DOI QR코드

DOI QR Code

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

  • Huang, Peng-Cheng (Xiamen University of Technology, Department of Computer Science) ;
  • Li, Yung-Hui (National Central University, Department of Computer Science and Information Engineering) ;
  • Chang, Chin-Chen (Feng Chia University, Department of Information Engineering and Computer Science) ;
  • Liu, Yanjun (Feng Chia University, Department of Information Engineering and Computer Science)
  • Received : 2017.07.26
  • Accepted : 2017.12.12
  • Published : 2018.05.31

Abstract

QR codes as public patent are widely used to acquire the information in various fields. However, it faces security problem when delivering the privacy message by QR code. To overcome this weakness, we propose a secret hiding scheme by improving exploiting modification direction to protect the private message in QR code. The secret messages will be converted into octal digit stream and concealed to the cover QR code by overwriting the cover QR code public message bits. And the private messages can be faithfully decoded using the extraction function. In our secret hiding scheme, the QR code public message still can be fully decoded publicly from the marked QR codes via any standard QR Code reader, which helps to reduce attackers' curiosity. Experiments show that the proposed scheme is feasible, with high secret payload, high security protection level, and resistant to common image post-processing attacks.

Keywords

References

  1. Denso Wave Inc. "QR Code Standardization," 2003.
  2. J. Z. Gao, L. Prakash, and R. Jagatesan, "Understanding 2d-Barcode Technology and Applications in M-Commerce-Design and Implementation of a 2d Barcode Processing Solution," in Proc. of Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, Vol. 2, pp. 49-56, Aug. 2007.
  3. L. Bi, Z. Feng, M. Liu, and W. Wang, "Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code," in Proc. of Electronic Commerce and Security, 2008 International Symposium on, pp. 527-530, 2008.
  4. N. Teraura, and K. Sakurai, "Information Hiding in Subcells of a Two-Dimensional Code," in Proc. of 2012 IEEE 1st Global Conference on Consumer Electronics (GCCE), pp. 652-656, Oct. 2012.
  5. I. Tkachenko, W. Puech, C. Destruel, O. Strauss, J.-M. Gaudin, and C. Guichard, "Two-Level QR Code for Private Message Sharing and Document Authentication," IEEE Transactions on Information Forensics and Security, Vol. 11, No. 3, pp. 571-583, 2016. https://doi.org/10.1109/TIFS.2015.2506546
  6. I. S. Reed, and G. Solomon, "Polynomial Codes over Certain Finite Fields," Journal of the Society for Industrial and Applied Mathematics, Vol. 8, No. 2, pp. 300-304, 1960. https://doi.org/10.1137/0108018
  7. Y.-J. Chiang, P.-Y. Lin, R.-Z. Wang, and Y.-H. Chen, "Blind QR Code Steganographic Approach Based Upon Error Correction Capability," KSII Transactions on Internet & Information Systems, Vol. 7, No. 10, pp. 2572-2543, 2013.
  8. J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on Wet Paper," IEEE Transactions on signal processing, Vol. 53, No. 10, pp. 3923-3935, 2005. https://doi.org/10.1109/TSP.2005.855393
  9. T. V. Bui, N. K. Vu, T. T. Nguyen, I. Echizen, and T. D. Nguyen, "Robust Message Hiding for Qr Code," in Proc. of 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520-523, Aug. 2014.
  10. P. Elias, "Error-Correcting Codes for List Decoding," IEEE Transactions on Information Theory, Vol. 37, No. 1, pp. 5-12, 1991. https://doi.org/10.1109/18.61123
  11. P.-Y. Lin, and Y.-H. Chen, "QR Code Steganography with Secret Payload Enhancement," in Proc. of 2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 1-5, Jul. 2016, Seattle, USA.
  12. X. Zhang, and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, Vol. 10, No. 11, pp. 781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
  13. P.-Y. Lin, and Y.-H. Chen, "High Payload Secret Hiding Technology for QR Codes," EURASIP Journal on Image and Video Processing, Vol. 2017, No. 1, pp. 14, 2017. https://doi.org/10.1186/s13640-016-0155-0
  14. S.-Y. Shen, and L.-H. Huang, "A Data Hiding Scheme Using Pixel Value Differencing and Improving Exploiting Modification Directions," Computers & Security, Vol. 48, pp. 131-141, 2015. https://doi.org/10.1016/j.cose.2014.07.008
  15. X.-T. Wang, C.-C. Chang, C.-C. Lin, and M.-C. Li, "A Novel Multi-Group Exploiting Modification Direction Method Based on Switch Map," Signal Processing, Vol. 92, No. 6, pp. 1525-1535, 2012. https://doi.org/10.1016/j.sigpro.2011.12.013

Cited by

  1. A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code vol.2019, pp.None, 2019, https://doi.org/10.1155/2019/7937816
  2. High-payload secret hiding mechanism for QR codes vol.78, pp.16, 2018, https://doi.org/10.1007/s11042-019-7600-x
  3. An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission vol.14, pp.7, 2018, https://doi.org/10.3837/tiis.2020.07.007