Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography

36Citations
Citations of this article
99Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

QR code (quick response code) is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant's beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS) and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.

Cite

CITATION STYLE

APA

Lu, J., Yang, Z., Yuan, W., Li, L., Chang, C. C., & Li, L. (2017). Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography. Mobile Information Systems, 2017. https://doi.org/10.1155/2017/4356038

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free