A Confidential QR Code Approach with Higher Information Privacy
Abstract
:1. Introduction
2. The Proposed Confidential QR Approach Based on the Triple Module Group
2.1. Preliminary Process
2.2. Concealment Process
- Here, the notation ⊕ indicates the exclusive-or (XOR) operator. First, consider the value of b3:
- when b3 = 0, adjust a module according to the following formula:
- Case 1: if d = 0, unchanged.
- Case 2: if d = 1,
- if b1 = s1, then set the value of b2 = s2; otherwise b1 = s1.
- Case 3: if d = 2, the b3 = 1.
- when b3 = 1, adjust it according to the following formula:
- Case 4: if d = 0, the b3 = 0.
- Case 5: if d = 1,
- if b1 = s1, then change the value of b1 = , otherwise b2 = .
- Case 6: if d = 2, unchanged.
2.3. Extraction Process
3. Experimental Results
3.1. Capacity
3.2. Modification
3.3. Readability
3.4. Comparison
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Acknowledgments
Conflicts of Interest
References
- Denso Wave. 2003. Available online: http://www.qrcode.com/en/index.html (accessed on 15 January 2022).
- ISO/IEC 18004. Information Technology Automatic Identification and Data Capture Techniques Bar Code Symbology QR Code; ISO: Geneva, Switzerland, 2000. [Google Scholar]
- Wada, T.; Kishimoto, Y.; Nakazawa, E.; Imai, T.; Suzuki, T.; Arai, K.; Kobayashi, T. Multimodal user interface for QR code based indoor navigation system. In Proceedings of the IEEE 9th Global Conference on Consumer Electronics (GCCE), Kobe, Japan, 13–16 October 2020; pp. 343–344. [Google Scholar]
- Xiong, L.; Zhong, X.; Xiong, N.N.; Liu, R.W. QR-3S: A High Payload QR Code Secret Sharing System for Industrial Internet of Things in 6G Networks. IEEE Trans. Ind. Inform. 2021, 17, 7213–7222. [Google Scholar] [CrossRef]
- Zhou, Y.; Hu, B.; Zhang, Y.; Cai, W. Implementation of Cryptographic Algorithm in Dynamic QR Code Payment System and Its Performance. IEEE Access 2021, 9, 122362–122372. [Google Scholar] [CrossRef]
- Hung, S.H.; Yao, C.Y.; Fang, Y.J.; Tan, P.; Lee, R.R.; Sheffer, A.; Chu, H.K. Micrography QR code. IEEE Trans. Vis. Comput. Graph. 2020, 26, 2834–2847. [Google Scholar] [CrossRef] [PubMed]
- Barron, I.; Yeh, H.J.; Dinesh, K.; Sharma, G. Dual Modulated QR code for Proximal Privacy and Security. IEEE Trans. Image Processing 2021, 30, 657–669. [Google Scholar] [CrossRef] [PubMed]
- Lin, P.-Y. Imperceptible visible watermarking base on postcamera histogram operation. J. Syst. Softw. Arch. 2014, 95, 194–208. [Google Scholar] [CrossRef]
- Lin, P.-Y. Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code. IEEE Trans. Ind. Inform. 2016, 12, 384–392. [Google Scholar] [CrossRef]
- Puteaux, P.; Puech, W. Rebuttal. On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Trans. Inf. Forensics Secur. 2021, 16, 2445–2446. [Google Scholar] [CrossRef]
- Puteaux, P.; Puech, W. A Recursive Reversible Data Hiding in Encrypted Images Method with a Very High Payload. IEEE Trans. Multimed. 2021, 23, 636–650. [Google Scholar] [CrossRef]
- Chung, C.H.; Chen, W.Y.; Tu, C.M. Image Hidden Technique Using QR-Barcode. In Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, 12–14 September 2009; pp. 522–525. [Google Scholar]
- Vongpradhip, S.; Rungraungsilp, S. QR Code Using Invisible Watermarking in Frequency Domain. In Proceedings of the 2011 Ninth International Conference on ICT and Knowledge Engineering, Bangkok, Thailand, 12–13 January 2012; pp. 47–52. [Google Scholar]
- Xue, L.Q.; Chao, Y.H.; Liu, L.S.; Zhang, X.J. Information Hiding Algorithm for PDF417 Barcode. In Proceedings of the 2009 Fifth International Conference on Natural Computation, Tianjian, China, 14–16 August 2009. [Google Scholar]
- Wu, D.C.; Wu, Y.M. Covert Communication via the QR Code Image by a Data Hiding Technique Based on Module Shape Adjustments. IEEE Open J. Comput. Soc. 2020, 1, 12–34. [Google Scholar] [CrossRef]
- Chiang, Y.J.; Lin, P.Y.; Wang, R.Z.; Chen, Y.H. Blind QR Code Steganographic Approach Based upon Error Correction Capability. KSII Trans. Internet Inf. Syst. 2013, 7, 2527–2543. [Google Scholar]
- Luo, M.; Wang, S.; Lin, P.Y. QR Code steganography mechanism with high capacity. In Proceedings of the 2016 International Conference on Communication Problem-Solving (ICCP), Taipei, Taiwan, 7–9 September 2016. [Google Scholar]
- Alajmi, M.; Elashry, I.; El-Sayed, H.S.; Allah, O.S.F. Steganography of Encrypted Messages inside Valid QR code. IEEE Access 2020, 8, 27861–27873. [Google Scholar] [CrossRef]
- Mohammed Ali, A.; Farhan, A.K. Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document. IEEE Access 2020, 8, 27448–27458. [Google Scholar] [CrossRef]
Error Correction Level | Number of Error Correction Blocks (n) | Total Number of Codewords | Number of Data Codewords | Number of Error Correction Codewords (E) |
---|---|---|---|---|
L | 1 | 70 | 55 | 15 |
M | 1 | 70 | 44 | 26 |
Q | 2 | 70 | 34 | 36 |
H | 2 | 70 | 26 | 44 |
Version | Error Correction Level | C | Confidential Capacity, ls (bit) |
---|---|---|---|
1 | L | 24 | 48 |
M | 40 | 80 | |
Q | 48 | 96 | |
H | 64 | 128 | |
10 | L | 288 | 576 |
M | 520 | 1040 | |
Q | 768 | 1536 | |
H | 896 | 1792 | |
20 | L | 896 | 1792 |
M | 1664 | 3328 | |
Q | 2400 | 4800 | |
H | 2800 | 5600 | |
30 | L | 1800 | 3600 |
M | 3248 | 6496 | |
Q | 4800 | 9600 | |
H | 5760 | 11,520 | |
40 | L | 3000 | 6000 |
M | 5488 | 10,976 | |
Q | 8160 | 16,320 | |
H | 9720 | 19,440 |
Version | QR Modules, Ϻ | Error Correction Level | C/Ϻ (%) | Modification Ratio, γ (%) |
---|---|---|---|---|
1 | 208 | L | 12% | 8% |
M | 19% | 13% | ||
Q | 23% | 15% | ||
H | 31% | 21% | ||
10 | 2768 | L | 10% | 7% |
M | 19% | 13% | ||
Q | 28% | 18% | ||
H | 32% | 22% | ||
20 | 8683 | L | 10% | 7% |
M | 19% | 13% | ||
Q | 28% | 18% | ||
H | 32% | 21% | ||
30 | 17,483 | L | 10% | 7% |
M | 19% | 12% | ||
Q | 27% | 18% | ||
H | 33% | 22% | ||
40 | 29,648 | L | 10% | 7% |
M | 19% | 12% | ||
Q | 28% | 18% | ||
H | 33% | 22% |
Version | Error correction level | Cracking Probability ρ | ||
---|---|---|---|---|
[16] | [17] | Ours | ||
1 | L | 2−24 | 2−36 | 2−48 |
M | 2−40 | 2−60 | 2−80 | |
Q | 2−48 | 2−72 | 2−96 | |
H | 2−64 | 2−96 | 2−128 | |
10 | L | 2−288 | 2−432 | 2−576 |
M | 2−520 | 2−780 | 2−1040 | |
Q | 2−768 | 2−1152 | 2−1536 | |
H | 2−896 | 2−1344 | 2−1792 | |
20 | L | 2−896 | 2−1344 | 2−1792 |
M | 2−1664 | 2−2496 | 2−3328 | |
Q | 2−2400 | 2−3600 | 2−4800 | |
H | 2−2800 | 2−4200 | 2−5600 | |
30 | L | 2−1800 | 2−2700 | 2−3600 |
M | 2−3248 | 2−4872 | 2−6496 | |
Q | 2−4800 | 2−6700 | 2−9600 | |
H | 2−5760 | 2−8640 | 2−11,520 | |
40 | L | 2−3000 | 2−4500 | 2−6000 |
M | 2−5488 | 2−8232 | 2−10,976 | |
Q | 2−8160 | 2−12,240 | 2−16,320 | |
H | 2−9720 | 2−14,580 | 2−19,440 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lin, P.-Y.; Lan, W.-S.; Chen, Y.-H.; Wu, W.-C. A Confidential QR Code Approach with Higher Information Privacy. Entropy 2022, 24, 284. https://doi.org/10.3390/e24020284
Lin P-Y, Lan W-S, Chen Y-H, Wu W-C. A Confidential QR Code Approach with Higher Information Privacy. Entropy. 2022; 24(2):284. https://doi.org/10.3390/e24020284
Chicago/Turabian StyleLin, Pei-Yu, Wen-Shao Lan, Yi-Hui Chen, and Wen-Chuan Wu. 2022. "A Confidential QR Code Approach with Higher Information Privacy" Entropy 24, no. 2: 284. https://doi.org/10.3390/e24020284
APA StyleLin, P. -Y., Lan, W. -S., Chen, Y. -H., & Wu, W. -C. (2022). A Confidential QR Code Approach with Higher Information Privacy. Entropy, 24(2), 284. https://doi.org/10.3390/e24020284