Browse > Article
http://dx.doi.org/10.6109/jicce.2018.16.3.179

QR Barcode Readability Technique of the JPEG Image Based on Digital Watermarking  

Seo, Jung Hee (Department of Computer Engineering, Tongmyong University)
Park, Hung Bok (Department of Computer Engineering, Pukyong National University)
Abstract
This paper proposes a quick response (QR) barcode watermarking algorithm in order to improve readability of the QR barcode in a JPEG image. The proposed algorithm embeds a watermark in a wavelet based-low frequency band for watermark robustness, and visually extracts a QR barcode after embedding the QR barcode image with confidential information into the original image via imperceptible watermarking technology. The visually extracted QR barcode watermark uses an approach to authenticate the ownership more easily through a common hardware and software-based mobile barcode reader app. Therefore, the QR barcode watermark may improve the ability to easily detect watermarks efficiently as well as imperceptibility and robustness, which is the main watermark requirement by embedding the QR barcode with watermark text information in a digital image and when compare to conventional watermarks.
Keywords
Digital watermarking; Imperceptibility; QR barcode watermarking; Robustness; Wavelet transform;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Eyadat, H. Morris, and I. M. El-Ddin, "Barcode watermarking," in Proceedings of 2009 6th International Conference on Information Technology: New Generations, Las Vegas, NV, pp. 1296-1300, 2009. DOI: 10.1109/ITNG.2009.216.   DOI
2 A. Nambutdee and S. Airphaiboon, "Medical image encryption based on DCT-DWT domain combining 2D-DataMatrix barcode," in Proceedings of the 8th Biomedical Engineering International Conference (BMEiCON), Pattaya, Thailand, pp. 1-5, 2015. DOI: 10.1109/BMEiCON.2015.7399508.   DOI
3 C. M. Li, P. Hu, and W. C. Lau, "AuthPaper: protecting paper-based documents and credentials using authenticated 2D barcodes," in Proceedings of 2015 IEEE International Conference on Communications (ICC), London, UK, pp. 7400-7406, 2015. DOI: 10.1109/ICC.2015.7249509.   DOI
4 P. Y. Lin, "Distributed secret sharing approach with cheater prevention based on QR code," IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 384-392, 2016. DOI: 10.1109/TII.2015.2514097.   DOI
5 N. Damera-Venkata, J. Yen, V. Monga, and B. L. Evans, "Hardcopy image barcodes via block-error diffusion," IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 1977-1989, 2005. DOI: 10.1109/TIP.2005.859776.   DOI
6 A. Noore, N. Tungala, and M. M. Houck, "Embedding biometric identifiers in 2D barcodes for improved security," Computers & Security, vol. 23, no. 8, pp. 679-686, 2004. DOI: 10.1016/j.cose.2004.09.007.   DOI
7 H. Q. Wang, F. Shang, Q. C. Ji, and J. C. Hao, "Robust digital watermarking adopting barcode in image," in Proceedings of 2009 1st International Conference on Information Science and Engineering (ICISE), Nanjing, China, pp. 660-662, 2009. DOI: 10.1109/ICISE.2009.1037.   DOI
8 P. Premaratne and F. Safaei, "2D barcodes as watermarks in image authentication," in Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science, Melbourne, Australia, pp. 432-437, 2007. DOI: 10.1109/ICIS.2007.2.   DOI
9 G. Prabakaran, R. Bhavani, and M. Ramesh, "A robust QR-code video watermarking scheme based on SVD and DWT composite domain," in Proceedings of 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), Salem, India, pp. 251-257, 2013. DOI: 10.1109/ICPRIME.2013.6496482.   DOI
10 R. Xie, C. Hong, S. Zhu, and D. Tao, "Anti-counterfeiting digital watermarking algorithm for printed QR barcode," Neurocomputing, vol. 167, pp. 625-635, 2015. DOI: 10.1016/j.neucom.2015.04.026.   DOI
11 P. Y. Lin, "Imperceptible visible watermarking based on postcamera histogram operation," Journal of Systems and Software, vol. 95, pp. 194-208, 2014. DOI: 10.1016/j.jss.2014.04.038.   DOI
12 W. Y. Chen, "Multiple-watermarking scheme of the European Article Number Barcode using similar code division multiple access technique," Applied Mathematics and Computation, vol. 197, no. 1, pp. 243-261, 2008. DOI: 10.1016/j.amc.2007.07.078.   DOI
13 T. Maehara, K. Nakai, R. Ikeda, K. Taniguchi, and S. Ono, "Watermark design of two-dimensional barcodes on mobile phone display by evolutionary multi-objective optimization," in Proceedings of 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), Kitakyushu, Japan, pp. 149-154, 2014. DOI: 10.1109/SCIS-ISIS.2014.7044673.   DOI
14 V. Sujatha, "Auditing of Storage Security on Encryption," Asia-Pacific Journal of Convergent Research Interchange, vol. 3, no. 2, pp. 1-9, 2017. DOI: 10.21742/APJCRI.2017.06.01.   DOI
15 J. H. Seo and H. B. Park, "Scalable digital watermarking techniques for optimal distributed contents," The KIPS Transactions: Part B, vol. 12, no. 3, pp. 291-300, 2005. DOI: 10.3745/KIPSTB.2005.12B.3.291.   DOI
16 S. Vongpradhip and S. Rungraungsilp, "QR code using invisible watermarking in frequency domain," in Proceedings of 2011 9th International Conference on ICT and Knowledge Engineering, Bangkok, Thailand, pp. 47-52, 2012. DOI: 10.1109/ICTKE.2012.6152412.   DOI
17 X. Feng and X. Ji, "A blind watermarking method with strong robust based on 2D-barcode," in Proceedings of International Conference on Information Technology and Computer Science, Kiev, Ukraine, pp. 452-456, 2009. DOI: 10.1109/ITCS.2009.231.   DOI