Blind QR Code Steganographic Approach Based upon Error Correction Capability |
Chiang, Yin-Jen
(Department of Computer Science and Engineering, Yuan Ze University)
Lin, Pei-Yu (Department of Information Communication, Yuan Ze University) Wang, Ran-Zan (Department of Computer Science and Engineering, Yuan Ze University) Chen, Yi-Hui (Department of Applied Informatics and Multimedia, Asia University) |
1 | T. Sun and D. Zhou "Automatic identification technology - Application of two-dimensional code," in Proc. of 2011 IEEE International Conference on Automation and Logistics (ICAL), pp. 164-168, 2011. |
2 | D. H. Shin, J. Jung and B. H. Chang, "The psychology behind QR codes: User experience perspective," Computers in Human Behavior, vol. 28, no. 4, pp. 1417-1426, 2012. DOI ScienceOn |
3 | C. Chen, A. C. Kot and H. Yang, "A two-stage quality measure for mobile phone captured 2D barcode images," Pattern Recognition, vol. 46, no. 9, pp. 2588-2598, 2013. DOI ScienceOn |
4 | Psytec QR code editor software, [Online]. Available: http://www.psytec.co.jp/docomo.html |
5 | Denso-wave, [Online], Available: http://www.qrcode.com/en/index.html |
6 | ISO/IEC 18004, "Information technology Automatic identification and data capture techniques Bar code symbology QR Code," 2000. |
7 | J. C. Chuang, Y. C. Hu and H. J. Ko, "A novel secret sharing technique using QR code," International Journal of Image Processing, vol. 4, pp.468-475, 2010. |
8 | C. H. Chung, W. Y. Chen and C. M. Tu, "Image hidden technique using QR-Barcode," in Proc. of Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. |
9 | M. Sun , J. Si and S. Zhang, "Research on embedding and extracting methods for digital watermarks applied to QR code images," New Zealand Journal of Agricultural Research, vol. 50, pp. 861-867, 2007. DOI ScienceOn |
10 | W. Y. Chen and J. W. Wang, "Nested image steganography scheme using QR-barcode technique," Optical Engineering, vol. 48, no. 5, pp. 057004-01-057004-10, 2009. DOI ScienceOn |
11 | H. C. Huang, F. C. Chang and W. C. Fang, "Reversible data hiding with histogram-based difference expansion for QR Code applications," IEEE Transactions on Consumer Electronics, vol. 57, no. 2, pp. 779-787, 2011. DOI ScienceOn |
12 | S. Dey, K. Mondal, J. Nath and A. Nath, "Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: ASA_QR algorithm," International Journal of Modern Education and Computer Science, vol. 6, pp. 59-67, 2012. |
13 | L. Li, R. L. Wang and C. C. Chang, "A digital watermark algorithm for QR code," International Journal of Intelligent Information Processing, vo1. 2, no. 2, pp.29-36, 2011. |
14 | M. Gao and B. Sun, "Blind watermark algorithm based on QR barcode," in Proc. of Foundations of Intelligent Systems : Proceedings of the Sixth International Conference on Intelligent Systems and Knowledge Engineering, vol.122, pp. 457-462, 2011. |
15 | S. Rungraungsilp, M. Ketcham, V. Kosolvijak and S. Vongpradhip, "Data hiding method for QR code based on watermark by compare DCT with DFT domain," in Proc. of International Conference on Computer and Communication Technologies, pp. 144-148, 2012. |
16 | W. P. Fang, "Offline QR Code authorization based on visual cryptography," in Proc. of Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.89-92, 2011. |
17 | J. Fridrich, M. Goljan and D. Soukal, "Wet paper codes with improved embedding efficiency," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 102-110, 2006. DOI ScienceOn |
18 | N. Teraura and K. Sakurai, "Information hiding of two-dimensional code by multilayer optical method," in Proc. of IEEE 10th International Symposium on Parallel and Distributed Processing with Applications (ISPA), pp. 770-777, 2012. |
19 | J. Fridrich, M. Goljan, P. Lisonˇek and D. Soukal, "Writing on wet paper," IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3923-3935, 2005. DOI ScienceOn |
20 | W. Zhang and X. Zhu, "Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding," IEEE Signal Processing Letters, vol. 16, no. 9, pp. 794-797, 2009. DOI ScienceOn |
21 | I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," Journal of the Society for Industrial and Applied Mathematics, vol. 8, no. 2, pp.300-304, 1960. DOI ScienceOn |
22 | C. C. Chang and Y. C. Chou, "A fragile digital image authentication scheme inspired by wet paper codes," Fundamenta Informaticae, vol. 90, no. 1-2, pp. 17-26, 2009. |
23 | ZXing ("Zebra Crossing"), [Online], Available: http://code.google.com/p/zxing/ |