{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:08Z","timestamp":1740174848025,"version":"3.37.3"},"reference-count":9,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370218"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2017]]},"abstract":"QR code (quick response code) is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant\u2019s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS) and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.<\/jats:p>","DOI":"10.1155\/2017\/4356038","type":"journal-article","created":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:40:29Z","timestamp":1490290829000},"page":"1-12","source":"Crossref","is-referenced-by-count":21,"title":["Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1239-6148","authenticated-orcid":true,"given":"Jianfeng","family":"Lu","sequence":"first","affiliation":[{"name":"Institute of Graphics and Image, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Zaorang","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Graphics and Image, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Lina","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Graphics and Image, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6001-2906","authenticated-orcid":true,"given":"Wenqiang","family":"Yuan","sequence":"additional","affiliation":[{"name":"Institute of Graphics and Image, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5453-226X","authenticated-orcid":true,"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Graphics and Image, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":true,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2016.75"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2015.6452"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2012.11.218"},{"year":"2015","key":"12"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.5120\/18044-8931"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.03.026"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69304-8_49"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44350-8_19"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0053419"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/4356038.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/4356038.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/4356038.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:40:31Z","timestamp":1490290831000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2017\/4356038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":9,"alternative-id":["4356038","4356038"],"URL":"https:\/\/doi.org\/10.1155\/2017\/4356038","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2017]]}}}