Source: Mobile Information Systems, vol. 2017, 2017.

Slides:



Advertisements
Similar presentations
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Source: IEEE Transactions on Multimedia, Vol. 5, No
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Security of a Remote Users Authentication Scheme Using Smart Cards
A New Classification Mechanism for Retinal Images
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Cryptography
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Recent Developments on Multimedia and Secure Networking Technologies
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
Chair Professor Chin-Chen Chang Feng Chia University
A new two-level QR code with visual cryptography scheme
Centrality Bias Measure for High Density QR Code Module Recognition
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Chair Professor Chin-Chen Chang Feng Chia University
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
Hiding Data in a Color Palette Image with Hybrid Strategies
A Novel Latin Square-based Secret Sharing for M2M Communications
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
The New Developments in Visual Cryptography
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Controllable and Trustworthy Blockchain-based Cloud Data Management
Partial reversible data hiding scheme using (7, 4) hamming code
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Pairwise IPVO-Based Reversible Data Hiding
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source : Digital Signal Processing. Vol. 73, pp , Feb
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography Source: Mobile Information Systems, vol. 2017, 2017. Authors: Lu Jianfeng, Yang Zaorang, Li Lina, Yuan Wenqiang, Li Li, Chang Chin-Chen Speaker: HuangPeng-Cheng Date: 11/28/2018

Outline Introduction Related Works Proposed Scheme Scheme I Based on QR Module and XOR Mechanism of RS Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR Conclusions Comments

Introduction—motivation(1/2)

Introduction(2/2)

Related Works(1/3) L. Feng and Q. Y. Wei, Cheating Prevention of Visual Cryptography, Springer International, Berlin, Germany, 2015.

Related works(2/3) --Visual Cryptography

Related works(3/3) --QR code

Scheme I Based on QR Module and XOR Mechanism of RS(1/9)

Scheme I Based on QR Module and XOR Mechanism of RS (2/9)

Scheme I Based on QR Module and XOR Mechanism of RS (3/9)

Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (4/9) there are somewhat differences between the modifed region and the surrounding region. Such flaw can cause attackers’ suspicion easily and reduce the security of QR code to some extent

Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (5/9)

Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (6/9)

Scheme II Based on VCS and Fusion Strategy of Background Image by XOR Mechanism of RS (7/9)

Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR (8/9)

Scheme III Based on VCS and Fusion Strategy of Background Image with Error Correction Mechanism of QR (9/9)

Conclusions The hiding region looks like garbled. Attackers are impossible to recover the secret information from each individual shadow.

comments Low capacity.