QR Code Authentication with Embedded Message Authentication Code

Slides:



Advertisements
Similar presentations
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Bob can sign a message using a digital signature generation algorithm
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
Cryptography Why Cryptography Symmetric Encryption
A Secret Information Hiding Scheme Based on Switching Tree Coding
B. R. Chandavarkar CSE Dept., NITK Surathkal
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Source: IEEE Transactions on Information Forensics and Security, Vol
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Digital Certificate Based Security Payment for QR Code Applications
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Efficient QR Code Beautification With High Quality Visual Content
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Separable and error-free reversible data hiding in encrypted images
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
A Novel Latin Square-based Secret Sharing for M2M Communications
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
Dynamic embedding strategy of VQ-based information hiding approach
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Pairwise IPVO-Based Reversible Data Hiding
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

QR Code Authentication with Embedded Message Authentication Code Source: Mobile Networks and Applications, pp. 1- 12, 2016. (published online: 17 Nov. 2016) Authors: Changsheng Chen Speaker: Huang Peng-Cheng Date: 12/2/2018 Shenzhen Univesity

Outline Related Works The Proposed Scheme Experimental results Conclusions Comments

Related works(1/2) --QR code The structure for QR code of version 6 with error correction level medium

Related Works(2/2) The mask operation in the QR code generation process.

The proposed scheme (1/4)

The proposed scheme (2/4)

The proposed scheme (3/4) --The choice of cryptography algorithms Using message authentication code with symmetric cryptography where only a single party is involved in the barcode enrollment and authentication. Universal Message Authentication Code (UMAC) F: AES=>41 bytes the length of S is designed to be 4, 8, 12, or 16 bytes Application: applied on preventing receipt forgery in return fraud

The proposed scheme (4/4) --The choice of cryptography algorithms Using digital signature with asymmetric cryptography where multiple parties is involved in the barcode enrollment and authentication. The Elliptic Curve Digital Signature Algorithm (ECDSA) Application: payment information authentication

Experimental results (1/5) --Decoding performances

Experimental results (2/5) --Decoding performances

Experimental results (3/5) --Decrement of barcode module size

Experimental results (4/5) --Security considerations on data authentication For the case using message authentication code: The length of UAMC L is 4, 8, 12, or 16 bytes For the case using digital signature : the ECDSA signature is of 41 bytes, so L=41

Experimental results (5/5) --Comparisons of embedding capacity with the existing data embedding approaches 17. Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimedia 9(3):475–486 18. Yang H, Kot AC, Rahardja S (2008) Orthogonal data embedding for binary images in morphological transform domain- a high-capacity approach. IEEE Trans Multimedia 10(3):339–351

Conclusions Off-line certification High security High capacity

comments The approach is implemented with the error correction mechanism of QR code. Embed the authentication code by using data hiding approach. The secret payload can be improved by exploiting the characteristic of RS code.