SlideShare a Scribd company logo
Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko
International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 468
A Novel Secret Sharing Technique Using QR Code
Jun-Chou Chuang lzchung@pu.edu.tw
Assistant Professor
Department of Computer Science and communication Engineering
Providence University 200 Chung-Chi
Rd., Taichung, Taiwan
Yu-Chen Hu ychu@pu.edu.tw
Professor
Department of Computer Science and Information Management
Providence University 200 Chung-Chi
Rd., Taichung, Taiwan
Hsien-Ju Ko nhjko@asia.edu.tw
Assistant Professor
Department of Photonics and Communication Engineering
Asia University 500, Liufeng Rd.,
Wufeng, Taichung, Taiwan
Abstract
Any mobile device with capture function can read content from a barcode tag
directly. When a barcode contains important data or privacy information, the risk
of security becomes an important problem. In this paper, the QR code is
employed to design the secret sharing mechanism so that the data privacy during
data transmission can be enhanced. The secret data is divided into some
shadows by the secret sharing mechanism and the results are embedded into
barcode tags. The secret can be recovered only when the number of shadows is
greater than or equal to the predefined threshold. In sum, the proposed
technique improves data security for data transmission.
Keywords: Barcode, secret sharing, QR code.
1. INTRODUCTION
Barcode provides a convenient way [2][5][15] for people labeling a tag on a product so that
people can easily and quickly identify the content of product itself. It can be classified into two
types, one-dimensional (1D) barcode and two-dimensional (2D) barcode. The 1D barcodes use
different width of lines and spaces to represent data, for example, code 39, code 128, EAN-13,
EAN-128, ISBN, and etc. As for the 2D barcodes, they use symbol types of stacking and matrix to
represent data, such as QR code [4][7][8][16][17][18], PDF417, Data Matrix, Maxi Code, and etc.
Table 1 shows different types of 1D barcodes and 2D barcodes.
In generally, 1D barcodes put emphasis on “product identification” and 2D barcodes put
emphasis on “product descriptions”. Because of the limitation of 1D barcode storage, only a few
data like product identification is stored in 1D barcode. 2D barcodes are superior to that 1D
barcode in embedding payload, error resistance, data security, and readability. In the storage
size, 2D barcode can store a lot of information like product descriptions, including product
Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko
International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 469
ingredient, product item, product details, web links, and etc. For error resistance, 2D barcodes
can defense different levels of error occurs.
The security of 1D barcodes is lower than 2D barcodes. 1D barcodes are very easy to read by
scanning the lines and the spaces. However, 2D barcodes are not easy to read a symbol pattern
by human eyes. With regard to readability, 1D barcodes must scan along a single directional. If
the angle of a scan line does not fit within a range, the data would not be read correctly. However,
2D barcodes get wide ranges of angles for scanning. Thus, 2D barcodes are readability.
2D Barcodes provide a unique identifier for objects and applications [1][9][10][11] [12][13][14][15]
to automatic checkout system, commerce, industry, hospital, and etc. Barcodes are very
convenience to automatic systems, but they have data privacy weakness. A reader device with
video capture function can read the content from tags directly. When barcodes contain privacy
information may result in the risk of security issue. Therefore, the confidential data is often stored
in the back-end database. When a reader captures a tag, it only gets a network link from a tag
and later connected to the back-end database through the Internet. A user who has access right
can login database to retrieve the privacy information.
1D barcodes
Code 39 Code 128 EAN-13 ISBN
2D barcodes
QR Code PDF417 DataMatrix Maxi Code
TABLE 1: 1D Barcodes and 2D Barcodes.
To enhance security of data privacy [3] of barcodes, we design a secret sharing technique with
Quick Response code (QR code). The technique shares a confidential data into shadows and
one shadow is embedded into one carrier tag. Anyone cannot recovery the original secret data
from its own share. The secret can be recovered only when the number of shadows is larger than
or equal to a threshold. The proposed technique does not need to connect the back-end
database through Internet. Thus, the proposed technique can save much more hardware cost
and can reduce the security risks transmission on the open environment.
The rest of this paper is organized as follows. In Section 2, we review the QR code. The
proposed technique is described in Section 3. The security analysis and performance is listed in
Section 4. Finally, the conclusions are presented in Section 5.
2. QR CODE
The QR code is a kind of matrix symbol, which was developed by the Japanese company
Denson-Wave in 1994. Figure 1 shows the basic structure of QR code. They are quiet zone,
position detection patterns, separators for position detection patterns, timing patterns, alignment
patterns, format information, version information, data, and error correction codewords. They are
shown in Figure 1. Some details of QR code can be refereed to [17].
Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko
International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 470
FIGURE 1: The basic structure of QR Code.
The main features of QR code contain large capacity, small printout size, high speed scanning,
advanced error correcting, and freedom direction scanning. The overall are summarized as
follows.
• High data capacity: QR code can store 7,089 numeric characters and 4,296 alphanumeric
characters, and 1,817 kanji characters.
• High speed scanning: A mobile phone with camera function can get the content from a
barcode quickly and easily.
• Small printout size: QR Codes carry data on both horizontally and vertically, thus QR codes
are better than 1D barcodes in data capacity.
• Advance error correcting: Even if 50% areas of barcode are damaged, QR codes still can be
recognized correctly.
• Freedom direction scanning: The scanning direction of QR code is freedom.
3. DESIGN OF SECRET SHARING TECHNIQUE USING QR CODE
The proposed technique designs a secure data transmission scheme based on the secret sharing
scheme with QR code. Secret sharing scheme was first proposed by Shamir in 1979 [14]. The
main idea of the secret sharing scheme divides a secret into n shadows or called shares. Anyone
can not decrypt the original secret from their own share. The secret can be recovered only when
any of t out of n shadows (t<=n) are hold together. The framework of the proposed scheme is
listed in Figure 2.
Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko
International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 471
FIGURE 2: The framework of the proposed scheme.
In the proposed scheme, we first choose a value t (t<=n) and a secret key a0 and a large prime
number p (p>=a0). Next, we select n participants x1, x2, ..., xn, where n is the number of QR code
tags, which used to be hidden. Next, a (t-1) degree polynomial f(x) was constructed as follows:
1 2 1
0 1 2 1( ) ... (mod )t
tf x a a x a x a x p−
−= + + + + (1)
Where a1, a2, …, at-1
∈Zp. So, we can generate a pair of secret share (xi, f(xi)=yi) to each
participant.
In the decoding procedure, anyone who gets t out of n secret shares would recovery secret data
a0 by the Lagrange polynomial interpolation which was listed as belows.
∑ ∏= ≠= −
−
=
t
a
t
ajj ijia
ij
ia P
xx
xx
yxf
1 ,1
)(mod)(
. (2)
Here we illustrate an example to show how to construct secret shares. Let t value is 3, n value is
6, secret key a0 is 1234 and the prime number p is 1237. Then a (t-1) degree polynomial
f(x)=94x
2
+166x+1234 is constructed. Assume x1=1, x2=2, x3=3, x4=4, x5=5, and x6=6, we can
obtain six secret shares where f(x1)=f(1)=1494, f(x2)=f(2)=1942, f(x3)=f(3)=2578, f(x4)=f(4)=3402,
f(x5)=f(5)=4414, and f(x6)=f(6)=5614. To recover the secret key a0, we need to collect three or
more secret shares. Assume we obtain three secret shares, they are (f(2), 1942), (f(4), 3402),
(f(5), 4414). Then the secret key a0=1234 can be decoded by the Lagrange polynomial
interpolation as below.
Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko
International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 472
1237mod)123416694(
)1237)(mod
2
8
2
3
1
(4414)5
2
7
2
1
(3402)
3
10
2
3
6
1
(1942
)
45
4
25
2
(4414)
54
5
24
2
(3402)
52
5
42
4
(1942)(
2
222
  
 
++=
+−×+−−−×++−×=
−
−
×
−
−
+
−
−
×
−
−
+
−
−
×
−
−
=
xx
xxxxxx
xxxxxx
xf
4. SECURITY ANALYSIS AND PERFORMANCE
This section describes the security and the performance of the proposed scheme. The proposed
scheme is based on Shamir’s secret sharing scheme. The secret data is divided into shares of
shadows by secret sharing technique. The generated shadows are embedded into each QR-code
tag. Anyone who wants direct to read the content from QR codes is impossible if the number of
received shadows is not achieved the predefined threshold. As the result, our scheme is secure.
In Figures 3-6, the share generate and the message recovery for the (2, 3)-threshold and the (3,
3)-threshold are listed below. The plaintext is divided into three shares by secret sharing
technique, and then embedding them into QR codes. The decoding procedure in the (2, 3)-
threshold, the original plaintext can be recovered only if the number of the received QR codes is
larger than or equal to two. As for the (3, 3)-threshold, the number of the received QR codes
should be equal to three. Besides, error recovery from any of two barcode tags using (3, 3)-
threshold is listed in Figure 7. Because of the number of the retrieved shares is less than the
predefined threshold thus the reconstructed secret key is not correct.
FIGURE 3: Generating three secret shares using (2, 3)-threshold.
Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko
International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 473
FIGURE 4: Recovery of secret message from any of two barcode tags using (2, 3)-threshold.
FIGURE 5: Generating three secret shares using (3, 3)-threshold.
FIGURE 6: Recovery of secret message from three barcode tags using (3, 3)-threshold.
Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko
International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 474
FIGURE 7: Error recovery from any of two barcode tags using (3, 3)-threshold.
As for our system perforamnce, our system does not need to establish a remote database for QR
code data searching. Meanwhile, the proposed scheme embeds the data into QR code tags
directly. The cost of this paper is only tags and printing ink. Thus, the proposed scheme can save
a lot of system cost.
5. CONCLUSIONS
In this paper, a secret sharing mechanism to enhance the security and data privacy for QR code
is proposed. The proposed technique improves data security during data transmission. On the
other hand, the proposed technique does not need to establish a back-end database beforehand
for contents searching. It direct embeds the secret data into tags therefore the proposed
technique can save a lot of hardware cost and software maintenance. The proposed technique
can be applied to some applications such as electronic tickets, airline luggage inspection, medical
e-health system, and others fields.
6. ACKNOWLEDGMENT
The authors gratefully acknowledge the support provided to this study by the National Science
Council of Taiwan under grant number NSC99-2221-E-126-006.
7. REFERENCES
1. H. S. Al-Khalifa, “Mobile SRS: a classroom communication and assessment service”. In
Proceedings of the Innovations in Information Technology, United Arab Emirates, 2008.
2. T. Bouchard, M. Hemon, F. Gagnon, V. Gravel, and O. Munger, “Mobile telephones used as
boarding passes: Enabling Technologies and Experimental Results”. In Proceedings of the
4th Autonomic and Autonomous Systems, Gosier, Guadeloupe, 2008.
3. T. Chen, “The application of bar code forgery - proof technology in the product sales
management”. In Proceedings of the Intelligent Information Technology Application
Workshops, Washington, DC, USA, 2008.
4. U. B. Ceipidor, C. M. Medaglia, and A. Perrone, M. D. Marsico, and G. D. Romano, “A
museum mobile game for children using QR-codes”. In Proceedings of the 8th International
Conference on Interaction Design and Children, Italy, 2009.
5. Y. J. Chang, S. K. Tsai, and T. Y. Wang, “A context aware handheld wayfinding system for
individuals with cognitive impairments”. In Proceedings of the 10th international ACM
SIGACCESS conference on Computers and accessibility, Halifax, Nova Scotia, Canada,
2008.
Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko
International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 475
6. N. Fujimura and M. Doi, “Collecting students’ degree of comprehension with mobile phones”.
In Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services, Canada,
2006.
7. T. Falas and H. Kashani, “Two-dimensional barcode decoding with camera-equipped mobile
phones”. In Proceedings of the Pervasive Computing and Communications Workshops,
White Plains, NY, USA, 2007.
8. J. Z. Gao, L. Prakash, and R. Jagatesan, “Understanding 2D-barcode technology and
applications in m-commerce – design and implementation of a 2D barcode processing
solution”. In Proceedings of the Computer Software and Applications Conference, Bejing,
China, 2007.
9. T. Kamina, T. Aoki, Y. Eto, N. Koshizuka, J. Yamada, and K. Sakamura, “Verifying identifier-
authenticity in ubiquitous computing environment”. In Proceedings of the Advanced
Information Networking and Applications Workshops, Ontario, Canada, 2007.
10. B. Lingyan, F. Zewei, L. Min, and W. Weining, “Design and implementation of the airline
luggage inspection system base on link structure of QR code”. In Proceedings of the
Electronic Commerce and Security, Guangzhou, 2008.
11. T. Y. Liu and Y. L. Chu “Handheld augmented reality supported immersive ubiquitous
learning system”. In Proceedings of the Systems, Man and Cybernetics, Singapore, 2008.
12. J. Rouillard, “Contextual QR codes”. In Proceedings of the 3rd International Multi-Conference
on Computing in the Global Information Technology, Athens, Greece, 2008.
13. S. Reiser and R. Bruce, “Service learning meets mobile computing”. In Proceedings of the
Annual Southeast Regional Conference, Auburn, Alabama, 2008.
14. A. Shamir, “How to Share a Secret”. Communication of the ACM, 22(11): 612-613, 1979.
15. G. Starnberger, L. Froihofer, and K. M. Goeschka, “QR-TAN: Secure mobile transaction
authentication”. In Proceedings of the Availability, Reliability and Security, Fukuoka, Japan,
2009.
16. Y. L. Yeh, J. C. You, and G. J. Jong, “The 2D bar-code technology applications in medical
information management”. In Proceedings of the Intelligent Systems Design and
Applications, Kaohsiung, Taiwan, 2008.
17. ISO/IEC18004, “Information technology-automatic identification and data capture techniques”.
Bar Code Symbology - QR Code.
18. Denso-wave, http://www.denso-wave.com/qrcode/index-e.html.

More Related Content

PDF
Iris images encryption based on QR code and chaotic map
PDF
IRJET- Study of 3D Barcode with Steganography for Data Hiding
PDF
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
PDF
Proposing an Encryption Algorithm based on DES
PDF
Offline Signature Verification and Recognition using Neural Network
PDF
20320130406009
PDF
IRJET - Color Qr Code
PDF
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
Iris images encryption based on QR code and chaotic map
IRJET- Study of 3D Barcode with Steganography for Data Hiding
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
Proposing an Encryption Algorithm based on DES
Offline Signature Verification and Recognition using Neural Network
20320130406009
IRJET - Color Qr Code
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...

What's hot (20)

PDF
H43064650
PDF
A Simple Signature Recognition System
PDF
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
DOCX
ieee paper
PDF
Cse 5 8sem
PDF
A novel method for digital data encoding-decoding
PDF
Proposed aes for image steganography in different medias
PDF
Product Label Reading System for visually challenged people
PDF
A novel efficient multiple encryption algorithm for real time images
PDF
IRJET- Optical Character Recognition using Image Processing
PDF
Survey on information hiding techniques using qr barcode
PDF
H42054550
PDF
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
PDF
Text in Image Hiding using Developed LSB and Random Method
PDF
Identification of Persons by Fingerprint using Huffman Coding Algorithm
PDF
IRJET- Cheque Bounce Detection System using Image Processing
PDF
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
PDF
Image encryption using jumbling salting
PPT
Sign verification
PDF
IRJET- Information Retrieval & Text Analytics using Artificial Intelligence
H43064650
A Simple Signature Recognition System
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ieee paper
Cse 5 8sem
A novel method for digital data encoding-decoding
Proposed aes for image steganography in different medias
Product Label Reading System for visually challenged people
A novel efficient multiple encryption algorithm for real time images
IRJET- Optical Character Recognition using Image Processing
Survey on information hiding techniques using qr barcode
H42054550
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
Text in Image Hiding using Developed LSB and Random Method
Identification of Persons by Fingerprint using Huffman Coding Algorithm
IRJET- Cheque Bounce Detection System using Image Processing
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Image encryption using jumbling salting
Sign verification
IRJET- Information Retrieval & Text Analytics using Artificial Intelligence
Ad

Similar to A Novel Secret Sharing Technique Using QR Code (20)

PDF
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
PDF
IRJET- I-Share: A Secure Way to Share Images
PDF
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
PDF
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
PDF
Implementation of 2D Optimal Barcode (QR Code) for Images
PDF
A dynamic data encryption method based on addressing the data importance on ...
PDF
11.secure compressed image transmission using self organizing feature maps
PDF
A Review on QR Code for Hiding Private Information
PDF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
PDF
International Journal for Research in Applied Science & Engineering
PDF
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
PDF
Security System for Data Using Steganography and Cryptography (SSDSC)
PDF
Survey on information sharing
PDF
A blind steganography approach for hiding privacy details in images of digit...
PDF
Lightweight digital imaging and communications in medicine image encryption f...
PDF
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
PDF
QR Code Document Authentication and Retrieval
PDF
A Survey On Secrete Communication Through QR Code Steganography For Military ...
PPTX
Qr codes
PDF
IRJET - Image Watermarking using QR Code
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
IRJET- I-Share: A Secure Way to Share Images
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Implementation of 2D Optimal Barcode (QR Code) for Images
A dynamic data encryption method based on addressing the data importance on ...
11.secure compressed image transmission using self organizing feature maps
A Review on QR Code for Hiding Private Information
A New Approach of Cryptographic Technique Using Simple ECC & ECF
International Journal for Research in Applied Science & Engineering
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
Survey on information sharing
A blind steganography approach for hiding privacy details in images of digit...
Lightweight digital imaging and communications in medicine image encryption f...
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
QR Code Document Authentication and Retrieval
A Survey On Secrete Communication Through QR Code Steganography For Military ...
Qr codes
IRJET - Image Watermarking using QR Code
Ad

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Classroom Observation Tools for Teachers
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
RMMM.pdf make it easy to upload and study
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Lesson notes of climatology university.
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Cell Structure & Organelles in detailed.
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Classroom Observation Tools for Teachers
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Chinmaya Tiranga quiz Grand Finale.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
RMMM.pdf make it easy to upload and study
Microbial diseases, their pathogenesis and prophylaxis
Abdominal Access Techniques with Prof. Dr. R K Mishra
Lesson notes of climatology university.
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Complications of Minimal Access Surgery at WLH
A systematic review of self-coping strategies used by university students to ...
Final Presentation General Medicine 03-08-2024.pptx
Cell Types and Its function , kingdom of life
2.FourierTransform-ShortQuestionswithAnswers.pdf

A Novel Secret Sharing Technique Using QR Code

  • 1. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 468 A Novel Secret Sharing Technique Using QR Code Jun-Chou Chuang lzchung@pu.edu.tw Assistant Professor Department of Computer Science and communication Engineering Providence University 200 Chung-Chi Rd., Taichung, Taiwan Yu-Chen Hu ychu@pu.edu.tw Professor Department of Computer Science and Information Management Providence University 200 Chung-Chi Rd., Taichung, Taiwan Hsien-Ju Ko nhjko@asia.edu.tw Assistant Professor Department of Photonics and Communication Engineering Asia University 500, Liufeng Rd., Wufeng, Taichung, Taiwan Abstract Any mobile device with capture function can read content from a barcode tag directly. When a barcode contains important data or privacy information, the risk of security becomes an important problem. In this paper, the QR code is employed to design the secret sharing mechanism so that the data privacy during data transmission can be enhanced. The secret data is divided into some shadows by the secret sharing mechanism and the results are embedded into barcode tags. The secret can be recovered only when the number of shadows is greater than or equal to the predefined threshold. In sum, the proposed technique improves data security for data transmission. Keywords: Barcode, secret sharing, QR code. 1. INTRODUCTION Barcode provides a convenient way [2][5][15] for people labeling a tag on a product so that people can easily and quickly identify the content of product itself. It can be classified into two types, one-dimensional (1D) barcode and two-dimensional (2D) barcode. The 1D barcodes use different width of lines and spaces to represent data, for example, code 39, code 128, EAN-13, EAN-128, ISBN, and etc. As for the 2D barcodes, they use symbol types of stacking and matrix to represent data, such as QR code [4][7][8][16][17][18], PDF417, Data Matrix, Maxi Code, and etc. Table 1 shows different types of 1D barcodes and 2D barcodes. In generally, 1D barcodes put emphasis on “product identification” and 2D barcodes put emphasis on “product descriptions”. Because of the limitation of 1D barcode storage, only a few data like product identification is stored in 1D barcode. 2D barcodes are superior to that 1D barcode in embedding payload, error resistance, data security, and readability. In the storage size, 2D barcode can store a lot of information like product descriptions, including product
  • 2. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 469 ingredient, product item, product details, web links, and etc. For error resistance, 2D barcodes can defense different levels of error occurs. The security of 1D barcodes is lower than 2D barcodes. 1D barcodes are very easy to read by scanning the lines and the spaces. However, 2D barcodes are not easy to read a symbol pattern by human eyes. With regard to readability, 1D barcodes must scan along a single directional. If the angle of a scan line does not fit within a range, the data would not be read correctly. However, 2D barcodes get wide ranges of angles for scanning. Thus, 2D barcodes are readability. 2D Barcodes provide a unique identifier for objects and applications [1][9][10][11] [12][13][14][15] to automatic checkout system, commerce, industry, hospital, and etc. Barcodes are very convenience to automatic systems, but they have data privacy weakness. A reader device with video capture function can read the content from tags directly. When barcodes contain privacy information may result in the risk of security issue. Therefore, the confidential data is often stored in the back-end database. When a reader captures a tag, it only gets a network link from a tag and later connected to the back-end database through the Internet. A user who has access right can login database to retrieve the privacy information. 1D barcodes Code 39 Code 128 EAN-13 ISBN 2D barcodes QR Code PDF417 DataMatrix Maxi Code TABLE 1: 1D Barcodes and 2D Barcodes. To enhance security of data privacy [3] of barcodes, we design a secret sharing technique with Quick Response code (QR code). The technique shares a confidential data into shadows and one shadow is embedded into one carrier tag. Anyone cannot recovery the original secret data from its own share. The secret can be recovered only when the number of shadows is larger than or equal to a threshold. The proposed technique does not need to connect the back-end database through Internet. Thus, the proposed technique can save much more hardware cost and can reduce the security risks transmission on the open environment. The rest of this paper is organized as follows. In Section 2, we review the QR code. The proposed technique is described in Section 3. The security analysis and performance is listed in Section 4. Finally, the conclusions are presented in Section 5. 2. QR CODE The QR code is a kind of matrix symbol, which was developed by the Japanese company Denson-Wave in 1994. Figure 1 shows the basic structure of QR code. They are quiet zone, position detection patterns, separators for position detection patterns, timing patterns, alignment patterns, format information, version information, data, and error correction codewords. They are shown in Figure 1. Some details of QR code can be refereed to [17].
  • 3. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 470 FIGURE 1: The basic structure of QR Code. The main features of QR code contain large capacity, small printout size, high speed scanning, advanced error correcting, and freedom direction scanning. The overall are summarized as follows. • High data capacity: QR code can store 7,089 numeric characters and 4,296 alphanumeric characters, and 1,817 kanji characters. • High speed scanning: A mobile phone with camera function can get the content from a barcode quickly and easily. • Small printout size: QR Codes carry data on both horizontally and vertically, thus QR codes are better than 1D barcodes in data capacity. • Advance error correcting: Even if 50% areas of barcode are damaged, QR codes still can be recognized correctly. • Freedom direction scanning: The scanning direction of QR code is freedom. 3. DESIGN OF SECRET SHARING TECHNIQUE USING QR CODE The proposed technique designs a secure data transmission scheme based on the secret sharing scheme with QR code. Secret sharing scheme was first proposed by Shamir in 1979 [14]. The main idea of the secret sharing scheme divides a secret into n shadows or called shares. Anyone can not decrypt the original secret from their own share. The secret can be recovered only when any of t out of n shadows (t<=n) are hold together. The framework of the proposed scheme is listed in Figure 2.
  • 4. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 471 FIGURE 2: The framework of the proposed scheme. In the proposed scheme, we first choose a value t (t<=n) and a secret key a0 and a large prime number p (p>=a0). Next, we select n participants x1, x2, ..., xn, where n is the number of QR code tags, which used to be hidden. Next, a (t-1) degree polynomial f(x) was constructed as follows: 1 2 1 0 1 2 1( ) ... (mod )t tf x a a x a x a x p− −= + + + + (1) Where a1, a2, …, at-1 ∈Zp. So, we can generate a pair of secret share (xi, f(xi)=yi) to each participant. In the decoding procedure, anyone who gets t out of n secret shares would recovery secret data a0 by the Lagrange polynomial interpolation which was listed as belows. ∑ ∏= ≠= − − = t a t ajj ijia ij ia P xx xx yxf 1 ,1 )(mod)( . (2) Here we illustrate an example to show how to construct secret shares. Let t value is 3, n value is 6, secret key a0 is 1234 and the prime number p is 1237. Then a (t-1) degree polynomial f(x)=94x 2 +166x+1234 is constructed. Assume x1=1, x2=2, x3=3, x4=4, x5=5, and x6=6, we can obtain six secret shares where f(x1)=f(1)=1494, f(x2)=f(2)=1942, f(x3)=f(3)=2578, f(x4)=f(4)=3402, f(x5)=f(5)=4414, and f(x6)=f(6)=5614. To recover the secret key a0, we need to collect three or more secret shares. Assume we obtain three secret shares, they are (f(2), 1942), (f(4), 3402), (f(5), 4414). Then the secret key a0=1234 can be decoded by the Lagrange polynomial interpolation as below.
  • 5. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 472 1237mod)123416694( )1237)(mod 2 8 2 3 1 (4414)5 2 7 2 1 (3402) 3 10 2 3 6 1 (1942 ) 45 4 25 2 (4414) 54 5 24 2 (3402) 52 5 42 4 (1942)( 2 222      ++= +−×+−−−×++−×= − − × − − + − − × − − + − − × − − = xx xxxxxx xxxxxx xf 4. SECURITY ANALYSIS AND PERFORMANCE This section describes the security and the performance of the proposed scheme. The proposed scheme is based on Shamir’s secret sharing scheme. The secret data is divided into shares of shadows by secret sharing technique. The generated shadows are embedded into each QR-code tag. Anyone who wants direct to read the content from QR codes is impossible if the number of received shadows is not achieved the predefined threshold. As the result, our scheme is secure. In Figures 3-6, the share generate and the message recovery for the (2, 3)-threshold and the (3, 3)-threshold are listed below. The plaintext is divided into three shares by secret sharing technique, and then embedding them into QR codes. The decoding procedure in the (2, 3)- threshold, the original plaintext can be recovered only if the number of the received QR codes is larger than or equal to two. As for the (3, 3)-threshold, the number of the received QR codes should be equal to three. Besides, error recovery from any of two barcode tags using (3, 3)- threshold is listed in Figure 7. Because of the number of the retrieved shares is less than the predefined threshold thus the reconstructed secret key is not correct. FIGURE 3: Generating three secret shares using (2, 3)-threshold.
  • 6. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 473 FIGURE 4: Recovery of secret message from any of two barcode tags using (2, 3)-threshold. FIGURE 5: Generating three secret shares using (3, 3)-threshold. FIGURE 6: Recovery of secret message from three barcode tags using (3, 3)-threshold.
  • 7. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 474 FIGURE 7: Error recovery from any of two barcode tags using (3, 3)-threshold. As for our system perforamnce, our system does not need to establish a remote database for QR code data searching. Meanwhile, the proposed scheme embeds the data into QR code tags directly. The cost of this paper is only tags and printing ink. Thus, the proposed scheme can save a lot of system cost. 5. CONCLUSIONS In this paper, a secret sharing mechanism to enhance the security and data privacy for QR code is proposed. The proposed technique improves data security during data transmission. On the other hand, the proposed technique does not need to establish a back-end database beforehand for contents searching. It direct embeds the secret data into tags therefore the proposed technique can save a lot of hardware cost and software maintenance. The proposed technique can be applied to some applications such as electronic tickets, airline luggage inspection, medical e-health system, and others fields. 6. ACKNOWLEDGMENT The authors gratefully acknowledge the support provided to this study by the National Science Council of Taiwan under grant number NSC99-2221-E-126-006. 7. REFERENCES 1. H. S. Al-Khalifa, “Mobile SRS: a classroom communication and assessment service”. In Proceedings of the Innovations in Information Technology, United Arab Emirates, 2008. 2. T. Bouchard, M. Hemon, F. Gagnon, V. Gravel, and O. Munger, “Mobile telephones used as boarding passes: Enabling Technologies and Experimental Results”. In Proceedings of the 4th Autonomic and Autonomous Systems, Gosier, Guadeloupe, 2008. 3. T. Chen, “The application of bar code forgery - proof technology in the product sales management”. In Proceedings of the Intelligent Information Technology Application Workshops, Washington, DC, USA, 2008. 4. U. B. Ceipidor, C. M. Medaglia, and A. Perrone, M. D. Marsico, and G. D. Romano, “A museum mobile game for children using QR-codes”. In Proceedings of the 8th International Conference on Interaction Design and Children, Italy, 2009. 5. Y. J. Chang, S. K. Tsai, and T. Y. Wang, “A context aware handheld wayfinding system for individuals with cognitive impairments”. In Proceedings of the 10th international ACM SIGACCESS conference on Computers and accessibility, Halifax, Nova Scotia, Canada, 2008.
  • 8. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko International Journal of Image Processing (IJIP), Volume (4) : Issue (5) 475 6. N. Fujimura and M. Doi, “Collecting students’ degree of comprehension with mobile phones”. In Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services, Canada, 2006. 7. T. Falas and H. Kashani, “Two-dimensional barcode decoding with camera-equipped mobile phones”. In Proceedings of the Pervasive Computing and Communications Workshops, White Plains, NY, USA, 2007. 8. J. Z. Gao, L. Prakash, and R. Jagatesan, “Understanding 2D-barcode technology and applications in m-commerce – design and implementation of a 2D barcode processing solution”. In Proceedings of the Computer Software and Applications Conference, Bejing, China, 2007. 9. T. Kamina, T. Aoki, Y. Eto, N. Koshizuka, J. Yamada, and K. Sakamura, “Verifying identifier- authenticity in ubiquitous computing environment”. In Proceedings of the Advanced Information Networking and Applications Workshops, Ontario, Canada, 2007. 10. B. Lingyan, F. Zewei, L. Min, and W. Weining, “Design and implementation of the airline luggage inspection system base on link structure of QR code”. In Proceedings of the Electronic Commerce and Security, Guangzhou, 2008. 11. T. Y. Liu and Y. L. Chu “Handheld augmented reality supported immersive ubiquitous learning system”. In Proceedings of the Systems, Man and Cybernetics, Singapore, 2008. 12. J. Rouillard, “Contextual QR codes”. In Proceedings of the 3rd International Multi-Conference on Computing in the Global Information Technology, Athens, Greece, 2008. 13. S. Reiser and R. Bruce, “Service learning meets mobile computing”. In Proceedings of the Annual Southeast Regional Conference, Auburn, Alabama, 2008. 14. A. Shamir, “How to Share a Secret”. Communication of the ACM, 22(11): 612-613, 1979. 15. G. Starnberger, L. Froihofer, and K. M. Goeschka, “QR-TAN: Secure mobile transaction authentication”. In Proceedings of the Availability, Reliability and Security, Fukuoka, Japan, 2009. 16. Y. L. Yeh, J. C. You, and G. J. Jong, “The 2D bar-code technology applications in medical information management”. In Proceedings of the Intelligent Systems Design and Applications, Kaohsiung, Taiwan, 2008. 17. ISO/IEC18004, “Information technology-automatic identification and data capture techniques”. Bar Code Symbology - QR Code. 18. Denso-wave, http://www.denso-wave.com/qrcode/index-e.html.