Research Article
Robust Visual Secret Sharing Scheme Applying to QR Code
Algorithm 2
Secret image recovery of the proposed scheme.
| Input: shares ; threshold parameters ; | | Output: the reconstructed secret QR code image . | | for to do | | Read the secondary plane of share to create binary QR image as | | end for | | Read the version as v and level of error correction noted as l of image with QR code decoder. | | Based on v and l, we can get the total number of the codewords in as according to the standard [16]. For each codeword in | | note as . | | for to do | | , is the result of XORing operation. | | end for | | Create the bits in other regions based on the version and level of error correction, after that put them and the bits of codeword | | together into a new image to reconstruct a QR code image . | | Output the image . |
|