Abstract
With the emergence of mobile networks and smartphones, Quick Response Code (QR Code) has been widely used in many scenes in life, e.g. mobile payments, advertisement, and product traceability. However, when the encoded information of QR Codes is leaked, the QR Codes can be easily copied, which increases the risk of mobile payment and the difficulty of product traceability. To solve these problems, this paper proposes a novel approach to expand the information channels of QR Code based on invisible data hiding. The proposed architecture consists of an information encoder to hide messages into QR Codes while maintaining the original appearances of the QR codes and an information decoder to extract the hidden messages. To make the hidden messages detectable by smartphones, we use a series of noise layers to process the encoder output between the end-to-end training of the encoder and the decoder. The noise layers simulate the general distortions caused by camera imaging, e.g. noise, blur, JPEG compression, and light reflection. Experimental results show that the proposed method can achieve a high decoding accuracy of the hidden messages without affecting the decoding rate of the QR Codes used as the containers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Opencv-wechatqrcode. https://docs.opencv.org/4.5.2
Zbar bar code reader. http://zbar.sourceforge.net
Zxing (“zebra crossing”) barcode scanning library for java, android. https://github.com/zxing/zxing
Fang, H., Zhang, W., Zhou, H., Cui, H., Yu, N.: Screen-shooting resilient watermarking. IEEE Trans. Inf. Forensics Secur. 14(6), 1403–1418 (2018)
Fang, H., Zhou, H., Ma, Z., Zhang, W., Yu, N.: A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization. Multimedia Tools Appl. 78(7), 8075–8089 (2019)
Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. Adv. Neural. Inf. Process. Syst. 30, 1954–1963 (2017)
Jia, J., et al.: RIHOOP: robust invisible hyperlinks in offline and online photographs. IEEE Trans. Cybern. (2020)
Karybali, I.G., Berberidis, K.: Efficient spatial image watermarking via new perceptual masking and blind detection schemes. IEEE Trans. Inf. Forensics Secur. 1(2), 256–274 (2006)
Morkel, T., Eloff, J.H., Olivier, M.S.: An overview of image steganography. In: ISSA, vol. 1 (2005)
Mukherjee, D.P., Maitra, S., Acton, S.T.: Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans. Multimedia 6(1), 1–15 (2004)
Pramila, A., Keskinarkaus, A., Seppänen, T.: Increasing the capturing angle in print-cam robust watermarking. J. Syst. Softw. 135, 205–215 (2018)
Qiao, T., Retraint, F., Cogranne, R., Zitzmann, C.: Steganalysis of JSteg algorithm using hypothesis testing theory. EURASIP J. Inf. Secur. 2015(1), 1–16 (2015)
Qin, J., Xiang, X., Wang, M.X.: A review on detection of LSB matching steganography. Inf. Technol. J. 9(8), 1725–1738 (2010)
Ronneberger, O., Fischer, P., Brox, T.: U-net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234–241. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24574-4_28
Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: SSGAN: secure steganography based on generative adversarial networks. In: Zeng, B., Huang, Q., El Saddik, A., Li, H., Jiang, S., Fan, X. (eds.) PCM 2017. LNCS, vol. 10735, pp. 534–544. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-77380-3_51
Sitawarin, C., Bhagoji, A.N., Mosenia, A., Chiang, M., Mittal, P.: DARTS: deceiving autonomous cars with toxic signs. arXiv preprint arXiv:1802.06430 (2018)
Tancik, M., Mildenhall, B., Ng, R.: StegaStamp: invisible hyperlinks in physical photographs. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 2117–2126 (2020)
Tang, W., Tan, S., Li, B., Huang, J.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547–1551 (2017)
Tian, H., Zhao, Y., Ni, R., Qin, L., Li, X.: LDFT-based watermarking resilient to local desynchronization attacks. IEEE Trans. Cybern. 43(6), 2190–2201 (2013)
Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90. IEEE (1994)
Volkhonskiy, D., Nazarov, I., Burnaev, E.: Steganographic generative adversarial networks. In: Twelfth International Conference on Machine Vision (ICMV 2019), vol. 11433, p. 114333. International Society for Optics and Photonics (2020)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Wengrowski, E., Dana, K.: Light field messaging with deep photographic steganography. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1515–1524 (2019)
Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol. 3, pp. 219–222. IEEE (1996)
Yang, X., Ling, W., Lu, Z., Ong, E.P., Yao, S.: Just noticeable distortion model and its applications in video coding. Sig. Process. Image Commun. 20(7), 662–680 (2005)
Yuan, T., Wang, Y., Xu, K., Martin, R.R., Hu, S.M.: Two-layer QR codes. IEEE Trans. Image Process. 28(9), 4413–4428 (2019). https://doi.org/10.1109/TIP.2019.2908490
Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: HiDDeN: hiding data with deep networks. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11219, pp. 682–697. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01267-0_40
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Fu, K., Jia, J., Zhai, G. (2021). Dual-Layer Barcodes. In: Ma, H., et al. Pattern Recognition and Computer Vision. PRCV 2021. Lecture Notes in Computer Science(), vol 13020. Springer, Cham. https://doi.org/10.1007/978-3-030-88007-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-88007-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-88006-4
Online ISBN: 978-3-030-88007-1
eBook Packages: Computer ScienceComputer Science (R0)