1. Introduction
Modern commercial applications employ QR codes in brand promotion, enriching consumer usage experience, interactive labeling for sharing product information, including promotional videos, web links, etc. In addition, QR codes are integrated with service platforms of governments for the effective delivery of utilization and administrative services to the public. The simplicity of QR code generation and scanning with cheap smart phones and IoT has harnessed their extensive adaptation by commercial and nonprofit organizations [
1]. For an example, QR codes allow the consumer to connect to the IoT with a simple smartphone or tablet scan. Having all objects marked with a QR code or barcode means improving the retail environment for consumers because they will be more educated about the item before purchasing, and they will be able to check for an item’s availability. On the other hand, they are also susceptible to tampering and duplications for illegal financial benefits and counterfeiting authentic goods [
2]. Security investigations have reported huge losses to commercial organizations that are ascribed to the flooding of fake goods carrying authentic QR codes. Several mechanisms have been proposed so far for protecting the QR codes against attacks.
The primitive QR code security approaches embedded the QR codes within cover images in the spatial or frequency domain [
3,
4]. Later, watermarks were embedded in the frequency domain of the codes employing standard image transformations [
5,
6] such as Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Discrete Fourier Transform (DFT). Later, spatial domain watermarking schemes exploiting the structure and error correction [
7,
8] capabilities of the QR codes were proposed. In these schemes, the QR codes with distortions were not readable and required additional morphological and interpolation operations to be recovered for reading. Further, if the error correction level was high and the embedded data was not encrypted, the QR code and the hidden data could be read by the attacker. In a similar method proposed by Chen [
9], the QR code was embedded with message authentication code and cryptographic signature, exploiting the redundancy of error correction codes. Scanned with a conventional barcode scanner, this stego QR code revealed only the public information. The authentication data embedded within the code could be retrieved only if the barcode structure and embedding procedure was known. On successful extraction, the authenticity of the QR was verified. Of late, secret-sharing schemes are widely used in securing the QR codes from malicious attacks. These approaches share the QR code as secret shares among participants and recover the QR code from the shares. With these schemes, better robustness can be achieved. The schematic of the
(n,
n) secret-sharing scheme for sharing a QR code as a secret is shown in
Figure 1.
The effectiveness of QR codes in healthcare applications has been demonstrated by various researchers recently [
10,
11]. Earlier, Feng [
12] and co-workers demonstrated the fabrication of an immune-chromatographic assay labeled with QR codes for rapid biomedical diagnosis with Google Glass. In this approach, a QR code generator creates a QR code identifier for one or more diagnostic tests. Attaching a QR code label facilitates the automatic identification of the test of interest and other relevant data such as the patient details. Jamu [
13] and co-workers evaluated the feasibility of utilizing the QR codes in capturing the real-time clinical data in an inpatient clinical environment and reported their effectiveness. A QR code-based diagnostic assay for detection and tracking of malaria has been proposed by Mthembu [
14] et al. The QR codes signifying positive, negative and invalid test results integrated with diagnostic kits facilitate the immediate acquisition of clinical data from the point of study to the central laboratories, with the aid of Google Analytics. This approach is found to be effective in the surveillance investigations of diseases. In addition, many researchers have started exploring the integration of QR codes in various clinical applications.
In this intriguing context, this paper proposes a novel approach for sharing QR codes based on NMF [
15] and SRCNN [
16]. Particularly, we introduce variants of these classical approaches called the multi-layer NMF and structure regularized SRCNN in realizing the proposed system. The inherent characteristic of the NMF in creating component matrices with nonnegative elements is exploited in this work, in the creation of secret shares from QR codes at the sender side. These shares are combined to reconstruct the QR codes at the other end. The proposed scheme is featured as an
(n,
n) secret-sharing approach, in which all the shares are essential for reconstruction of the secret QR code. The structure regularization constraint ensures that the structural elements of the reconstructed QR code are intact. This scheme is ideal for sharing secret data as QR codes, to establish trust among a group of participants, creating a secured environment.
The contributions of this research are as below.
This paper proposes a novel secret-sharing mechanism for sharing QR codes as basis and coefficient matrices constructed by a multi-layer NMF as secret shares.
The QR codes are recovered by computationally less expensive Nonnegative Matrix Reconstruction operations and structure regularized SRCNN on the secrets.
The proposed approach eliminates the need for an explicit carrier image to embed the secret shares, as the individual shares do not carry significant information for an attacker.
This approach is free from pixel-expansion problems as the shares are not embedded for sharing.
The security of the secret can be improved by increasing the number stages of NMF for decomposition of the shares.
This approach is suitable for QR codes with different error correction levels as the secret-sharing and reconstruction operations are the same for all sizes of secrets.
Pixel expansion problems encountered in conventional secret-sharing schemes are completely averted in the proposed scheme, as NMF generates the shares by factorization. The SRCNN is applied to recover the QR code from the approximate version obtained from the secret shares. Experimental results with a standard dataset show that the proposed system is an eventual solution towards the realization of anti-counterfeit QR codes. This paper is organized with a review on conventional secret-sharing schemes and QR code-based secret-sharing schemes in
Section 2. The mathematical foundations of the proposed system are described in
Section 3 and the architecture of the proposed system is given in
Section 4. The experimental results, comparative analyses, security analyses and interpretations are given in
Section 5. The paper is concluded in
Section 6.
2. Literature Review
Secret Image Sharing (SIS) schemes share a secret image as a number of secret shares or shadow images among the participants and recover the secret image, combining sufficient number of shares. Visual Secret Sharing (VSS) and Polynomial-based Secret Sharing (PSS) are the popular SIS approaches. VSS schemes reconstruct the secret image simply stacking the secret shares. These schemes based on the logical XOR operations are characterized by lossy recovery and low visual quality of reconstructed secret images [
17]. In the earliest (
k,
n) PSS scheme proposed by Naor and Shamir [
18], the secret image is divided into
n shares, where at least
k out of
n shares are required for secret image reconstruction. Though this scheme is secure, it is characterized by storage overheads, as each shadow image is of the size of the secret image. A variant of this scheme proposed by Thien and Lin [
19] reduced the size of each shadow image by 1/
k of the secret image. However, in this method, traces of the secret image are evidenced in the shares and the secret can be reconstructed from insufficient number of shares, forsaking security. Though lossless recovery of secret image is achieved by this method, it suffers from random pixel expansion. Further, other PSS schemes have also been proposed featuring lossless recovery. The scheme proposed by Yang et al. [
20] based on polynomials in the Galois Field, exhibits higher computational costs compared to other methods. Similarly, a lossless scheme proposed by Ding et al. [
21] also suffers from limitations such as random shape changes, large shadow size and high computational complexity. In a
(k,
n) PSS scheme proposed by Zhou et al. [
22], the shadow size is reduced to 1/
k − 1 of the secret image. This method embeds the first
k − 1 coefficients to reduce the shadow size. A
(n,
n) visual secret-sharing scheme based on XOR operations is proposed in [
23], which shares the secret as
n meaningful shares among
n participants. The authors of this paper claim that this method is superior to conventional methods as the drawbacks such as pixel expansion, alignment of shares for reconstruction, loss of contrast, need for an explicit codebook for construction, etc., are mitigated.
Though creation and recognition of QR codes are simple, incorporating them in the business workflow of enterprises poses severe security risks, as QR codes are vulnerable to copy–paste attacks. A QR code can allegedly be used as an attack vector for threatening the reputation of an organization. Sharing a QR code securely among a group of people as secret shares and recovering the QR code from the shares will be a potential solution to enforce trust among a group of people. The significant difference between sharing images and QR codes is that the QR codes must be decodable after recovery. This requirement imposes a stringent constraint on the implementation of the QR code secret-sharing schemes.
Several attack scenarios such as Cross-Site Request Forgery attack (CSRF) [
24], Cross-Site Scripting (XSS) attack [
25], social engineering, phishing and pharming attacks can be launched, making minimal changes to genuine QR codes. Various empirical studies on the use of QR code as an attack vector are demonstrated in [
26]. In order to prevent these attacks, QR code-sharing schemes must avoid information leakage in the secret shares, making reconstruction difficult. In addition, limitations of conventional secret-sharing schemes such as pixel expansion, memory overheads and computational costs must also be reduced or overcome in these schemes. Further, readability requirements also make QR secret-sharing a challenging task. Hence, there are only very few works in this context, discussed in this section.
Lin [
27] proposed an
(n,
n) secret-sharing scheme in which the secret is divided into
n shadows. Each shadow along with the authentication code is embedded as a pair (s
i,v
i) into the data codewords of each cover QR code QR
i. At the other end, (s
i,v
i) pair is extracted from each QR
i and all the shares are combined to reveal the secret. This scheme verifies the integrity of each share with the verification code, generated using a master key and a hashing function. A
(k,
n) secret-sharing scheme proposed in [
28] shares a secret image as
n QR code shares and provides two approaches for revealing the secret, one by stacking the QR code shares and the other by performing XOR operations. This approach called a VSS-based QR code (VSSQR) scheme, exploits the error correction capabilities of the QR codes to generate QR code shares to share images. The secret image can be revealed by stacking a sufficient number of QR-code shares in low-resource settings. Further, this method also facilitates lossless recovery of a secret image by XOR operations among the shares. In an
(n,
n) secret-sharing mechanism proposed in [
29], a secret message is encoded as a secret QR code and shared among
n participants as QR code shares. The secret message is decoded from the QR code revealed by combining these
n shares. Similarly, a cooperative secret-sharing protocol proposed in [
30], embeds secret messages within QR codes and distributes them to
n participants such that each QR code carries both public and private information. Public information is readable by conventional QR scanners while the private message is extracted using a symmetric key. This message is then decoded with the private key of a participant to extract the share. These shares are combined to extract the secret messages.
Liu et al. [
31] have proposed a (3,3) threshold secret-sharing scheme called the VSS-QR code. This approach encodes the binary QR codes into three color shares and recovers the QR code by stacking them. Yu et al. [
32] present a three-level QR coding scheme, embedding sensitive information within a carrier QR code in three steps, revealing only the public information of the carrier at the first layer.
Recently, Huang et al. [
33] presented an
(n,
n) threshold QR code secret-sharing scheme, exploiting the error-correction capability of QR codes to enhance the security of the code. In this approach, a secret message encoded as a QR code is shared as n shares among n participants, where all the shares have the same version and error correction level similar to the secret QR code. A codeword is associated with each secret share such that each codeword comprises a data codeword and error-correction codeword. The secret is revealed by applying XOR operation on the codewords. This approach successfully decodes the secret from the tampered codewords, exploiting their error correction ability.
In a similar scheme, VSS is extended to the security of web services by Chen et al. [
34]. WeChat is one of the most popular messaging apps to send messages, pay bills, share photos and browse news. WeChat Mini-Programs allow developers to run web services, get feedback from users and even monetize their services. By scanning a WeChat Mini Program code, the corresponding program can be accessed. Security of these codes is a concern for users and developers. An
(n,
n) Mini Program Visual Secret-Sharing Scheme (MPVSS) proposed by the authors is used for identification and control of the program users. In this scheme, a secret program code is encoded into n shares using n cover codes. The secret code is decoded by XOR operation on the shares, exploiting the error-correction abilities of the code. A comparison of the representative VSS schemes is presented in
Table 1.
Researchers have shown that nonnegativity is a useful constraint for matrix factorization to learn parts representation of the data. The nonnegative-basis vectors obtained by factorization are used in distributed and sparse combinations to improve expressiveness in reconstructions. NMF is a classical mathematical tool employed in various domains to analyze data from different perspectives. Due to its demonstrated flexibility in the design of scalable and efficient approaches for solving large-scale problems and accuracy of solutions for real-world problems with noisy data, the Frobenius [
35] norm-based NMF is widely applied as in [
36].
Effectiveness of NMF in capturing the intrinsic geometric properties of images in image-classification problems was demonstrated by Cai and Sun [
37]. Shan et al. [
38] employed rank adaptive NMF in handwritten character recognition to extract local features of images. In combination with the Extreme Learning Machine (ELM) and k-Nearest Neighbor (KNN) algorithms, NMF was found to significantly reduce the image dimensions and improve classification accuracies. Symmetric Sparse NonNegative Matrix Factorization (ssNMF), a variant of NMF proposed by Li et al. [
39], in combination with sparse coding was demonstrated to be effective in the detection of community structure of the brain from magnetic resonance images.
The effectiveness of NMF in digital-content security applications has also been demonstrated in various research papers. The earlier works in this context are digital watermarking schemes for audio, image and video data. In these schemes, NMF is combined with other mathematical transformations such as Singular Value Decomposition (SVD), DFT, DWT, etc., to physically embed a watermark. In a VSS scheme proposed by Wang [
40] based on Discrete Fractional Fourier Transform (DFRFT) and NMF, the master and secret shares are constructed by applying NMF on the secret image. Similarly, a secret-sharing scheme for sharing Chinese characters represented as binary images was proposed in [
41]. In this work, the authors employed a modified NMF in which the elements of
W and
H were closer to 1 or 0. Though this paper claims that the Chinese characters could be shared as multiple parts, experimental results were shown for 1-stage NMF only. Further, no quality metrics were reported in this paper. However, similar works were not reported so far in this context.
An image-hashing approach proposed by Karsh et al. [
42], employing Projected Gradient Nonnegative Matrix Factorization (PG-NMF) for capturing local features of an image was demonstrated to effectively localize the counterfeit area in an attacked image. In an image encryption and multiplexing system proposed by Chang et al. [
43], NMF and digital holography were employed in the secured exchange of keys for protecting the digital images. In this method, NMF was applied on noise-like digital holograms generated out of the candidate image, resulting in basis and weighted image matrices. The basis images were secured as encrypted data while the column vectors in the weighting matrix served as the keys distributed among participants. In a digital watermarking scheme proposed by Chen [
44] et al., generalized NMF that does not impose a dimension- matching constraint, was employed to embed an image within an image. In this approach, the host image was factored into a basis matrix
A and a coefficient matrix
B. Though the authors claimed that the dimension of
A was (1,
n)
, which reduces the number of basis components, it was found that each element in the row vector
A was a 2-dimensional representation of the original host image. Watermark embedding was performed by directly replacing the smallest image component of
A. This scheme resulted in severe pixel expansion.
Loss of resolution in reconstructed images is a major drawback of visual cryptographic schemes, as discussed in the work of Weir and Yan [
45]. Effectiveness of super resolution algorithms in the construction of High-Resolution (HR) images from Low-Resolution (LR) images in pan-sharpening of aerial images, medical image analysis for minimum invasive robotic surgery, sign and number plate reading, iris recognition, etc., is demonstrated in the literature. Loss of quality in a reconstructed image was attributed to pixel expansion rate and relative difference in weights of the shares generated from different color levels as discussed in the work of Wu et al. [
46]. Loss of resolution of a reconstructed image can be reduced by minimizing pixel expansion and maximizing the relative difference between the weights of the shares. However, this issue can be resolved by improving the resolution of the recovered images with single-image, super-resolution algorithms. These algorithms are broadly classified as statistical, prediction-based, edge and patch or example-based methods.
A thorough investigation of these methods by Yang et al. [
47] showed that example-based methods reported in [
48,
49] achieve state-of-the-art performance. Conventional example-based methods exploit the internal similarities of a given image to perform a mapping between LR images and relevant HR images in a dataset for construction of HR images. Sparse coding is a kind of example-based, super-resolution method, which employs dictionaries in the construction of HR images. In this method, initially, overlapping patches densely cropped from the LR image are encoded into an intermediate sparse representation using an LR image dictionary. HR images are reconstructed from HR image patches estimated from HR dictionaries, using sparse coefficients. This method involves optimization of learning operations from dictionaries and mapping functions, which is realized using the SRCNN, which optimizes the learning, mapping and patch aggregation operations.
Our extensive review reveals that QR codes are employed mostly as carriers in QR code-based secret-sharing schemes. Further, the structure of the cover QR codes and the nature of error correction mechanisms play a vital role in determining the embedding capacity of the cover QR codes, which requires lengthy computations. It is also evident that NMF-based VSS schemes have not been explored extensively. In pursuit of new secret-sharing approaches, the proposed work intends to exploit the property of NMF in representation of image parts for creating secret shares from a QR code and recovering it from the shares. Further SRCNNs are demonstrated to effectively capture the relationship between LR and HR patches.
5. Experimental Results and Discussions
The proposed system was run in an Intel i5 processor with NVIDIA GeForce 920 MX GPU on the QR codes in the dataset described in
Section 3.1. The number of iterations i for Arnold transform is assumed to be 4, while rank values
k1 and
k2 depend on the input matrix. The 9-5-5 SRCNN model with hyper parameters
f1 = 9,
f2 = 5,
f3 = 5,
n1 = 32 and
n2 = 64 is employed in the QR code reconstruction. For structural regularization,
λs is initialized to 0.2 after empirical evaluations. In
Table 2, the QR codes, secret shares, and reconstructed QR codes along with image quality metrics are shown for 10 best samples in terms of SSIM values in decreasing order.
From the results in
Table 2, it is seen that the reconstructed QR codes possess reasonable visual quality from the PSNR values. The SSIM values also signify the similarity between the original and reconstructed QR codes. However, readability of the QR code is the prime requirement compared to the visual quality and similarity metrics. Secret sharing is accomplished in the proposed system only if the reconstructed secret is decodable. It has been verified that all the QR codes with different error-correction levels are decodable by the Zxing decoder. Finally, the decoded QR codes are transformed as binary images for performance evaluation of the system as the original dataset contains binary QR codes.
It is seen that the highest SSIM value of 0.9373 is achieved for a QR code of size 29 × 29, while the highest PSNR of 32.3889 dB is attained on recovering a QR code of 53 × 53. Further, analysis of the smallest values of the metrics show that least PSNR and SSIM values of 30.4143 dB and 0.8669 are attained on reconstruction of a 61 × 61 QR code. This result shows that performance metrics are irrespective of the size of the code. However, ability of the system to reconstruct decodable QR codes for all the test samples demonstrates the reliability of the system.
5.1. Performance Analysis
The experimental results clearly show that NMF is a suitable tool for secret sharing and recovery. Compared to the conventional secret-sharing schemes, which involve complex mathematical operations for secret sharing and reconstruction, the proposed system is comparatively simpler as it involves only factorization and multiplication operations. Further, the proposed system is devoid of the pixel expansion, a major limitation of the conventional secret-sharing schemes. Detailed comparisons of the proposed system with the existing secret-sharing systems with respect to different attributes are summarized in
Table 2. This comparison is an extension of the comparisons presented in [
22], which is a similar work in this context.
It has been shown that the complexity of NMF is
O(
kmn) in [
53] and earlier literature, where
k is the rank of the matrix. It is seen from
Table 3 that the proposed system exhibits lossless recovery similar to few existing methods. Here, the shadow size depends on rank of the matrix
k, which is less than
min(
m,n) for an
mxn matrix. Hence the share size is either the same as or less than that of the secret. Similar to [
21], the complexity of the proposed system is proportional to the number of shares or participants. Hence the complexity of the system is
O(
n).
The summary of the running times of the existing and proposed methods is presented in
Table 4. For the proposed system, the time for secret-share creation and reconstruction is the average values of the time taken for these operations on the 34 sample QR codes.
From
Table 4, it is seen that the time taken by the proposed method is comparatively very low. The comparisons presented in
Table 3 and
Table 4 are meant to provide a summary of the performance metrics only, as the proposed scheme is completely distinct from others. The methods proposed in [
17,
18,
20,
21] were based on evaluation of polynomials during secret-share construction and solving linear equations to reconstruct each pixel. The proposed scheme involves factorization for secret sharing, and reconstruction of secret is based on multiplications of shares and convolution in the SRCNN. Hence, the proposed method exhibits lower computational times with respect to [
17,
18,
20,
21] for both secret-share creation and secret reconstruction.
The (
n,
n) method in [
23] involved generation of basis matrices and random shares, and conversion of random shares to meaningful shares for construction of secret shares. Hence, the proposed system has lower computational time for secret creation. The decryption involves only XOR operations between shares in [
23] and therefore it is lower than the proposed system. Further,
CSRCNN the complexity of the
SRCNN is given in Equation (10).
where
In the proposed system, the complexity of the construction of the HR QR code from its LR representation is analogous to Equation (10). This complexity can be considerably reduced by modifying the values of hyper parameters. Further, there are no security constraints with the SRCNN.
As stated earlier, there are not many works reported on the sharing of QR codes, and for one such method presented in [
41] explicit results are not available. Unlike the conventional secret-sharing methods that focus on the visual quality of the secret, the proposed system has the rigorous requirement of the readability of the secret that is achieved with the proposed system.
5.2. Security Analysis
The security of the proposed system relies on the imperceptibility of secret shares, attributed to the NMF factorization. From the experimental results, it is seen that the secret shares do not contain any trace of the secret. Further, the size of the shares depends on the ranks k1 and k2 of the candidate matrices QA and H, respectively. It has been highlighted in literature that NMF is not unique for a given matrix V, and determination of the rank k is an NP hard problem. To recover the QR code from the shares, an attacker needs the following:
Secret Shares S1, S2 and S3.
Sequence of combinations of shares.
Number of iterations for inverse Arnold Transform i.
The QR code can be recovered only on combination of the shares in a particular sequence, i.e., S2 and S3 must be combined to recover H’, which must be combined with S1. In addition, the number of iterations i for scrambling the QR code and applying Arnold Transform also governs the security of the QR code. Inverse Arnold Transform with an erroneous number of iterations cannot recover the QR code. The degree of freedom for choosing the number of iterations is very large, which makes the retrieval of QR code difficult. In the proposed system, the ranks k1 and k2 are evaluated from the candidate matrices, by determining the number of linearly independent rows or columns larger than a tolerance, using the rank() function of MATLAB.
The information theoretical and computational security analysis of the proposed system is as below.
Information Theoretic Security
Any (n,n) secret-sharing scheme is information theoretic secure, if the secret cannot be revealed by any (n − 1) number of shares.
In the proposed system, the shares have no visible components of the secret. According to the principle of NMF, the original matrix can be reconstructed only from the basis and coefficient matrices. In the proposed system, the secret shares are derived from the basis and coefficient matrices of a QR code, without which the QR code cannot be constructed. Hence, the proposed system is information theoretic secure.
Computational Security
Any (n,n) secret-sharing scheme is computationally secure, if it is infeasible to invert the scheme from (n − 1) number of shares.
It is very much evident that all the shares S1, S2 and S3 must be combined for the reconstruction of Q’. Hence, it is infeasible to recover the secret unless all the shares are available. Generally, inversion of the secret-sharing scheme is associated with hardness assumptions of the computational procedures involved, such as use of encryption algorithms such as Advanced Encryption Standard (AES) and Cipher Block Chaining (CBC).
In the proposed system, the reconstruction involves only multiplication operations and inverse Arnold Transform. With either one or two shares available out of the three shares, it is not possible to construct the other shares and construct the secret, as each share is incrementally constructed starting from the factorization of the secret. Further, the security of the proposed system is demonstrated in this section with a quantitative analysis on the difficulty of brute force attacks and construction of imperceptible secrets from tampered shares.
5.2.1. Brute Force Attack
Here, for a given
m×
m secret, we evaluate the number of computations required to generate the shares and reconstruct the secret. We arrive at the mathematical expressions for various computations and evaluate them with respect to the dataset used in our experiments. Similarly, we calculate the number of combinations required for brute-force attack on the dataset by the approach proposed in [
23] and present a comparison.
In the proposed system, the secret shares S1, S2 and S3 are of the dimensions m×k1, k1×k2 and k2×n, respectively. For the entire data set m=n and hence the share dimensions are m×k1, k1×k2 and k2×m, respectively for S1, S2 and S3.
The attacker needs to construct the individual shares by brute-force approach to recover the secret. Representing each pixel by either 0 or 1
, the number of combinations for recovering the shares
S1, S2 and
S3 is given in Equation (11). Further,
k1 and
k2 can assume any value from 1 to
m according to Equation (2). This increases the number of combinations, and
C can be expressed as in Equation (12).
Substituting
k1 and
k2 by the minimum value 1 in Equation (12), the minimum number of combinations is expressed as
Cmin in Equation (13).
Similarly, substituting
k1 and
k2 by the maximum value
m in Equation (12)
, the maximum number of combinations is expressed as
Cmax as in Equation (14).
In the
(n,n) secret-sharing scheme proposed in [
23], 2
m×
m×
n combinations are required to construct
n shares, each of size
m×
m. A comparison of the number of combinations for constructing the shares in [
23] and the proposed system is given in
Table 4, for the secrets of varying sizes in our dataset.
It is seen from
Table 5 that the number of combinations for constructing 3 shares is very high for the proposed system compared to that of [
23]. A graphical illustration of the above table in
Figure 8 shows an identical pattern of the plots, which reveals that the number of combinations of shares linearly increases with the size of the secret. For a secret of size 29 × 29, the proposed method requires 2
58 additional combinations to be tried compared to [
23], which affirms the security of the proposed approach.
Further, the secret image is reconstructed by multiplying
S2 and
S3 first and the resultant with
S1 in the proposed system
. As the attacker is unaware of the share labels, all the possible combinations must be tried. For 3 shares, the number of combinations is 2
3. Two multiplication operations are required between the shares to recover the secret. From the above, the minimum and maximum number of total computations
Tmin and
Tmax can be expressed as in Equations (15) and (16).
Further, inverse Arnold Transform must be applied on the scrambled secret reconstructed from the shares. Generally, an image of 2
d pixels requires 3(2
d−2)transformations to return to its original position. The number of transformations required for the test data set is given in
Table 6. This further increases the number of computations to a greater extent.
Based on Equations (15) and (16) and column 3 of
Table 6, the number of computations to be performed to recover the unscrambled secret is evaluated and given in
Table 7. For a comparative analysis, this value is presented for [
23], considering the XOR operations between
n shares. For 3 shares, 2 XOR operations are to be performed which results in
computations.
A graphical representation of
Table 7 shown in
Figure 9 matches that of
Figure 8, signifying the consistent behavior of the proposed model compared to [
23] with respect to the number of combination of shares to be considered and the number of computations to recover the secret by bruteforce attack. Observation of the number of computations for a 29 × 29 QR code shows that 3 × 288 additional computations are required to recover the secret compared to [
23]. However, it is seen that the number of computations required by the proposed system is very high compared to [
23] as the secret size increases.
Finally, we present the number of computations evaluated with Equation (10) for the generation of HR secret from the LR secret in
Table 8.
Graphical illustrations of
Table 6 and
Table 8 are given in
Figure 10, which summarizes the number of iterations of Arnold Transform and the number of computations required for super resolution of the secret obtained by brute-force attack. It is seen that the plots are identical, reinstating a linear increase in computational complexities with respect to the size of the secret.
It is seen that the number of computations increases with the size of the secret. From the number of computations required to construct a secret, it is seen that it is difficult for an attacker to construct a secret even with extreme computational resources.
5.2.2. Attack on Shares
In secret-sharing schemes, the secrets are susceptible to intentional or accidental attacks. These shares may be tampered with by noise addition to the entire secret or selective modification of content. We show that the proposed system is resistant to these attacks with three experiments.
The first attack is posed by completely replacing a secret share by other. It is seen from
Table 2 that the secret share
S3 exhibits a similar geometric pattern with significant values along the diagonals. This leads to an implication that
S3 can be guessed and constructed with arbitrary significant values, challenging the security of the system. We experimented with this with the 5th and the 6th QR codes in [
50], named
cite_09_Q_small and
cite_10_Q_small, respectively, each with dimension 41 × 41. All the shares generated from these QR codes have the same dimension. We have applied the reconstruction procedure on
S2 of the 5th QR code and
S3 of the 6th QR code to generate
H’. The QR code
Q’ is reconstructed by combining this
H’ and
S1 of the 5th QR code. The results of this experiment are shown in
Figure 11. It is seen that the reconstructed QR code is completely indiscernible, testifying to the security of the proposed system.
The second attack is launched by selective tampering of pixels in
S1. The impact of this attack is tested by flipping some of the pixels in
S1 of the 6th QR code and assigning 0 a block of 10 × 10 pixels. The shares corresponding to this QR code and the reconstructed secret are shown in
Figure 12. It is seen that the reconstructed QR code is completely distorted.
The third attack is performed by addition of noise to
S2. Salt-and-pepper noise of density 0.02 is added to the share
S2 of the 6th QR code to study the effect of accidental noise addition. The shares and the reconstructed secret are shown in
Figure 13. In spite of the secret being distorted, the structure of the secret is not completely lost. However, this secret is not decodable by the QR code reader. A noise density of 0.02 affects 2% of pixels in an image. We see that modification of a share by 2% introduces obvious distortions in the secret, rendering it unreadable.
5.3. Limitations and Future Works
Initially, we present the limitation of this research. This paper reports complete reconstruction and successful decoding of the QR codes in the dataset and also presents image-quality measures. However, most recent representative works do not contain such explicit results for comparison. The authors report complete recovery and decoding of a 41 × 41 QR code in [
31] without obvious performance analysis of the (3,3) secret-sharing approach on a complete dataset. Similarly, in [
32] only subjective results are presented for a small set of QR codes without objective results. Lack of comparative analysis with a standard dataset and quantitative measures restricts further explorations regarding the enhancement of the approaches. Further, due to lack of relevant works, security of the proposed system is compared only with that of [
23], which is an (
n,
n) secret-sharing scheme. However, it shares the secret as meaningful shares.
From statistical evaluations and experiments by intentional modification of shares, it is seen that the proposed system is secure against brute-force and tampering attacks. However, appearance of uniform geometric patterns in all S3 is a vital security concern, which requires further investigation. The security of the system can be further improved by scrambling the shares and constructing meaningful shares, which do not raise suspicion. The rank() function employed in secret creation evaluates the rank of the matrix as the number of singular values of a matrix, greater than a default tolerance. Since NMF is applied in two stages in this work, the tolerance values can also be used to enforce the security by assuming suitable values. Further, the number of NMF stages can be increased to improve the security of the system.
Of late, color QR codes that have high data capacity and flexibility of encoding are widely used in product and service marketing. However, decoding them is a challenging task due to variations in color maps, channel interferences and the resolution of the camera. Further, applying VSS on color QR codes incurs additional costs, which increases the complexity of the system. The proposed VSS scheme can be extended to color QR codes with the same framework, using Nonnegative Tensor Factorization (NTF) in place of NMF.