Skip to main content

An Improved Image Authentication Method Using QR Code Watermarking Approach

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13340))

Included in the following conference series:

  • 1369 Accesses

Abstract

Despite the progress in digital watermarking technology by optimizing the embedding method and enhancing the robustness of watermarking, the performance can still be improved using the Quick Response (QR) code technology. This paper proposes an improved QR code image watermarking approach by embedding texture-based QR code watermarking into the digital image. In contrast to the existing methods, an improved perceptual hash algorithm is used to extract image texture features, and therefore enhance the relevance of watermarking with image content, especially in light color images. In addition, the QR code method is combined with the reversible watermark algorithm in order to handle the problem that the original image is irreversibly modified. The experiments demonstrate that the proposed method can efficiently enhance the watermarking robustness, and resists common attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tang, X., Zhang, Y., Zhou, L.-N., Liu, D., Hu, B.-W.: Request merging based cross-user deduplication for cloud storage with resistance against appending chunks attack. Chin. J. Electron. 30(2), 199–209 (2021)

    Article  Google Scholar 

  2. Xin, Y., Li, Y.-Z., Lyu, S.-W.: Exposing Deep Fakes Using Inconsistent Head Poses. In: 2019 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Brighton, pp. 8261–8265. IEEE (2019)

    Google Scholar 

  3. Tang, X., Zhou, L.-N., Hu, B.-W., Wu, H.-W.: Aggregation-based tag deduplication for cloud storage with resistance against side channel attack. Secur. Commun. Netw. 2021(5), 1–15 (2021)

    Article  Google Scholar 

  4. Tang, X., Huang, Y.-F., Chang, C.-C., Zhou, L.-N.: Efficient real-time integrity auditing with privacy-preserving arbitration for images in cloud storage system. IEEE Access 7, 33009–33023 (2019)

    Article  Google Scholar 

  5. Yang, Z.-L., Guo, X.-Q., Chen, Z.-M., Huang, Y.-F., Zhang, Y.-J.: RNN-Stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2019)

    Article  Google Scholar 

  6. Yang, Z.-L., Zhang, S.-Y., Hu, Y.-T., Hu, Z.-W., Huang, Y.-F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2021)

    Article  Google Scholar 

  7. Tang, X., Zhou, L.-N., Liu, D., Liu, B.-Y., Lü, X.-Y.: Reversible data hiding based on improved rhombus predictor and prediction error expansion. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, Guangzhou, pp. 13–21. IEEE (2020)

    Google Scholar 

  8. Liu, J., Zhang, R., Li, J., Guan, L., Jie, C.: A reversible data hiding algorithm based on image camouflage and bit-plane compression. Comput. Mater. Continua 68(2), 2263–2649 (2021)

    Google Scholar 

  9. Qin, C., Zhang, W., Cao, F., Zhang, X.-P., Chang, C.-C.: Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153, 109–122 (2018)

    Article  Google Scholar 

  10. Xiong, L., Han, X., Yang, C., Shi, Y.: Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography. IEEE Trans. Circuits Syst. Video Technol. 32(1), 75–91 (2022)

    Article  Google Scholar 

  11. Katzenbeisser, S., Veith, H.: Securing symmetric watermarking schemes against protocol attacks. Proc. SPIE 4675(1), 260–268 (2002)

    Article  Google Scholar 

  12. Goyal, S., Yadav, S., Mathuria, M.: Exploring concept of QR code and its benefits in digital education system. In: 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI, Jaipur, pp. 1141–1147. IEEE (2016)

    Google Scholar 

  13. Huang, H.-C., Chang, F.-C., Fang, W.-C.: Reversible data hiding with histogram-based difference expansion for QR code applications attacks. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011)

    Article  Google Scholar 

  14. Bai, T.-T., Liu, Z., Peng, L.-U.: Geometrical attack resistant digital watermarking based on QR Code. Packaging Eng. 34(11), 113–116 (2013)

    Google Scholar 

  15. Gao, Q., Chen, G.-X., Chen, Q.-F.: Double QR code watermarking algorithm based on DCT-SVD. Packaging Eng. 36(17), 119–125 (2015)

    Google Scholar 

  16. Liu, X.-M., Tang, X.: Image authentication using QR code watermarking approach based on image segmentation. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, Guangzhou, pp. 1572–1577. IEEE (2020)

    Google Scholar 

  17. Zhou, Y., Luo, W.-W.: A QR data hiding method based on redundant region and BCH. J. Big Data 3(3), 127–133 (2021)

    Article  Google Scholar 

  18. Zhong, X.-W., Xiong, L.-Z., Xia, Z.-H.: A secure visual secret sharing scheme with authentication based on QR Code. J. Big Data 3(2), 85–95 (2021)

    Article  Google Scholar 

  19. Tang, X., Zhou, L.-N., Tang, G., Chen, Y.-X.: Reversible data hiding based on improved block selection strategy and pixel value ordering. In: 2021 IEEE 6th Cyber Science and Technology Congress, CyberSciTech, IEEE (2021)

    Google Scholar 

  20. Tang, X., Zhou, L.-N., Liu, D., Shan, W.-J., Zhang, Y.: Border following-based reversible watermarking algorithm for images with resistance to histogram overflowing. Int. J. Distrib. Sens. Netw. 16(5), 1550147720917014 (2020)

    Article  Google Scholar 

  21. Li, X.-L., Li, J., Li, B., Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1), 198–205 (2013)

    Article  Google Scholar 

  22. Tang, X., Zhou, L., Tang, G., Wen, Y., Cheng, Y.: Improved fluctuation derived block selection strategy in pixel value ordering based reversible data hiding. In: Zhao, X., Piva, A., Comesaña-Alfaro, P. (eds.) IWDW 2021. LNCS, vol. 13180, pp. 163–177. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-95398-0_12

    Chapter  Google Scholar 

  23. Lin, Y., Lu, J.-H., Jun, Y.: Structure for two-dimensional barcode in test reports of anti-fake platform based on RSA digital signature. Qual. Tech. Supervision Res. 2015(4), 55–57 (2015)

    Google Scholar 

  24. Chen, X.: An robust digital watermarking algorithm based on Arnold and DCT. J. Hu Zhou Univ. 40(10), 29–34 (2008)

    Google Scholar 

  25. Liu, X., Gong, R.: Digital watermarking algorithm of QR Code based on DCT domain. Moder. Inf. Technol. 2(12), 13–15 (2018)

    Google Scholar 

  26. Prabakaran, G., Bhavani, R., Ramesh, M.: A robust QR-code video watermarking scheme based on SVD and DWT composite domain. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, PRIME, Salem, pp. 251–257. IEEE (2013)

    Google Scholar 

  27. Yao, Y.-Z., Wang, F., Yan, W.-B., Yu, N.-H.: Image privacy preservation scheme based on QR code and reversible visible watermarking. J. Commun. 40(11), 65–75 (2019)

    Google Scholar 

  28. Mohsin Arkah, Z., Alzubaidi, L., Ali, A.A., Abdulameer, A.T.: Digital color documents authentication using QR code based on digital watermarking. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds.) ISDA 2018 2018. AISC, vol. 940, pp. 1093–1101. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16657-1_102

    Chapter  Google Scholar 

  29. Dey, S., Agarwal, S., Nath, A.: Confidential encrypted data hiding and retrieval using QR authentication system. In: 2013 International Conference on Communication Systems and Network Technologies, Gwalior, pp. 512–517. IEEE (2013)

    Google Scholar 

  30. The USC-SIPI Image Database. http://sipi.usc.edu/database/, (accessed 9 January 2022)

Download references

Acknowledgements

This work was specially supported by Research Funds for NSD Construction, University of International Relations (2021GA08), National Natural Science Foundation of China (62172053, 62102113), Fundamental Research Funds for the Central Universities, University of International Relations (3262020T26, 3262021T13, 3262022T20).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, X., Zhang, B., Wen, Y., Tang, X., Su, H. (2022). An Improved Image Authentication Method Using QR Code Watermarking Approach. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06791-4_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06790-7

  • Online ISBN: 978-3-031-06791-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics