Browse > Article
http://dx.doi.org/10.3837/tiis.2018.05.024

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction  

Huang, Peng-Cheng (Xiamen University of Technology, Department of Computer Science)
Li, Yung-Hui (National Central University, Department of Computer Science and Information Engineering)
Chang, Chin-Chen (Feng Chia University, Department of Information Engineering and Computer Science)
Liu, Yanjun (Feng Chia University, Department of Information Engineering and Computer Science)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.5, 2018 , pp. 2348-2365 More about this Journal
Abstract
QR codes as public patent are widely used to acquire the information in various fields. However, it faces security problem when delivering the privacy message by QR code. To overcome this weakness, we propose a secret hiding scheme by improving exploiting modification direction to protect the private message in QR code. The secret messages will be converted into octal digit stream and concealed to the cover QR code by overwriting the cover QR code public message bits. And the private messages can be faithfully decoded using the extraction function. In our secret hiding scheme, the QR code public message still can be fully decoded publicly from the marked QR codes via any standard QR Code reader, which helps to reduce attackers' curiosity. Experiments show that the proposed scheme is feasible, with high secret payload, high security protection level, and resistant to common image post-processing attacks.
Keywords
Secret hiding; QR code; exploiting modification direction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P.-Y. Lin, and Y.-H. Chen, "QR Code Steganography with Secret Payload Enhancement," in Proc. of 2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 1-5, Jul. 2016, Seattle, USA.
2 X. Zhang, and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, Vol. 10, No. 11, pp. 781-783, 2006.   DOI
3 P.-Y. Lin, and Y.-H. Chen, "High Payload Secret Hiding Technology for QR Codes," EURASIP Journal on Image and Video Processing, Vol. 2017, No. 1, pp. 14, 2017.   DOI
4 S.-Y. Shen, and L.-H. Huang, "A Data Hiding Scheme Using Pixel Value Differencing and Improving Exploiting Modification Directions," Computers & Security, Vol. 48, pp. 131-141, 2015.   DOI
5 X.-T. Wang, C.-C. Chang, C.-C. Lin, and M.-C. Li, "A Novel Multi-Group Exploiting Modification Direction Method Based on Switch Map," Signal Processing, Vol. 92, No. 6, pp. 1525-1535, 2012.   DOI
6 Denso Wave Inc. "QR Code Standardization," 2003.
7 J. Z. Gao, L. Prakash, and R. Jagatesan, "Understanding 2d-Barcode Technology and Applications in M-Commerce-Design and Implementation of a 2d Barcode Processing Solution," in Proc. of Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, Vol. 2, pp. 49-56, Aug. 2007.
8 I. Tkachenko, W. Puech, C. Destruel, O. Strauss, J.-M. Gaudin, and C. Guichard, "Two-Level QR Code for Private Message Sharing and Document Authentication," IEEE Transactions on Information Forensics and Security, Vol. 11, No. 3, pp. 571-583, 2016.   DOI
9 L. Bi, Z. Feng, M. Liu, and W. Wang, "Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code," in Proc. of Electronic Commerce and Security, 2008 International Symposium on, pp. 527-530, 2008.
10 N. Teraura, and K. Sakurai, "Information Hiding in Subcells of a Two-Dimensional Code," in Proc. of 2012 IEEE 1st Global Conference on Consumer Electronics (GCCE), pp. 652-656, Oct. 2012.
11 I. S. Reed, and G. Solomon, "Polynomial Codes over Certain Finite Fields," Journal of the Society for Industrial and Applied Mathematics, Vol. 8, No. 2, pp. 300-304, 1960.   DOI
12 Y.-J. Chiang, P.-Y. Lin, R.-Z. Wang, and Y.-H. Chen, "Blind QR Code Steganographic Approach Based Upon Error Correction Capability," KSII Transactions on Internet & Information Systems, Vol. 7, No. 10, pp. 2572-2543, 2013.
13 J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on Wet Paper," IEEE Transactions on signal processing, Vol. 53, No. 10, pp. 3923-3935, 2005.   DOI
14 T. V. Bui, N. K. Vu, T. T. Nguyen, I. Echizen, and T. D. Nguyen, "Robust Message Hiding for Qr Code," in Proc. of 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520-523, Aug. 2014.
15 P. Elias, "Error-Correcting Codes for List Decoding," IEEE Transactions on Information Theory, Vol. 37, No. 1, pp. 5-12, 1991.   DOI