{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:55:34Z","timestamp":1774540534362,"version":"3.50.1"},"reference-count":28,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>This article describes how a visual cryptography scheme, with one prominent feature\u2014decrypting simply, has attracted much research attention since it was first proposed. However, meaningless shares remain a continuing challenge in the development of VCS. In this article, an extended visual cryptography scheme (EVCS) based on XOR operation is proposed, in which QR codes are utilized as the cover images of shares. By designation, all the shares generated in the scheme can be decoded by standard QR code readers with specific meaning. In addition, to achieve high sharing efficiency, a method of simultaneously sharing a secret QR code among multiple subsets is presented. Also, sufficient and necessary conditions of the method are analyzed with an integer programming model, providing a general construction approach for EVCS under arbitrary access structures.<\/jats:p>","DOI":"10.4018\/ijdcf.2019010101","type":"journal-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T20:19:21Z","timestamp":1539289161000},"page":"1-17","source":"Crossref","is-referenced-by-count":1,"title":["General Construction for Extended Visual Cryptography Scheme Using QR Codes"],"prefix":"10.4018","volume":"11","author":[{"given":"Yuqiao","family":"Cheng","sequence":"first","affiliation":[{"name":"Science and Technology on Information Assurance Laboratory, Beijing, China"}]},{"given":"Zhengxin","family":"Fu","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Bin","family":"Yu","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Gang","family":"Shen","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019010101-0","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2770-7"},{"key":"IJDCF.2019010101-1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1996.0076"},{"key":"IJDCF.2019010101-2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2641378"},{"key":"IJDCF.2019010101-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.05.014"},{"key":"IJDCF.2019010101-4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40253-6_25"},{"key":"IJDCF.2019010101-5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2106291"},{"key":"IJDCF.2019010101-6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3250-4"},{"key":"IJDCF.2019010101-7","unstructured":"ISO\/IEC. (2015). ISO\/IEC 18004:2015 Information - Automatic identification and data capture techniques - QR Code barcode symbology specification."},{"key":"IJDCF.2019010101-8","article-title":"Collaborative visual cryptographic schemes.","author":"X.Jia","year":"2016","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"IJDCF.2019010101-9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2056376"},{"key":"IJDCF.2019010101-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2010.08.006"},{"key":"IJDCF.2019010101-11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2116782"},{"key":"IJDCF.2019010101-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09644-5"},{"issue":"11","key":"IJDCF.2019010101-13","first-page":"3460","article-title":"Two-level information management scheme based on visual cryptography and QR code.","volume":"33","author":"Y.Liu","year":"2016","journal-title":"Jisuanji Yingyong Yanjiu"},{"key":"IJDCF.2019010101-14","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053419"},{"key":"IJDCF.2019010101-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.10.011"},{"key":"IJDCF.2019010101-16","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0285-5"},{"key":"IJDCF.2019010101-17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2389372"},{"key":"IJDCF.2019010101-18","first-page":"1","article-title":"Visual secret sharing scheme for (k, n) threshold based on qr code with multiple decryptions.","volume":"9","author":"S.Wan","year":"2017","journal-title":"Journal of Real-Time Image Processing"},{"key":"IJDCF.2019010101-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.02.015"},{"key":"IJDCF.2019010101-20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2365-8"},{"key":"IJDCF.2019010101-21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2346014"},{"key":"IJDCF.2019010101-22","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-013-0465-y"},{"key":"IJDCF.2019010101-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2014.12.002"},{"key":"IJDCF.2019010101-24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44350-8_19"},{"key":"IJDCF.2019010101-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2015.09.016"},{"key":"IJDCF.2019010101-26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2013.2276708"},{"key":"IJDCF.2019010101-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.012"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=215318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T08:13:53Z","timestamp":1651824833000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":28,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019010101","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}