Two-Level QR Code for Private Message Sharing and Document Authentication

The quick response (QR) code was designed for storage information and high-speed reading applications. In this paper, we present a new rich QR code that has two storage levels and can be used for document authentication. This new rich QR code, named two-level QR code, has public and private storage levels. The public level is the same as the standard QR code storage level; therefore, it is readable by any classical QR code application. The private level is constructed by replacing the black modules by specific textured patterns. It consists of information encoded using q-ary code with an error correction capacity. This allows us not only to increase the storage capacity of the QR code, but also to distinguish the original document from a copy. This authentication is due to the sensitivity of the used patterns to the print-and-scan (P&S) process. The pattern recognition method that we use to read the second-level information can be used both in a private message sharing and in an authentication scenario. It is based on maximizing the correlation values between P&S degraded patterns and reference patterns. The storage capacity can be significantly improved by increasing the code alphabet q or by increasing the textured pattern size. The experimental results show a perfect restoration of private information. It also highlights the possibility of using this new rich QR code for document authentication.

[1]  Robert Ulichney,et al.  Digital Halftoning , 1987 .

[2]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[3]  Thierry Pun,et al.  Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding , 2007, Electronic Imaging.

[4]  Justin Picard Digital authentication with copy-detection patterns , 2004, IS&T/SPIE Electronic Imaging.

[5]  Thach V. Bui,et al.  Robust Message Hiding for QR Code , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[6]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2006, IEEE Trans. Inf. Forensics Secur..

[7]  Ming Sun,et al.  Research on embedding and extracting methods for digital watermarks applied to QR code images , 2007 .

[8]  Ramakrishna Kakarala,et al.  Visually significant QR codes: Image blending and statistical analysis , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[9]  J. Rouillard,et al.  Contextual QR Codes , 2008, 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008).

[10]  Giuseppe F. Italiano,et al.  2D Color Barcodes for Mobile Phones , 2011, Int. J. Comput. Sci. Appl..

[11]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2005, IEEE Transactions on Information Forensics and Security.

[12]  William Puech,et al.  Fighting against forged documents by using textured image , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[13]  B. S. Manjunath,et al.  `Print and Scan' Resilient Data Hiding in Images , 2006, IEEE Transactions on Information Forensics and Security.

[14]  François Cayre,et al.  2D bar-codes for authentication: A security approach , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[15]  Shih-Fu Chang,et al.  Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process , 2000 .

[16]  Thierry Pun,et al.  Visual communications with side information via distributed printing channels: extended multimedia and security perspectives , 2004, IS&T/SPIE Electronic Imaging.

[17]  Oliver Bimber,et al.  Unsynchronized 4D Barcodes , 2007, ISVC.

[18]  Xiamu Niu,et al.  Print-and-scan model and the watermarking countermeasure , 2005, Image Vis. Comput..

[19]  S. Vongpradhip,et al.  QR code using invisible watermarking in frequency domain , 2012, 2011 Ninth International Conference on ICT and Knowledge Engineering.

[20]  Patrick Bas,et al.  Document authentication using graphical codes: reliable performance analysis and channel optimization , 2014, EURASIP Journal on Information Security.

[21]  Giuseppe F. Italiano,et al.  Facial biometrics for 2D barcodes , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).

[22]  Eric Jui-Lin Lu,et al.  Secret Hiding Mechanism Using QR Barcode , 2013, 2013 International Conference on Signal-Image Technology & Internet-Based Systems.