A new two-level QR code with visual cryptography scheme

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Palette Partition Based Data Hiding for Color Images
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Efficient Time-Bound Hierarchical Key Assignment Scheme
Image camouflage by reversible image transformation
Source: IEEE Transactions on Information Forensics and Security, Vol
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source: Signal Processing 109 (2015) 317–333
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
A Novel Latin Square-based Secret Sharing for M2M Communications
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Improved joint reversible data hiding in encrypted images
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Controllable and Trustworthy Blockchain-based Cloud Data Management
Data hiding based Hamming code
Reversible Data Hiding in JPEG Images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Sourse: Information Sciences, Vol. 494, pp , August 2019
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

A new two-level QR code with visual cryptography scheme Zhengzhou Information Science and Technology Institute Source: Multimedia Tools and Applications (2017): 1-21. Authors: Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen Speaker: Huang Peng-Cheng Date: 11/26/2018

Outline Related works Proposed scheme Simulation results Comparison References Conclusions Comments

Related works (1/1) --visual cryptography scheme(VCS)

Proposed scheme (1/5) -- encoding flowchart(1/1) Encoding procedure {P1,…,Pn} n-1 {S1,…,Sn-1}

Proposed scheme (2/5) --decoding flowchart(1/1) Threshold T1 = {P1} T2 = {P2} Threshold T3 = {P3} {S2}

Proposed scheme(1/5) -- Structure of a cell (1/2) Cell VS Subcell Module VS Submodule

Proposed scheme(2/5) --Structure of a cell (2/2) 1 2 3 4 9 5 6 7 8

Proposed scheme (5/5) --An example for encoding process χ3=11000011 n=3 Case 1: p1=1 1 2 3 4 9 5 6 7 8 Public module 1 10010 χ1=10111100 1 2 3 4 9 5 6 7 8 Case 2: p2=0 1 Secret module χ2=11000011 1 2 3 4 9 5 6 7 8

Simulation results (1/7)

Simulation results (2/7)

Simulation results (3/7)

Simulation results (4/7)

Simulation results (5/7)

Simulation results (6/7)

Simulation results (7/7)

Comparison(1/3) –Error correction capacity

Comparison(2/3) –Secret payload

Comparison(3/3) –Computational complexity

References 3. Chen C (2016) QR code authentication with embedded message authentication code. Mob Netw Appl 22:383–394. 4. Chow YW, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the error correctionmechanism in QR codes for secret sharing. Australasian conference on information security and privacy, pp409–425. Springer International Publishing. doi:https://doi.org/10.1007/978-3-319-40253-6 _25 9. Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE TransInd Inf 12:384–392. 10. Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP J Image VideoProcess. https://doi.org/10.1186/s13640-016-0155-0 12. Liu Y, Fu ZX, Wang YW (2016) Two-level information management scheme based on visual cryptographyand QR code. Appl Res Comput 33:3460–3463. https://doi.org/10.3969/j.issn.1001-3695.2016.11.057 18. Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-level QR code forprivate message sharing and document authentication. IEEE Trans Inf Forensics Secur 11:571–583. 20. Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based onQR code with multiple decryptions. J Real-Time Image Proc. https://doi.org/10.1007/s11554-017-0678-3

Conclusions Two-level information storage Low computational complexity High error correction

Comments Need threshold set for each module; {l1,…,ln},{h1,…,hn} High computation complexity in encoding procedure; Have to process every module, no matter how long the secret message is; Poor robustness. The correctness of the theory?