Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques

This study proposes a QR code technique application in tamper detection. The QR code has error correction, which was used to detect tamper images. This scheme can be applied to evidence tampering detection. The error correction rate of QR code encoding must be carefully designed because the extracted thumbnail of a cover image is lossless. Therefore, the 25% error correction rate was suitable for this paper goal. The original image thumbnail can sustain minor perceptible distortions; thus, the authors used the 25% lower significant bits of the thumbnail image of a cover image to reduce the secret data. The simulation revealed that the authors proposed scheme can detect tampered images easily. The proposed method has two main features: 1. this study uses QR code technique nested architecture, which has the more security of the secret information. 2. the method can quickly detect a tamper image’s location.

[1]  Tan-Hsu Tan,et al.  2D Barcode and Augmented Reality Supported English Learning System , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[2]  Constantinos Patsakis,et al.  Cross Format Embedding of Metadata in Images Using QR Codes , 2011 .

[3]  Wen Gao,et al.  Steganalysis of data hiding techniques in wavelet domain , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[4]  Tai-Wei Kan,et al.  Applying QR code in augmented reality applications , 2009, VRCAI '09.

[5]  Donghui Guo,et al.  A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[6]  Wen-Yuan Chen,et al.  Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..

[7]  Ingrid Daubechies,et al.  The wavelet transform, time-frequency localization and signal analysis , 1990, IEEE Trans. Inf. Theory.

[8]  Leonidas J. Guibas,et al.  A Barcode Shape Descriptor for Curve Point Cloud Data , 2004, PBG.

[9]  Dianne P. O'Leary,et al.  Reconstructing images of barcodes for construction site object recognition , 2002 .

[10]  Min-Yuan Cheng,et al.  Integrating barcode and GIS for monitoring construction progress , 2002 .

[11]  Chin-Hsing Chen,et al.  A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection , 2005, Pattern Recognit..

[12]  G. Coatrieux,et al.  A Review of Image Watermarking Applications in Healthcare , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[13]  Wen-Yuan Chen,et al.  Nested image steganography scheme using QR-barcode technique , 2009 .

[14]  Afzel Noore,et al.  Embedding biometric identifiers in 2D barcodes for improved security , 2004, Comput. Secur..

[15]  Wen-Yuan Chen,et al.  Image Hidden Technique Using QR-Barcode , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[16]  Ioannis Pitas,et al.  Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.