Research Article

Robust Visual Secret Sharing Scheme Applying to QR Code

Table 2

Performance of proposed technique against various attacks.

Type of Attack Parameter Whether can be decoded correctly (yes/no)? Type of Attack Parameter Whether can be decoded correctly (yes/no)?

JPEG Compression Q = 90 yes Rotation 15° yes
Q =85 yes 30° yes
Q = 8 yes 45° yes
Q = 75 yes 60° yes
Q = 70 no 75° yes

Gaussian NoiseMean = 0,
Variance =1
yesResizing 0.8yes
Mean = 0,
Variance =2
yes 1.1yes
Mean = 0,
Variance =3
yes 1.4yes
Mean = 0,
Variance =4
yes 1.7yes
Mean = 0,
Variance =5
yes 2.0yes

Gaussian NoiseMean = 0,
Variance =6
yesCropping 1/100yes
Mean = 0,
Variance =7
yes 1/25yes
Mean = 0,
Variance =8
yes 9/100yes
Mean = 0,
Variance =9
no 4/25yes
1/4yes
9/25no