Table of Content

Open AccessOpen Access


A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code

Xinwei Zhong*, Lizhi Xiong, Zhihua Xia

Nanjing University of Information Science & Technology, Nanjing, 210044, China

* Corresponding Author: Xinwei Zhong. Email:

Journal on Big Data 2021, 3(2), 85-95.


With the rise of the Internet of Things (IoT), various devices in life and industry are closely linked. Because of its high payload, stable error correction capability, and convenience in reading and writing, Quick Response (QR) code has been widely researched in IoT. However, the security of privacy data in IoT is also a very important issue. At the same time, because IoT is developing towards low-power devices in order to be applied to more fields, the technology protecting the security of private needs to have the characteristics of low computational complexity. Visual Secret Sharing (VSS), with its features of safety and low computational cost, can fully meet the requirements of communication security in IoT. Therefore, a VSS scheme with QR code (VSS-QR) was proposed and has been applied to some extent. In VSS-QR, the secret is shared into a series of shares. These shares are usually common QR codes, which cannot cause the attention of the attacker. However, if there is dishonesty among participants, the secret cannot be recovered, which will lead to VSS-QR cannot be widely used due to its inadequate security. In this paper, we propose a visual secret sharing scheme with authentication based on QR code (VSSA-QR). Both the reconstructed secret QR code and shares can be verified whether they are forged by attackers. The abovementioned operations conveniently are performed on low-power QR scanning devices. Not only does the proposed scheme prevent some dishonest participants or attackers from cheating, but also prevent all participants from conspiring. In addition, the payload is the QR code itself, which is higher than other schemes. Theoretical analysis and experiments prove that the proposed scheme is effective.


Cite This Article

X. Zhong, L. Xiong and Z. Xia, "A secure visual secret sharing scheme with authentication based on qr code," Journal on Big Data, vol. 3, no.2, pp. 85–95, 2021.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1283


  • 1029


  • 0


Share Link