-
Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318.
Research article Special Issues
-
Export file:
Format
- RIS(for EndNote,Reference Manager,ProCite)
- BibTex
- Text
Content
- Citation Only
- Citation and Abstract
Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code
National University of Defense Technology, No.460 Huangshan Road, 230037, Hefei, China
Received: , Accepted: , Published:
Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication
Keywords: QR code payment; visual cryptography application; QR code; anti-counterfeit; security
Citation: Song Wan, Guozheng Yang, Lanlan Qi, Longlong Li , Xuehu Yan, Yuliang Lu. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318
References:
- 1. P. De, K. Dey, V. Mankar, et al., An assessment of qr code as a user interface enabler for mobile payment apps on smartphones, Proceedings of the 7th International Conference on HCI, 2015. Available from: https://dl.acm.org/citation.cfm?id=2835977.
- 2. E. H. Diniz, P. D. A. Jo£o and A. K. Cernev, Mobile money and payment: A literature review based on academic and practitioner - oriented publications (2001 - 2011), Soc. Sci. Electron. Publ., 2011.
- 3. D. A. Ortiz-Yepes, A review of technical approaches to realizing near-field communication mobile payments, IEEE Secur. Privacy, 14 (2016), 54–62.
- 4. S. Liu, Anti-counterfeit system based on mobile phone qr code and fingerprint, 2010 Second International Conference on Intelligent Human-Machine Systems and Cybernetics, 2010. Available from: https://ieeexplore.ieee.org/abstract/document/5590880.
- 5. P. Subpratatsavee and P. Kuacharoen, Internet banking transaction authentication using mobile one-time password and qr code, Adv. Sci. Lett., 21 (2015), 3189–3193.
- 6. P. Kieseberg, M. Leithner, M. Mulazzani, et al., Qr code security, Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, 2010. Available from: http://doi.acm.org/10.1145/1971519.1971593.
- 7. K. Krombholz, P. Frühwirt, P. Kieseberg, et al., QR code security: A survey of attacks and challenges for usable security, International Conference on Human Aspects of Information Security, Privacy, and Trust, 2014. Available from: https://link.springer.com/chapter/10.1007/978-3-319-07620-1 8.
- 8. M. Naor and A. Shamir, Visual cryptography, Lect. Notes Comput. Sci., 950 (1994), 1–12.
- 9. J. Weir and W. Q. Yan, A Comprehensive Study of Visual Cryptography, Springer Berlin Heidelberg, 2010.
- 10. C. N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognit. Lett., 25 (2004), 481–494.
- 11. Z. Wang, G. R. Arce and G. Di Crescenzo, Halftone visual cryptography via error diffusion, IEEE Trans. Inf. Forensics Secur., 4 (2009), 383–396.
- 12. D. Wang, L. Zhang, N. Ma, et al., Two secret sharing schemes based on boolean operations, Pattern Recognit., 40 (2007), 2776–2785.
- 13. A. Beimel, Secret-sharing schemes: A survey, International Conference on Coding and Cryptology, 2011. Available from: https://link.springer.com/chapter/10.1007/978-3-642-20901-7 2.
- 14. D. Wang, F. Yi and X. Li, On general construction for extended visual cryptography schemes, Pattern Recognit., 42 (2009), 3071–3082.
- 15. W. P. Fang, Offline qr code authorization based on visual cryptography, Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011. Available from: https://ieeexplore.ieee.org/abstract/document/6079541.
- 16. A. Espejel Trujillo, I. Castillo Camacho, M. Nakano Miyatake, et al., Identity document authentication based on VSS and QR codes, Proc. Technol., 3 (2012), 241–250.
- 17. M. Gayathri, A. J. Blesswin and G. S. Mary, An efficient qr-code authentication protocol using visual cryptography for securing ubiquitous multimedia communications, Indian J. Sci. Technol., 9 (2016).
- 18. N. Buckley, A. K. Nagar and S. Arumugam, Visual secret sharing between remote participants, Int. J. Comput. Appl., 103 (2014), 8–17.
- 19. S. Nseir, N. Hirzallah and M. Aqel, A secure mobile payment system using QR code, 2013 5th International Conference on Computer Science and Information Technology, 2013. Available from: https://ieeexplore.ieee.org/abstract/document/6588767.
- 20. C. N. Yang, J. K. Liao, F. H. Wu, et al., Developing visual cryptography for authentication on smartphones, International Conference on Industrial IoT Technologies and Applications, 2016. Available from: https://link.springer.com/chapter/10.1007/978-3-319-44350-8 19.
- 21. J. Lu, Z. Yang, L. Li, et al., Multiple schemes for mobile payment authentication using qr code and visual cryptography, Mobile Inf. Syst., 2017 (2017), 1–12.
- 22. X. Yan, Y. Lu, H. Huang, et al., Clarity Corresponding to Contrast in Visual Cryptography, International Conference of Pioneering Computer Scientists, Engineers and Educators, 2016. Available from: https://link.springer.com/chapter/10.1007/978-981-10-2053-7 23.
- 23. X. Yan, S. Wang, A. A. El-Latif, et al., Visual secret sharing based on random grids with abilities of and and xor lossless recovery, Multimedia Tools & Appl., 74 (2015), 3231–3252.
- 24. I. Jtc1/Sc, Information technology-automatic identification and data capture techniques-qr code 2005 bar code symbology specification, ISO/IEC, 18004 (2015).
- 25. X. Yan, S. Guan and X. Niu, Research on the capacity of error-correcting codes-based information hiding, Iihmsp'08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008. Available from: https://ieeexplore.ieee.org/abstract/document/4604249.
- 26. K. Saito and M. Morii, Efficient decoding of QR code using error correcting capability : Decoding method using erasure error correction and the ability, Tech. Rep. Ieice Isec, 111 (2011), 79–84.
- 27. S. Wan, Y. Lu, X. Yan, et al., Visual secret sharing scheme for (k, n) threshold based on qr code with multiple decryptions, J. Real-Time Image Process., 1–16.
Reader Comments
© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)
Associated material
Metrics
Other articles by authors
Related pages
Tools
your name: * your email: *