A Digital Watermark Algorithm for QR Code

@inproceedings{Li2011ADW,
  title={A Digital Watermark Algorithm for QR Code},
  author={Li Li and Ruiling Wang and Chin-Chen Chang},
  year={2011}
}
Technology that combines a 2D BarCode with a digital watermark is a topic of great interest in current research related to the security field. [...] Key Method To prevent the overflow of the QR Code in the DCT domain of the image, QR image need fuzzy processing and be added noise to. In order to resist image distortion after print and scan operations, the watermark is embedded repeatedly.Expand
Covert Communication via the QR Code Image by a Data Hiding Technique Based on Module Shape Adjustments
TLDR
Good experimental results, tests of stego-image readability by QR code scanners and resistance to noise attacks, and a comparison with other methods from the viewpoint of data embedding rate show the feasibility and superiority of the proposed method for real covert communication applications. Expand
Improved Visual Secret Sharing Scheme for QR Code Applications
TLDR
This paper proposes a visual secret sharing scheme to encode a secret QR code into several shares that can be decoded with some specific meaning by a standard QR code reader, thereby avoiding raising suspicion in potential attackers. Expand
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things
TLDR
A new secret hiding scheme based on QR code which has low computational complexity and is suitable for low-power devices in IoT systems because of utilizing the error correction property of QR code to hide secret information. Expand
SVQR : A Novel Secure Visual Quick Response Code and Its Anti-counterfeiting Solution
TLDR
The solution includes a proposed secure and visual improved QR code involving digital signature and watermarking techniques, and a delicate authentication scheme, and the effective and efficient of the proposed method are proved by experiments and analyses. Expand
Overview of Visual Secret Sharing Schemes for QR Code Message
TLDR
To solve the QR information security problem, this paper proposed visual secret sharing schemes for QR code message that improves the security of the data transmission and also improves the clarity of a secret image. Expand
QR Code Security Using Proxy Re-Encryption for Private Data Shared Barcodes
A two layer QR Codes for private data sharing using convolutional coder and Proxy Re-Encryption is proposed. In barcodes, as the encoded information is featured to be machine readable only, a humanExpand
A two-level QR code scheme based on polynomial secret sharing
TLDR
A Two-Level QR code is introduced that protects private data by using the recognition patterns of QR codes and by use of polynomial secret sharing algorithms, which reduces the probability of attracting the attention of potential attackers. Expand
Authentication of Printed Document Using Quick Response (QR) Code
TLDR
A unique QR Code is created by utilising AES and SHA-256 that are difficult to produce by other people so that the authenticity of information about document content can be guaranteed and easily validated. Expand
Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code
  • Pei-Yu Lin
  • Computer Science
  • IEEE Transactions on Industrial Informatics
  • 2016
TLDR
This article designs a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode. Expand
Information Hiding of Two-dimensional Code by Multi-layer Optical
  • N. Teraura, K. Sakurai
  • Computer Science
  • 2012 IEEE 10th International Symposium on Parallel and Distributed Processing with Applications
  • 2012
TLDR
An information medium that cannot possibly be copied and thereby offers high security is envisaged, which consists of two-dimensional codes printed using a variety of materials to form a multilayered two- dimensional code. Expand
...
1
2
...

References

SHOWING 1-10 OF 12 REFERENCES
Research on embedding and extracting methods for digital watermarks applied to QR code images
TLDR
The objective in this paper is to develop a scientific algorithm which can be used in a QR code image to improve its ability to deal with pirates and propose two kinds of discrete wavelet transform based algorithms which can been used in QR code images. Expand
Image Watermarking Technique Based on 2-D Barcode PDF417
  • Z. Ji
  • Computer Science
  • 2002
TLDR
The new technique produces a watermarked image retaining closely the quality of the original host image, surviving concurrently various image processing operations, such as lossy JPEG compression, adding noise, resizing and cutting. Expand
Application of the Digital Watermarking Technique in 2-D Bar Code Certificate Anti-Counterfeit Systems
TLDR
The experimental results indicate that the obtained watermarked images have good transparency and robustness and the combination of 2-D bar code and digital watermarking can realize real anti-counterfeit certificates. Expand
A Blind Watermarking Method with Strong Robust Based on 2D-Barcode
  • Xiaofei Feng, Xingzhong Ji
  • Computer Science
  • 2009 International Conference on Information Technology and Computer Science
  • 2009
TLDR
A watermarking technique based on 2D-barcode and human visual system and enhanced the robust through watermark structure and embedding algorithm, which strengthens the resistance for different attacks. Expand
2D Barcodes as Watermarks in Image Authentication
  • P. Premaratne, F. Safaei
  • Computer Science
  • 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007)
  • 2007
TLDR
This work uses a 2D Barcode as the watermark as this has error correction capabilities and shows that this can be used to insert data imperceptibly into the host image. Expand
A method of 2D BarCode anti-counterfeit based on the digital watermark
TLDR
This paper proposed a method of embedding blind watermark in suitable marginal which will combine the 2D Bar code with a watermark to improve the security and secrecy of2D BarCode. Expand
Overview of Digital Watermarking Techniques for Binary Images
TLDR
Various watermarking algorithms for binary images are reviewed, and their advantages and disadvantages are analyzed. Expand
Overview of Digital Watermarking Techniques for Binary Images
TLDR
Various watermarking algorithms for binary images are reviewed, and their advantages and disadvantages are analyzed. Expand
Information Hiding Technique Based on 2D Barcode
TLDR
The experimental results show that the proposed information heding technique 2D barcode features robustness, security, and high capacity of information hiding etc. Expand
Chang International Journal of Intelligent Information Processing
  • Chang International Journal of Intelligent Information Processing
  • 2011
...
1
2
...