Rich QR Codes With Three-Layer Information Using Hamming Code

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Palette Partition Based Data Hiding for Color Images
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Image camouflage by reversible image transformation
Source: IEEE Transactions on Information Forensics and Security, Vol
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
A Novel Latin Square-based Secret Sharing for M2M Communications
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Some Novel Steganographic Methods for Digital Images
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Reversible Data Hiding in JPEG Images
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Secret image sharing with steganography and authentication
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

Rich QR Codes With Three-Layer Information Using Hamming Code Source: IEEE Access (2019): 78640-78651 Authors: Liu, Sijia, Zhengxin Fu, and Bin Yu Speaker: Huang Peng-Cheng Date: 11/24/2019

Outline Introduction Related Works Proposed scheme Experimental results Conclusions Comments

Introduction(1/1)

Related Works(1/1)—Hamming code(1/2) p1 p2 d1 p3 d2 d3 d4 d1 d2 d3 d4 Encoding Data: 1 1 0 12 d2  d3  d4 = p3 1  0  1 = 0 d1  d2  d4 = p1 1  1  1 = 1 d1  d3  d4 = p2 1  0  1 = 0 1 0 1 0 1 0 1 p1 p2 d1 p3 d2 d3 d4 Encoded data

Related Works(1/1)—Hamming code(2/2) Error bit Error Detection Received data: 1 0 1 0 1 1 1 Correcting Corrected data: 1 0 1 0 1 0 1 1 0 0 0 1 1 0 010 Error Position Parity check matrix H

Proposed scheme (1/3)

Proposed scheme (2/3) …. v: The second layer message s: The third layer message QR1 QR2 QR3 …. Cover QR code QR2p Location map index

Proposed scheme (3/3) Suppose p=3 = [0010100] Example: [7,4] Hamming code, the parity check matrix H is : Embedding process: Cover vector Stego vector x’ = Change one bit in x according to coset leader associated to syndrome = Change one bit in x according to coset leader associated to = Change one bit in according to coset leader associated to = [0010100] Extraction process:

Experimental results (1/6) --An example(1/1)

Experimental results (2/6) --Robustness (1/1)

Experimental results (3/6) --Payload(1/1)

Experimental results (4/6) --Comparison(1/3) [9] P.-Y. Lin, ‘‘Distributed secret sharing approach with cheater prevention based on QR code,’’ IEEE Trans. Ind. Informat., vol. 12, no. 1, pp. 384–392, Feb. 2016. [13] Y. W. Chow, W. Susilo, G. Yang, J. G. Phillips, and I. A. M. P. Barmawi, ‘‘Exploiting the error correction mechanism in QR codes for secret sharing,’’ in Proc. ACISP, 2016, pp. 409–425 [14] Y. Liu, Z. Fu, and Y. Wang, ‘‘Two-level information management scheme based on visual cryptography and qr code,’’ Appl. Res. Comput., vol. 33, pp. 3460–3463, Nov. 2016. [15] S. Wan, Y. Lu, X. Yan, Y. Wang, and C. Chang, ‘‘Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions,’’ J. Real-Time Image Process., vol. 14, no. 1, pp. 25–40, Jan. 2018 [16] P.-C. Huang, Y.-H. Li, C.-C. Chang, and Y. Liu, ‘‘Efficient scheme for secret hiding in QR code by improving exploiting modification direction,’’ KSII Trans. Internet Inf. Syst., vol. 12, no. 5, pp. 2348–2365, 2018.

Experimental results (5/6) --Comparison(2/3)

Experimental results (6/6) --Comparison(3/3)

Conclusions Three-layer information storage Large secret payload Low computational complexity Robust against common image post-processing attacks

Comments (n, n)-threshold SS => (2p, 2p)-threshold SS Requires side information to extract secret message, such as the length of secret message, location map, parity check matrix H. Poor Robustness.