DOI QR코드

DOI QR Code

Reversible Data Hiding based on QR Code for Binary Image

이진 이미지를 위한 QR 코드 기반의 가역적인 데이터 은닉

  • Kim, Cheonshik (Dept. of Digital Medial Engineering, Anyang University)
  • 김천식 (안양대학교 디지털미디어공학과)
  • Received : 2014.09.07
  • Accepted : 2014.12.12
  • Published : 2014.12.31

Abstract

QR code (abbreviated from Quick Response Code) is code system that is strong in against to apply image processing techniques (skew, warp, blur, and rotate) as QR codes can store several hundred times the amount of information carried by ordinary bar codes. For this reason, QR code is used in various fields, e.g., air ticket (boarding control system), food(vegetables, meat etc.) tracking system, contact lenses management, prescription management, patient wrist band (patient management) etc. In this paper, we proposed reversible data hiding for binary images. A reversible data hiding algorithm, which can recover the original image without any distortion from the marked (stego) image after the hidden data have been extracted, because it is possible to use various kinds of purposes. QR code can be used to generate by anyone so it can be easily used for crime. In order to prevent crimes related QR code, reversible data hiding can confirm if QR code is counterfeit or not as including authentication information. In this paper, we proved proposed method as experiments.

QR 코드는 바코드보다 수백 배 많은 양의 데이터를 인코딩할 수 있도록 기능을 향상시킨 코드체계로서 이미지 훼손에 강하다. 이러한 이유로 QR 코드는 최근에 다양한 분야에서 사용되고 있다. 예를 들어 항공권 티켓 (보딩 통제 시스템), 푸드 (야채, 육류 이력) 추적 시스템, 콘택트렌즈 관리, 처방전 관리, 환자 손목밴드 (환자관리) 등에 사용된다. 본 논문에서는 이진 이미지에 대한 가역적인 데이터은닉 방법을 제안한다. 가역적인 데이터 은닉방법은 스테고 이미지로부터 데이터를 추출한 후 원본 이미지를 복원할 수 있기 때문에서 다양한 목적으로 활용될 수 있다. QR 코드는 누구나 코드를 생성할 수 있으므로 위조된 QR 코드를 이용하여 범죄에 사용할 수 있다. 본 논문에서는 이를 방지하기 위해서 이진 QR 코드 이미지에 인증 데이터를 은닉하여 위조여부를 확인할 수 있도록 하였다. 본 논문에서는 제안한 방법은 실험을 통해서 입증을 하였다.

Keywords

References

  1. C. Kim, "Data Hiding Based on BTC using EMD, The Journal of The Institute of Internet," Broadcasting and Communication (JIIBC) vol.14, no.2, pp.11-16, 2014. https://doi.org/10.7236/JIIBC.2014.14.2.11
  2. B.H. Lee, "Technique for production and encoding of New dot-type Print Watermark Pattern," Journal of the Korea Academia Industrial cooperation Society, vol.10, no.5, pp.979-984, 2009. https://doi.org/10.5762/KAIS.2009.10.5.979
  3. H.J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang, "Improved modification direction methods," Computers & Mathematics with Applications, vol. 60, no.2, pp.319-325, 2010. https://doi.org/10.1016/j.camwa.2010.01.006
  4. C. Kim, "Data hiding by an improved exploiting modification direction," Multimedia Tools and Applications, vol.69, no.3, pp 569-584, 2014. https://doi.org/10.1007/s11042-012-1114-0
  5. N. Provos, and P. Honeyman, "Hide and seek: an introduction to steganography," Security & Privacy, IEEE, vol.1, no.3, pp. 32-44, 2003. https://doi.org/10.1109/MSECP.2003.1203220
  6. C.L. Tsai, H.F. Chiang, K.C. Fan and C.D. Chung, "Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism," Pattern Recognition, vol.38, no.11, pp.1993-2006, 2005. https://doi.org/10.1016/j.patcog.2005.03.001
  7. S. Falkner, P. Kieseberg, D. E. Simos, C. Traxler, E. Weippl, "E-voting Authentication with QR-codes," Lecture Notes in Computer Science, vol.8533, pp.149-159, 2014.
  8. M.S. Fu, and O.C. Au. "Data Hiding by Smart Pair Toggling for Halftone Images," In IEEE Int. Conf. Acoustics Speech and Signal Processing, vol. 4, pp.2318-2321, 2000.
  9. H.Y. Kim, and R.L. de Queiroz, "Alteration locating authentication watermarking for binary images," In in Proc. Int. Workshop Digital watermarking, vol. 1, pp.125-136, 2004.
  10. Q. Mei, E.K. Wongand N. Memon, "Data Hiding in Binary Text Documents," In Proceedings of SPIE, vol. 4314, 369-375, 2001.
  11. M. Wu, and B. Liu, "Data Hiding in Binary Image for Authentication and Annotation," IEEE Trans. on Multimedia, vol.6, no.4, pp. 528-538, 2004. https://doi.org/10.1109/TMM.2004.830814
  12. Y.-C. Tseng, and H.-K Pan, "Secure and Invisible Data Hiding in 2-Color Images," In INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp.887-896, 2001.
  13. C.-C Chang, C.-S. Tseng and C.-C. Lin "Hiding Data in Binary Images," In Lecture Notes in Computer Science, vol. 3439, pp.438-349, 2005.
  14. X. Guorong, Q.S. Yun, C. Peiqi, T. Xuefeng, T. Jianzhongand L. Jue, "Reversible binary image data hiding by run-length histogram modification," In International Conference on Pattern Recognition, vol.1, pp.1-4, 2008.
  15. Y.A. HO, Y.K. Chan, H.C. Wu and Y.P. Chu. 2009. "High-capacity reversible data hiding in binary images using pattern substitution," Computer Standards & Interfaces vol.31, pp.787-794, 2009. https://doi.org/10.1016/j.csi.2008.09.014

Cited by

  1. Embedded Multi-LED Display System based on Wireless Internet using Otsu Algorithm vol.16, pp.6, 2016, https://doi.org/10.7236/JIIBC.2016.16.6.329