Source: IEEE Transactions on Information Forensics and Security, Vol

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Doc.: IEEE wng-r0 Contribution Labeling diversity Date: November 2013 Maciej Krasicki (Poznan University of Technology)Slide.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Lightweight Mutual Authentication for IoT and Its Applications
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Face recognition using improved local texture pattern
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
ONLINE ANDROID VOTING SYSTEM
ONLINE ANDROID VOTING SYSTEM
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Separable and error-free reversible data hiding in encrypted images
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
A Novel Latin Square-based Secret Sharing for M2M Communications
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Improved joint reversible data hiding in encrypted images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Pairwise IPVO-Based Reversible Data Hiding
Sourse: Information Sciences, Vol. 494, pp , August 2019
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
LSB matching revisited
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Two-Level QR Code for Private Message Sharing and Document Authentication Source: IEEE Transactions on Information Forensics and Security, Vol. 11, No. 3, pp. 571-583, 2016. Authors: Tkachenko Iuliia, Puech William, Destruel Christophe, Strauss Olivierm, Gaudin Jean-Marc, Guichard Christian Speaker: Peng-Cheng Huang Date: 9/18/2018

Outline Proposed Scheme Experimental Results Conclusions Two Level QR (2LQR) Code Generation Storage Capacity of 2LQR Code Recognition Method Experimental Results Conclusions

Proposed Scheme (1/9) Two Level QR (2LQR) Code Generation (1/6) A comparison of a) Standard QR code, with b) Proposed 2LQR code for private message sharing scenario and c) Proposed 2LQR code for authentication scenario.

Proposed Scheme (2/9) Two Level QR (2LQR) Code Generation (2/6) Overview of 2LQR code generation steps.

Proposed Scheme (3/9) Two Level QR (2LQR) Code Generation (3/6) Private message Mpriv encoding - q-ary ECC Cyclic Code :C[n,k,d] ternary Golay Code :G[11,6,5]

Proposed Scheme (4/9) Two Level QR (2LQR) Code Generation (4/6) Private message Mpriv encoding - Textured Pattern Selection Choose q patterns from a database of Q >> q textured patterns, which are binary and have the same density (ratio of black pixels)

Proposed Scheme (5/9) Two Level QR (2LQR) Code Generation (5/6) Private message Mpriv encoding - Textured Pattern Selection Let Si , i = 1, ... , q be the P&S degraded versions of textured patterns Pi , i = 1, ... , q The Pearson correlation: where:

Proposed Scheme (6/9) Two Level QR (2LQR) Code Generation (6/6) Private message Mpriv encoding - Textured Pattern Selection

Proposed Scheme (7/9) Storage Capacity of 2LQR Code (1/1) Storage capacity of the 2LQR code for QR code of size N × N modules, where n is the codeword length, k is the number of information digits, n −k is the number of parity-check digits.

Proposed Scheme (8/9) Recognition Method (1/2) The overview of 2LQR code reading process.

Proposed Scheme (9/9) Recognition Method (2/2)

EXPERIMENTAL RESULTS (1/8) - 2LQR Code Generation the ternary Golay code [11, 6, 5] ratio of black pixels = 60%

EXPERIMENTAL RESULTS (2/8) - 2LQR Code Generation

EXPERIMENTAL RESULTS (3/8) - Message Extraction

EXPERIMENTAL RESULTS (4/8) - Storage Capacity Analysis

EXPERIMENTAL RESULTS (5/8) - Reading Capacities of First and Second Levels

EXPERIMENTAL RESULTS (6/8) - Reading Capacities of First and Second Levels [6] T. V. Bui, N. K. Vu, T. T. P. Nguyen, I. Echizen, and T. D. Nguyen,“Robust message hiding for QR code,” in Proc. IEEE 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIH-MSP), Aug. 2014,pp. 520–523. [7] A. T. P. Ho, B. A. M. Hoang, W. Sawaya, and P. Bas, “Document authentication using graphical codes: Reliable performance analysis and channel optimization,” EURASIP J. Inf. Secur., vol. 2014, no. 1, p. 9,2014. [12] M. Querini, A. Grillo, A. Lentini, and G. F. Italiano, “2D color barcodes for mobile phones,” Int. J. Comput. Sci. Appl., vol. 8, no. 1, pp. 136–155, 2011. [21] R. Villán, S. Voloshynovskiy, O. Koval, and T. Pun, “Multilevel 2-D barcodes: Toward high-capacity storage modules for multimedia security and management,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 4, pp. 405–420, Dec. 2006.

EXPERIMENTAL RESULTS (7/8) - The Proposed 2LQR Code and Its Authentication

EXPERIMENTAL RESULTS (8/8) - The Proposed 2LQR Code and Its Authentication

Conclusions These 2LQR code can be used for private message sharing scenario and document authentication at the same time. The proposed 2LQR code increases the storage capacity of the classical QR code (up to 28% )