Research Article
Robust Visual Secret Sharing Scheme Applying to QR Code
Table 2
Performance of proposed technique against various attacks.
| Type of Attack | Parameter | Whether can be decoded correctly (yes/no)? | Type of Attack | Parameter | Whether can be decoded correctly (yes/no)? |
| JPEG Compression | Q = 90 | yes | Rotation | 15° | yes | Q =85 | yes | 30° | yes | Q = 8 | yes | 45° | yes | Q = 75 | yes | 60° | yes | Q = 70 | no | 75° | yes |
| Gaussian Noise | Mean = 0, Variance =1 | yes | Resizing | 0.8 | yes | Mean = 0, Variance =2 | yes | 1.1 | yes | Mean = 0, Variance =3 | yes | 1.4 | yes | Mean = 0, Variance =4 | yes | 1.7 | yes | Mean = 0, Variance =5 | yes | 2.0 | yes |
| Gaussian Noise | Mean = 0, Variance =6 | yes | Cropping | 1/100 | yes | Mean = 0, Variance =7 | yes | 1/25 | yes | Mean = 0, Variance =8 | yes | 9/100 | yes | Mean = 0, Variance =9 | no | 4/25 | yes | 1/4 | yes | 9/25 | no |
|
|