Skip to main content

Increasing Secret Data Hiding Capacity in QR Code Using \(3 \times 3\) Subcells

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10082))

Included in the following conference series:

Abstract

Recently, the use of QR code is becoming increasingly popular such that the majority smart-phone devices nowadays are capable reading them. Based on the development of camera technology in latest smart-phone devices, Teraura et al. proposed a method for hiding an additional data into a fine subcell structure of a monochrome QR code. Based on \(3 \times 3\) subcells configuration, the cover data is placed at the outer subcells while the embedded data is placed in a single center subcell. In general, QR code reader detects a cell color from its center pixel and such that it is difficult to extract the cover data of a \(3 \times 3\) subcells QR code. This research proposes an alternative method by accommodating different approaches in recognizing a cell color. The subcell selection for embedded data was kept secret by applying pseudorandom to randomize the bit data position in each cell. Experimental results show that using the proposed method, 97% of \(3 \times 3\) subcells QR code can be read by a general QR code reader. It uses 4 subcells to store 4 bits additional data and had embedded data capacity 4 times higher than the method of Teraura et al.

This work was supported by PT. Telekomunikasi Indonesia, Tbk.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wave, D.: Information technology automatic identification and data capture techniques QR code bar code symbology specification. International Organization for Standardization, ISO/IEC:18004, February 2015

    Google Scholar 

  2. Lin, P.-Y., Chen, Y.-H., Lu, E.J.-L., Chen, P.-J.: Secret hiding mechanism using QR barcode. In: 2013 International Conference on Signal-Image Technology and Internet-Based Systems (SITIS), pp. 22–25. IEEE (2013)

    Google Scholar 

  3. Bui, T.V., Vu, N.K., Nguyen, T.T., Echizen, I., Nguyen, T.D.: Robust message hiding for QR code. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520–523. IEEE (2014)

    Google Scholar 

  4. Barmawi, A.M., Yulianto, F.A.: Watermarking QR code. In: 2015 2nd International Conference on Information Science and Security (ICISS), pp. 1–4. IEEE (2015)

    Google Scholar 

  5. Teraura, N., Sakurai, K.: Information hiding in subcells of a two-dimensional code. In: The 1st IEEE Global Conference on Consumer Electronics 2012, pp. 652–656, October 2012

    Google Scholar 

  6. Kor Ashwini N, Kazi, N.M.: A survey of water mark technique. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 3(2) (2014)

    Google Scholar 

  7. Chen, W., Yang, G., Zhang, G.: A simple and efficient image pre-processing for QR decoder. In: 2nd International Conference on Electronic and Mechanical Engineering and Information Technology. Atlantis Press (2012)

    Google Scholar 

  8. Barker, E.B., Kelsey, J.M.: Recommendation for random number generation using deterministic random bit generators (revised). Information Technology Laboratory, Computer Security Division, National Institute of Standards and Technology, US Department of Commerce, Technology Administration (2007)

    Google Scholar 

  9. Fips, P.: 140-2. Security Requirements for Cryptographic Modules, vol. 25 (2001)

    Google Scholar 

  10. Easter, R.J., French, C., Gallagher, P.: Annex c: approved random number generators for FIPS PUB 140–2, security requirements for cryptographic modules. NIST, February 2012

    Google Scholar 

  11. Wave, D.: Point for setting the module size. qrcode.com—denso wave (2016). http://www.qrcode.com/en/howto/cell.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wisdarmanto Erlangga .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Erlangga, W., Barmawi, A.M. (2017). Increasing Secret Data Hiding Capacity in QR Code Using \(3 \times 3\) Subcells. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53465-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53464-0

  • Online ISBN: 978-3-319-53465-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics