Data Hiding under QR Code using Visual Secret Sharing and Advanced Partitioning Based on Specific Relationship
Jyoti Rao1, Neeta Chavan2

1Dr. Jyoti Rao, Department of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Savitribai Phul, Pune University, Pune, India.
2*Miss. Neeta Chavan, Department of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Savitribai Phule Pune University, Pune, India.
Manuscript received on January 26, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 30, 2020. | PP: 2923-2926 | Volume-9 Issue-3, February 2020. | Retrieval Number:  C5799029320/2020©BEIESP | DOI: 10.35940/ijeat.C5799.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Visual Secret Sharing is the technique in which secret information is hidden in the form image which then divided into shares and these shares are used to decrypt the secret information. The number of shares required is given by the creator of the secret. Minimum those many shares are needed in order to decrypt the secret. If a single share is missing then the secret cannot be decrypted. The Quick Response (QR) code gives quick access to the information contained in it. QR code is 2D representation of the barcode which has capability to store information and can be easily read by machine. Due to easy access to the information stored in it, it is necessary to use some encryption or other protection to the data. Proposed approach to visual secret sharing scheme divides a secret QR code into different shares. In addition, the secret message is recovered by using XOR operation of the shares. This can effortlessly be achieved with the use of smartphones or different QR scanning gadgets. Using optimal partitioning methods the decryption of the message is made difficult to the hackers giving additional security to the data. The message accuracy can be checked by comparing the original message with shared message using hashing techniques. Because the QR code are small in size and has high data storage capacity, it is also resistant to damage so that is information is not lost even if some portion of the QR code is damaged it is best image to be used in visual secret sharing. The proposed approach reduces the risk of data transmission attacks.
Keywords: Advanced Partitioning, Hashing, Quick Response code, VSS.