Identification recovery scheme using quick response (QR) code and watermarking technique

@article{Chen2014IdentificationRS,
  title={Identification recovery scheme using quick response (QR) code and watermarking technique},
  author={Ji-Hong Chen and Wen Chen and Chin-hsing Chen},
  journal={Applied Mathematics \& Information Sciences},
  year={2014},
  volume={8},
  pages={585-596}
}
In recent years there has been increasing attention towards digital rights . Therefore, this paper proposes a matrix barcode to verify image copyrights. The copyright text, Quick Response code (QR code), and watermarking techniques are used to achieve a hidden identification scheme implementing direct sequence spread spec trum (DSSS) and modulation of the modified code division multiple access (MCDMA) to hide the QR code data. DSSS and MCDMA hash thedata and QR code has a robust feature to… Expand
Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code
TLDR
Experimental results showed that the authentication and recovery data in a QR code is able to sustain certain perceptible distortions such that the proposed scheme can detect tampered regions clearly and recover them roughly. Expand
Visible Watermarking Scheme for Quick Response Code Based on Reversible Data Hiding
TLDR
A reversible visible watermarking scheme is proposed for embedding QR Code into images and better image quality has been achieved by the proposed scheme compared with existing schemes. Expand
SVD-based self-embedding image authentication scheme using quick response code features
TLDR
Two self-embedding image authentication approaches are proposed to involve distinctive singular values and utilize complete self-characteristics of an image as the crucial authentication information for that image to restore tampered regions into their original states. Expand
DWT and QR Code Based Watermarking for Document DRM
TLDR
The experimental results show that by inserting several occurrences of a scrambled QR code, a digital rights protection scheme for every type of document presented as an image, by using steps that use cryptography and watermarking is presented. Expand
A novel QR-code based watermarking scheme for digital rights
This paper presents a digital rights protection scheme for both colour and grayscale images using a novel approach that combines watermarking and cryptography. The schema involves two parties: theExpand
Copyright protection of color images for android-based smartphones using watermarking with quick-response code
TLDR
The proposed scheme was robust against JPEG compression with about 60–70% compression ratio and it resists noise attacks at noisy image quality with PSNR = 15–35 dB. Expand
ENHANCED SECURITY IN STEGANOGRAPHY USING ENCRYPTION AND QUICK RESPONSE CODE
Transferring confidential data is a real challenge and is the need of the hour. Steganography deals with concealing secret message in the image whereas cryptography is about altering the message intoExpand
Multi-Layered Security By Embedding Biometrics in Quick Response (QR) Codes
TLDR
The authors come up with the idea of transfusing Biometrics in QR codes which would not only provide much security to the prevailing system, but also reduce in many cost factors and complicacies. Expand
Analysis of CRT-based Watermarking Technique for Authentication of Multimedia Content
  • T. Tuncer
  • Computer Science
  • International Journal of Computer Network and Information Security
  • 2018
TLDR
The proposed attacks clearly show that the crt-based method is a data hiding method but this method is not used as image authentication method and cannot be utilized as an image Authentication method. Expand
E2-Invisible Watermarking for Protecting Intellectual Rights of Medical Images and Records
TLDR
DWM for medical images is implemented by joint combination of spatial and frequency domain technique Singular value decomposition-Integer wavelet transform (SVD-IWT) respectively, 64-bit Rivest-Shamir-Adleman (RSA) crypto-technique and new encoding procedure and the proposed system is compared with other traditional methods and also evaluated against various image processing and geometric attacks. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 22 REFERENCES
Nested image steganography scheme using QR-barcode technique
TLDR
In this paper, QR bar code and image processing techniques are used to construct a nested steganography scheme that can conceal lossless and lossy secret data into a cover image simultaneously and is robust to JPEG attacks. Expand
Reversible data hiding with histogram-based difference expansion for QR code applications
TLDR
A new algorithm in reversible data hiding, with the application associated with the quick response (QR) codes, so that the QR codes can be hidden into the original image, and considerable increase in embedding capacity can be expected. Expand
Image Hidden Technique Using QR-Barcode
  • Chin-Ho Chung, Wen-Yuan Chen, C. Tu
  • Computer Science
  • 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  • 2009
TLDR
In this paper, QR(Quick Response) bar code and image processing techniques are used to construct a nested steganography scheme and it is evident that the scheme is robust to JPEG attacks. Expand
Embedding biometric identifiers in 2D barcodes for improved security
TLDR
This paper presents a novel approach for embedding uncompressed images in a standard PDF417 2D barcode using a blind digital watermarking technique and shows that the proposed technique effectively increased the standard capacity of the PDF4172D bar code without altering the contents of the encoded data. Expand
A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
TLDR
A novel watermarking scheme using phase shift keying (PSK) modulation with amplitude boost (AB) and low amplitude block selection (LABS) and with proper combination of AB and LABS achieves superior performance in terms of robustness and imperceptibility. Expand
Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation
  • Wen-Yuan Chen
  • Mathematics, Computer Science
  • Appl. Math. Comput.
  • 2007
TLDR
This research of color image hidden scheme aims to conceal a secret image into the cover image of the same size without noticeable degradation by using discrete wavelet transform and set partitioning in hierarchical trees codec to obtain a low bit rate and high reconstructed quality image compression. Expand
Cross Format Embedding of Metadata in Images Using QR Codes
TLDR
This work proposes a new method for cross format metadata embedding in images that is based on QR codes, that seems to have several significant advantages over current method of storing metadata. Expand
A low-complexity pre-processing system for restoring low-quality QR code images
TLDR
The proposed system takes advantage of intrinsic Quick Response code characteristics in order to restore the code properly and efficiently and is designed to deal with low contrast, blurred, rotated, and deformed code images, while keeping complexity low enough to run in real-time. Expand
Steganalysis of data hiding techniques in wavelet domain
  • Shaohui Liu, H. Yao, W. Gao
  • Computer Science
  • International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
  • 2004
TLDR
A new steganalysis technique is proposed on the basis of histogram analysis on the wavelet coefficients for the detection the very existence of wavelet domain information hiding techniques. Expand
Developing QR Code Based Augmented Reality Using SIFT Features
  • C. Teng, B. Wu
  • Computer Science
  • 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing
  • 2012
TLDR
This paper uses the SIFT feature to enable QR Code tracking and also improve tracking accuracy and stability and develops a QR Code based augmented reality (AR) system that can be tracked efficiently and suitable for public domain applications. Expand
...
1
2
3
...