Abstract
Recently, the use of QR code is becoming increasingly popular such that the majority smart-phone devices nowadays are capable reading them. Based on the development of camera technology in latest smart-phone devices, Teraura et al. proposed a method for hiding an additional data into a fine subcell structure of a monochrome QR code. Based on \(3 \times 3\) subcells configuration, the cover data is placed at the outer subcells while the embedded data is placed in a single center subcell. In general, QR code reader detects a cell color from its center pixel and such that it is difficult to extract the cover data of a \(3 \times 3\) subcells QR code. This research proposes an alternative method by accommodating different approaches in recognizing a cell color. The subcell selection for embedded data was kept secret by applying pseudorandom to randomize the bit data position in each cell. Experimental results show that using the proposed method, 97% of \(3 \times 3\) subcells QR code can be read by a general QR code reader. It uses 4 subcells to store 4 bits additional data and had embedded data capacity 4 times higher than the method of Teraura et al.
This work was supported by PT. Telekomunikasi Indonesia, Tbk.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wave, D.: Information technology automatic identification and data capture techniques QR code bar code symbology specification. International Organization for Standardization, ISO/IEC:18004, February 2015
Lin, P.-Y., Chen, Y.-H., Lu, E.J.-L., Chen, P.-J.: Secret hiding mechanism using QR barcode. In: 2013 International Conference on Signal-Image Technology and Internet-Based Systems (SITIS), pp. 22–25. IEEE (2013)
Bui, T.V., Vu, N.K., Nguyen, T.T., Echizen, I., Nguyen, T.D.: Robust message hiding for QR code. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520–523. IEEE (2014)
Barmawi, A.M., Yulianto, F.A.: Watermarking QR code. In: 2015 2nd International Conference on Information Science and Security (ICISS), pp. 1–4. IEEE (2015)
Teraura, N., Sakurai, K.: Information hiding in subcells of a two-dimensional code. In: The 1st IEEE Global Conference on Consumer Electronics 2012, pp. 652–656, October 2012
Kor Ashwini N, Kazi, N.M.: A survey of water mark technique. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 3(2) (2014)
Chen, W., Yang, G., Zhang, G.: A simple and efficient image pre-processing for QR decoder. In: 2nd International Conference on Electronic and Mechanical Engineering and Information Technology. Atlantis Press (2012)
Barker, E.B., Kelsey, J.M.: Recommendation for random number generation using deterministic random bit generators (revised). Information Technology Laboratory, Computer Security Division, National Institute of Standards and Technology, US Department of Commerce, Technology Administration (2007)
Fips, P.: 140-2. Security Requirements for Cryptographic Modules, vol. 25 (2001)
Easter, R.J., French, C., Gallagher, P.: Annex c: approved random number generators for FIPS PUB 140–2, security requirements for cryptographic modules. NIST, February 2012
Wave, D.: Point for setting the module size. qrcode.com—denso wave (2016). http://www.qrcode.com/en/howto/cell.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Erlangga, W., Barmawi, A.M. (2017). Increasing Secret Data Hiding Capacity in QR Code Using \(3 \times 3\) Subcells. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-53465-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53464-0
Online ISBN: 978-3-319-53465-7
eBook Packages: Computer ScienceComputer Science (R0)