Covert QR Codes: How to Hide in the Crowd

This paper investigates a novel approach of distributing a hidden message via public channels. The proposed approach employs visual subterfuge to conceal secret information within a QR code. Using a QR code reader, any individual can decode the public information contained in the QR code. However, only authorized users who have the necessary credentials will be able to obtain the secret message, which is encoded in the form of a secret QR code. We call this a Covert QR (CQR) code scheme. To embed the secret information, this approach exploits the error correction mechanism inherent in the QR code structure. By using QR codes to conceal information, the proposed scheme has the advantage of reducing the likelihood of attracting the attention of potential adversaries. In addition, the information in QR codes can be scanned and decoded through the visual channel. As such, the secret information can be distributed on printed media and is not restricted to an electronic form.

[1]  Diana K. Smetters,et al.  Secret handshakes from pairing-based key agreements , 2003, 2003 Symposium on Security and Privacy, 2003..

[2]  Refik Molva,et al.  A provably secure secret handshake with dynamic controlled matching , 2010, Comput. Secur..

[3]  Wen-Chuan Wu,et al.  Application of QR-Code Steganography Using Data Embedding Technique , 2013, ITCS.

[4]  Xiaobo Li,et al.  On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..

[5]  Edgar R. Weippl,et al.  E-voting Authentication with QR-codes , 2014, HCI.

[6]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[7]  James G. Phillips,et al.  Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing , 2016, ACISP.

[8]  Yang-Wai Chow,et al.  A QR Code Watermarking Approach Based on the DWT-DCT Technique , 2017, ACISP.

[9]  Thach V. Bui,et al.  Robust Message Hiding for QR Code , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[10]  Ilsun You,et al.  Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..

[11]  WeiQi Yan,et al.  Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.

[12]  Eric Jui-Lin Lu,et al.  Secret Hiding Mechanism Using QR Barcode , 2013, 2013 International Conference on Signal-Image Technology & Internet-Based Systems.

[13]  Song Wan,et al.  Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions , 2017, Journal of Real-Time Image Processing.

[14]  Wen-Yuan Chen,et al.  Nested image steganography scheme using QR-barcode technique , 2009 .

[15]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[16]  Hsi-Chieh Lee,et al.  Digital Watermarking Based on JND Model and QR Code Features , 2013 .

[17]  Hsiang-Cheh Huang,et al.  Reversible data hiding with histogram-based difference expansion for QR code applications , 2011, IEEE Transactions on Consumer Electronics.

[18]  Bruno Carpentieri,et al.  Text Compression and Encryption through Smart Devices for Mobile Communication , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[19]  Rastislav Lukac,et al.  Image Secret Sharing , 2006, Encyclopedia of Multimedia.

[20]  Wen-Yuan Chen,et al.  Image Hidden Technique Using QR-Barcode , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.