Skip to main content
Log in

Efficient QR code authentication mechanism based on Sudoku

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

QR code is an important means for delivering information which has been widely used in our daily life. As an ISO international standard, the QR code encoding and decoding process are disclosed publicly, thus it is easy to decode a QR code then forge a new QR code with the same QR code public message. It can lead to the problems of information forgery and ease the spreading of fake news. To overcome this weakness, we propose a simple and efficient QR code authentication mechanism to embed the authentication information in the padding region of QR code based on the characteristics of Sudoku and Reed-Solomon code. Different from the previous scheme, the proposed scheme embeds the authentication information without consuming the QR code error correction capacity and is able to achieve a higher embedding capacity. Experimental results show that the proposed scheme has high security, low power consumption and is robust to common QR code attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P (1999) UMAC: Fast and secure message authentication. In: Annual International Cryptology Conference, Springer, pp 216–233

  2. Chen C (2017) QR code authentication with embedded message authentication code. Mobile Networks and Applications 22(3):383–394

    Article  Google Scholar 

  3. Chen Y-Y, Chi K-Y, Hua K-L (2017) Design of image barcodes for future mobile advertising. EURASIP Journal on Image and Video Processing 2017(1). https://doi.org/10.1186/s13640-016-0158-x

  4. Conde-Lagoa D, Costa-Montenegro E, González-Castaño FJ, Gil-Castiñeira F (2010) Secure eTickets based on QR-Codes with user-encrypted content. In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, pp 257–258

  5. Cox R (2012) Qart codes. http://research.swtch.com/qart. Accessed Dec 2012

  6. Felgenhauer B, Jarvis F (2003) Sudoku enumeration problems. http://www.afjarvis.staff.shef.ac.uk/sudoku/. Accessed 23 Nov 2017

  7. Inc. D-W (2003) QR code standardization. www.qrcode.com/en/about/standards.html. Accessed 24 Nov 2017

  8. ISO B (2005) IEC 18004: 2006. Information technology Automatic identification and data capture techniques QR Code:126

  9. Jing P, Su Y, Nie L, Bai X, Liu J, Wang M (2018) Low-rank multi-view embedding learning for micro-video popularity prediction. IEEE Trans Knowl Data Eng 30(8):1519–1532

    Article  Google Scholar 

  10. Knuth DE (1985) Dynamic huffman coding. Journal of algorithms 6(2):163–180

    Article  MathSciNet  MATH  Google Scholar 

  11. Lerner A, Saxena A, Ouimet K, Turley B, Vance A, Kohno T, Roesner F (2015) Analyzing the use of quick response codes in the wild. In: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, ACM, pp 359–374

  12. Li L, Wang R-l (2011) A digital watermarking algorithm for QR code. Journal of Hangzhou Dianzi University 31(2):46–49

    Google Scholar 

  13. Li F, Mao Q, Chang C-C (2016) A reversible data hiding scheme based on IWT and the Sudoku method. International Journal of Network Security 18(3):410–419

    Google Scholar 

  14. Liu M, Nie L, Wang X, Tian Q, Chen B (2019) Online data organizer: micro-video categorization by structure-guided multimodal dictionary learning. IEEE Trans Image Process 28(3):1235–1247

    Article  MathSciNet  Google Scholar 

  15. Lu J, Yang Z, Li L, Yuan W, Li L, Chang C-C (2017) Multiple schemes for mobile payment authentication using QR code and visual cryptography. Mob Inf Syst 2017(4356038):12. https://doi.org/10.1155/2017/4356038

  16. Mazurczyk W, Caviglione L (2015) Steganography in modern smartphones and mitigation techniques. IEEE Communications Surveys & Tutorials 17(1):334–357

    Article  Google Scholar 

  17. Motahari A, Adjouadi M (2015) Barcode modulation method for data transmission in mobile devices. IEEE Transactions on Multimedia 17(1):118–127

    Article  Google Scholar 

  18. Nazemzadeh P, Fontanelli D, Macii D, Palopoli L (2017) Indoor localization of Mobile robots through QR code detection and dead reckoning data fusion. IEEE/ASME Transactions on Mechatronics 22(6):2588–2599

    Article  Google Scholar 

  19. Pountain D (1987) Run-length encoding. Byte 12(6):317–319

    Google Scholar 

  20. Qian J, Du X, Zhang B, Fan B, Yang X (2017) Optimization of QR code readability in movement state using response surface methodology for implementing continuous chain traceability. Comput Electron Agric 139:56–64

    Article  Google Scholar 

  21. Qin J, Sun R, Xiang X, Li H, Huang H (2016) Anti-fake digital watermarking algorithm based on QR codes and DWT. Journal of the Society for Industrial and Applied Mathematics 18(6):1102–1108

    Google Scholar 

  22. Reed IS, Solomon G (1960) Polynomial codes over certain finite fields. J Soc Ind Appl Math 8(2):300–304

    Article  MathSciNet  MATH  Google Scholar 

  23. Sun M, Si J, Zhang S (2007) Research on embedding and extracting methods for digital watermarks applied to QR code images. N Z J Agric Res 50(5):861–867

    Article  Google Scholar 

  24. Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin J-M, Guichard C (2016) Two-level QR code for private message sharing and document authentication. IEEE Transactions on Information Forensics and Security 11(3):571–583

    Article  Google Scholar 

  25. Tkachenko I, Puech W, Strauss O, Gaudin J-M, Destruel C, Guichard C (2016) Centrality bias measure for high density QR code module recognition. Signal Process Image Commun 41:46–60

    Article  Google Scholar 

Download references

Funding

This study was funded by the NSFC (grant number 61672442 and grand number 61872436), the Fujian NSF (grant number 2016Y0079 and grand number 2016 J01327), the Quanzhou Science and Technology Plan Project (grant number 2017G030).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, PC., Li, YH., Chang, CC. et al. Efficient QR code authentication mechanism based on Sudoku. Multimed Tools Appl 78, 26023–26045 (2019). https://doi.org/10.1007/s11042-019-07795-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07795-8

Keywords

Navigation