Download presentation
Presentation is loading. Please wait.
Published byOlivia Noora Tamminen Modified over 5 years ago
1
Rich QR Codes With Three-Layer Information Using Hamming Code
Source: IEEE Access (2019): Authors: Liu, Sijia, Zhengxin Fu, and Bin Yu Speaker: Huang Peng-Cheng Date: 11/24/2019
2
Outline Introduction Related Works Proposed scheme
Experimental results Conclusions Comments
3
Introduction(1/1)
4
Related Works(1/1)—Hamming code(1/2)
p1 p2 d1 p3 d2 d3 d4 d1 d2 d3 d4 Encoding Data: d2 d3 d4 = p3 1 0 1 = 0 d1 d2 d4 = p1 1 1 1 = 1 d1 d3 d4 = p2 1 0 1 = 0 p1 p2 d1 p3 d2 d3 d4 Encoded data
5
Related Works(1/1)—Hamming code(2/2)
Error bit Error Detection Received data: Correcting Corrected data: Error Position Parity check matrix H
6
Proposed scheme (1/3)
7
Proposed scheme (2/3) …. v: The second layer message
s: The third layer message QR1 QR2 QR3 …. Cover QR code QR2p Location map index
8
Proposed scheme (3/3) Suppose p=3 = [0010100]
Example: [7,4] Hamming code, the parity check matrix H is : Embedding process: Cover vector Stego vector x’ = Change one bit in x according to coset leader associated to syndrome = Change one bit in x according to coset leader associated to = Change one bit in according to coset leader associated to = [ ] Extraction process:
9
Experimental results (1/6) --An example(1/1)
10
Experimental results (2/6) --Robustness (1/1)
11
Experimental results (3/6) --Payload(1/1)
12
Experimental results (4/6) --Comparison(1/3)
[9] P.-Y. Lin, ‘‘Distributed secret sharing approach with cheater prevention based on QR code,’’ IEEE Trans. Ind. Informat., vol. 12, no. 1, pp. 384–392, Feb [13] Y. W. Chow, W. Susilo, G. Yang, J. G. Phillips, and I. A. M. P. Barmawi, ‘‘Exploiting the error correction mechanism in QR codes for secret sharing,’’ in Proc. ACISP, 2016, pp. 409–425 [14] Y. Liu, Z. Fu, and Y. Wang, ‘‘Two-level information management scheme based on visual cryptography and qr code,’’ Appl. Res. Comput., vol. 33, pp. 3460–3463, Nov [15] S. Wan, Y. Lu, X. Yan, Y. Wang, and C. Chang, ‘‘Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions,’’ J. Real-Time Image Process., vol. 14, no. 1, pp. 25–40, Jan. 2018 [16] P.-C. Huang, Y.-H. Li, C.-C. Chang, and Y. Liu, ‘‘Efficient scheme for secret hiding in QR code by improving exploiting modification direction,’’ KSII Trans. Internet Inf. Syst., vol. 12, no. 5, pp. 2348–2365, 2018.
13
Experimental results (5/6) --Comparison(2/3)
14
Experimental results (6/6) --Comparison(3/3)
15
Conclusions Three-layer information storage Large secret payload
Low computational complexity Robust against common image post-processing attacks
16
Comments (n, n)-threshold SS => (2p, 2p)-threshold SS
Requires side information to extract secret message, such as the length of secret message, location map, parity check matrix H. Poor Robustness.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.