publ., 2011.
    [3] D. A. Ortiz-Yepes, A review of technical approaches to realizing near-field communication mobile payments, IEEE Secur. Privacy, 14 (2016), 54–62.
    [4] S. Liu, Anti-counterfeit system based on mobile phone qr code and fingerprint, 2010 Second International Conference on Intelligent Human-Machine Systems and Cybernetics, 2010. Available from: https://ieeexplore.ieee.org/abstract/document/5590880.
    [5] P. Subpratatsavee and P. Kuacharoen, Internet banking transaction authentication using mobile one-time password and qr code, Adv. Sci. Lett., 21 (2015), 3189–3193.
    [6] P. Kieseberg, M. Leithner, M. Mulazzani, et al., Qr code security, Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, 2010. Available from: http://doi.acm.org/10.1145/1971519.1971593.
    [7] K. Krombholz, P. Frühwirt, P. Kieseberg, et al., QR code security: A survey of attacks and challenges for usable security, International Conference on Human Aspects of Information Security, Privacy, and Trust, 2014. Available from: https://link.springer.com/chapter/10.1007/978-3-319-07620-1 8.
    [8] M. Naor and A. Shamir, Visual cryptography, Lect. Notes Comput. Sci., 950 (1994), 1–12.
    [9] J. Weir and W. Q. Yan, A Comprehensive Study of Visual Cryptography, Springer Berlin Heidelberg, 2010.
    [10] C. N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognit. Lett., 25 (2004), 481–494.
    [11] Z. Wang, G. R. Arce and G. Di Crescenzo, Halftone visual cryptography via error diffusion, IEEE Trans. Inf. Forensics Secur., 4 (2009), 383–396.
    [12] D. Wang, L. Zhang, N. Ma, et al., Two secret sharing schemes based on boolean operations, Pattern Recognit., 40 (2007), 2776–2785.
    [13] A. Beimel, Secret-sharing schemes: A survey, International Conference on Coding and Cryptology, 2011. Available from: https://link.springer.com/chapter/10.1007/978-3-642-20901-7 2.
    [14] D. Wang, F. Yi and X. Li, On general construction for extended visual cryptography schemes, Pattern Recognit., 42 (2009), 3071–3082.
    [15] W. P. Fang, Offline qr code authorization based on visual cryptography, Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011. Available from: https://ieeexplore.ieee.org/abstract/document/6079541.
    [16] A. Espejel Trujillo, I. Castillo Camacho, M. Nakano Miyatake, et al., Identity document authentication based on VSS and QR codes, Proc. Technol., 3 (2012), 241–250.
    [17] M. Gayathri, A. J. Blesswin and G. S. Mary, An efficient qr-code authentication protocol using visual cryptography for securing ubiquitous multimedia communications, Indian J. Sci. Technol., 9 (2016).
    [18] N. Buckley, A. K. Nagar and S. Arumugam, Visual secret sharing between remote participants, Int. J. Comput. Appl., 103 (2014), 8–17.
    [19] S. Nseir, N. Hirzallah and M. Aqel, A secure mobile payment system using QR code, 2013 5th International Conference on Computer Science and Information Technology, 2013. Available from: https://ieeexplore.ieee.org/abstract/document/6588767.
    [20] C. N. Yang, J. K. Liao, F. H. Wu, et al., Developing visual cryptography for authentication on smartphones, International Conference on Industrial IoT Technologies and Applications, 2016. Available from: https://link.springer.com/chapter/10.1007/978-3-319-44350-8 19.
    [21] J. Lu, Z. Yang, L. Li, et al., Multiple schemes for mobile payment authentication using qr code and visual cryptography, Mobile Inf. Syst., 2017 (2017), 1–12.
    [22] X. Yan, Y. Lu, H. Huang, et al., Clarity Corresponding to Contrast in Visual Cryptography, International Conference of Pioneering Computer Scientists, Engineers and Educators, 2016. Available from: https://link.springer.com/chapter/10.1007/978-981-10-2053-7 23.
    [23] X. Yan, S. Wang, A. A. El-Latif, et al., Visual secret sharing based on random grids with abilities of and and xor lossless recovery, Multimedia Tools & Appl., 74 (2015), 3231–3252.
    [24] I. Jtc1/Sc, Information technology-automatic identification and data capture techniques-qr code 2005 bar code symbology specification, ISO/IEC, 18004 (2015).
    [25] X. Yan, S. Guan and X. Niu, Research on the capacity of error-correcting codes-based information hiding, Iihmsp'08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008. Available from: https://ieeexplore.ieee.org/abstract/document/4604249.
    [26] K. Saito and M. Morii, Efficient decoding of QR code using error correcting capability : Decoding method using erasure error correction and the ability, Tech. Rep. Ieice Isec, 111 (2011), 79–84.
    [27] S. Wan, Y. Lu, X. Yan, et al., Visual secret sharing scheme for (k, n) threshold based on qr code with multiple decryptions, J. Real-Time Image Process., 1–16.
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(6799) PDF downloads(898) Cited by(3)

Article outline

Figures and Tables

Figures(10)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog