• Title/Summary/Keyword: Data image code

Search Result 247, Processing Time 0.028 seconds

Improvement of the Multiple Image Encryption Capacity Using QR Code as a Data Container

  • Bai, Xing;Hu, Jianping;Yuan, Sheng;Wang, Jinchao;Wang, Jing;Zhou, Xin
    • Current Optics and Photonics
    • /
    • v.4 no.4
    • /
    • pp.302-309
    • /
    • 2020
  • An image encryption scheme based on the quick response (QR) code as a data container has aroused wide interest due to the lossless recovery of the decrypted image. In this paper, we apply this method to multi-image encryption. However, since the decrypted image is affected by crosstalk noise, the number of multi-image encryptions is severely limited. To solve this problem, we analyzed the performance of QR code as a data container, and processed the decrypted QR code using the proposed method, so that the number of multi-image encryptions is effectively increased. Finally, we implemented a large image (256 × 256) encryption and decryption.

Image Enhancement for Two-dimension bar code PDF417

  • Park, Ji-Hue;Woo, Hong-Chae
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.69-72
    • /
    • 2005
  • As life style becomes to be complicated, lots of support technologies were developed. The bar code technology is one of them. It was renovating approach to goods industry. However, data storage ability in one dimension bar code came in limit because of industry growth. Two-dimension bar code was proposed to overcome one-dimension bar code. PDF417 bar code most commonly used in standard two-dimension bar codes is well defined at data decoding and error correction area. More works could be done in bar code image acquisition process. Applying various image enhancement algorithms, the recognition rate of PDF417 bar code is improved.

  • PDF

Reversible Data Hiding based on QR Code for Binary Image (이진 이미지를 위한 QR 코드 기반의 가역적인 데이터 은닉)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.281-288
    • /
    • 2014
  • QR code (abbreviated from Quick Response Code) is code system that is strong in against to apply image processing techniques (skew, warp, blur, and rotate) as QR codes can store several hundred times the amount of information carried by ordinary bar codes. For this reason, QR code is used in various fields, e.g., air ticket (boarding control system), food(vegetables, meat etc.) tracking system, contact lenses management, prescription management, patient wrist band (patient management) etc. In this paper, we proposed reversible data hiding for binary images. A reversible data hiding algorithm, which can recover the original image without any distortion from the marked (stego) image after the hidden data have been extracted, because it is possible to use various kinds of purposes. QR code can be used to generate by anyone so it can be easily used for crime. In order to prevent crimes related QR code, reversible data hiding can confirm if QR code is counterfeit or not as including authentication information. In this paper, we proved proposed method as experiments.

An Image Management System of Frame Unit on a Hand-held Device Environments (휴대장치 환경을 위한 프레임 단위의 영상 데이터 관리 시스템)

  • Choi, Jun-Hyeog;Yoon, Kyung-Bae;Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.29-36
    • /
    • 2008
  • This paper proposes algorithm for the system that can search for an image of a frame unit, and we implement it. A system already inserts in images after generating the cord that mechanical decoding and identification are possible. We are independent of an external noise in a frame unit, and a system to propose at these papers can search for an image recorded by search condition to include recording date, recording time, a recording place or filming course etc. This system is composed by image insertion wealth to insert data to an image to data image code generation wealth, a frame generating data image code you apply a code generation rule to be fixed in order to express to a price to have continued like data entry wealth, GPS locator values and direction price receiving an image signal, image decoding signals and an image search signal to include search condition, and to have continuity from users each of an image. Also, image decoding we decipher about the noise that was already added from the outsides in a telerecording process, a copy process or storage processes inserted in images by real time, and searching image information by search condition. Consequently we implement decoder, and provide the early system that you use, and we easily insert data code among images. and we can search. and maximization can get precision regarding an image search and use satisfaction as we use algorithm to propose at these papers.

  • PDF

An Efficient Software Update Technique with Code-Banking & Delta-Image for Wireless Sensor Networks (무선 센서 네트워크상에서 코드뱅킹 및 델타이미지 기반의 효율적인 센서노드 소프트웨어 업데이트 기법)

  • Nam, Young-Jin;Nam, Min-Seok;Park, Young-Kyun;Kim, Chang-Hoon;Lee, Dong-Ha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.3
    • /
    • pp.103-111
    • /
    • 2009
  • Software update has been regarded as one of fundamental functions in wireless sensor networks. It can disseminate a delta-image between a current software image operating on a sensor node and its new image in order to reduce an update image(transmission data) size, resultantly saving energy. In addition, code-banking capability of micro-controllers can decrease the update image size. In order to maximize the efficiency of the software update, the proposed scheme exploits both the delta-image and the code-banking at the same time. Besides, it additionally delivers a recovery delta-image to properly handle abnormal conditions, such as message corruptions and unexpected power-off during the update.

  • PDF

Watermark Authentication Cryptography for Medical Image Security (의료영상 보안을 위한 워터마크 인증 암호화 기법)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.759-766
    • /
    • 2017
  • In this paper, we preserve the transparency of digital contents by compressing and storing the medical image for a certain period so as to be safe and robust against various attacks of medical images. The proposed algorithm generates an encrypted image authentication code that extracts the feature value of the original image and combines it with the user's information. in order to extract hidden data, the authentication code is first decrypts the encrypted medical image and extracts the hidden data using the spatial characteristics of image. The proposed algorithm guarantees integrity when comparing extracted authentication code and newly generated authentication code for image authentication after directly inserting it into content itself through watermarking. We have proved various security of attack of image data and proved that the certification rate is improved to 98.4%.

PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

  • Yixiang Fang;Kai Tu;Kai Wu;Yi Peng;Yunqing Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.471-485
    • /
    • 2023
  • As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the private message. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.

A Key Exchange Protocol based on the Steganography with the QR code (스테가노그라피 기법이 적용된 QR코드 이미지 기반의 키 교환 프로토콜)

  • Lee, Gil-Je;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.173-179
    • /
    • 2013
  • The traditional key exchange protocols are transmitted by using the cryptographic. However, these protocols are compromised by the attacker. To solve this problem, this paper proposes a key exchange protocol based on the steganography with the QR code. The steganography technique embed secret information to the images, documents, videos, and MP3 files and transmit to the others. The attacker can't know that the transmission data is the secret data. Therefore, the sender transmits efficiently and safely the secret data to the others. In additional, the cover image is using the QR code image to insert the secret key. If attackers scan the QR code, then they just read the information or connect URL. They can not be recognized that the QR code image is hiding the secret key. The experiments compare the QR code image with the well-known image about the distortion and the safety.

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Chung, Ting-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2005-2021
    • /
    • 2014
  • This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user's requirement, with each BTC-compressed image block being used to carry the authentication code using the data hiding method. In the proposed scheme, to obtain a high-quality embedded image, a reference table is used when the authentication code is embedded. The experimental results demonstrate that the proposed scheme achieves high-quality embedded images and guarantees the capability of tamper detection.

Transform Trellis Image Coding Using a Training Algorithm (훈련 알고리듬을 이용한 변환격자코드에 의한 영상신호 압축)

  • 김동윤
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.1
    • /
    • pp.83-88
    • /
    • 1994
  • The transform trellis code is an optimal source code as a block size and the constraint length of a shift register go to infinite for stationary Gaussian sources with the squared-error distortion measure. However to implement this code, we have to choose the finite block size and constraint length. Moreover real-world sources are inherently non stationary. To overcome these difficulties, we developed a training algorithm for the transform trellis code. The trained transform trellis code which uses the same rates to each block led to a variation in the resulting distortion from one block to another. To alleviate this non-uniformity in the encoded image, we constructed clusters from the variance of the training data and assigned different rates for each cluster.

  • PDF