Abstract
This paper investigates a novel approach of distributing a hidden message via public channels. The proposed approach employs visual subterfuge to conceal secret information within a QR code. Using a QR code reader, any individual can decode the public information contained in the QR code. However, only authorized users who have the necessary credentials will be able to obtain the secret message, which is encoded in the form of a secret QR code. We call this a Covert QR (CQR) code scheme. To embed the secret information, this approach exploits the error correction mechanism inherent in the QR code structure. By using QR codes to conceal information, the proposed scheme has the advantage of reducing the likelihood of attracting the attention of potential adversaries. In addition, the information in QR codes can be scanned and decoded through the visual channel. As such, the secret information can be distributed on printed media and is not restricted to an electronic form.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
For a comprehensive description of the QR code structure and error correction mechanism, please refer to the ISO standard (ISO/IEC18004) [12].
- 2.
This QR code was generated from http://www.free-qr-code.net/.
References
Albano, P., Bruno, A., Carpentieri, B., Palmieri, F., Pizzolante, R., Yim, K., You, I.: Secure and distributed video surveillance via portable devices. J. Ambient Intell. Humanized Comput. 5(2), 205–213 (2014)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1–2), 143–161 (2001)
Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.: Secret handshakes from pairing-based key agreements. In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11–14 May 2003, Berkeley, CA, USA, pp. 180–196. IEEE Computer Society (2003)
Bui, T.V., Vu, N.K., Nguyen, T.T., Echizen, I., Nguyen, T.D.: Robust message hiding for QR code. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520–523. IEEE (2014)
Chen, W.-Y., Wang, J.-W.: Nested image steganography scheme using QR-barcode technique. Opt. Eng. 48(5), 057004–057004 (2009)
Chow, Y.-W., Susilo, W., Tonien, J., Zong, W.: A QR code watermarking approach based on the DWT-DCT technique. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10343, pp. 314–331. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59870-3_18
Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 409–425. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40253-6_25
Chung, C.-H., Chen, W.-Y., Tu, C.-M.: Image hidden technique using qr-barcode. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, pp. 522–525. IEEE (2009)
Denso Wave Incorporated. QRcode.com, http://www.qrcode.com/en/
Falkner, S., Kieseberg, P., Simos, D.E., Traxler, C., Weippl, E.: E-voting authentication with QR-codes. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 149–159. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_14
Huang, H.-C., Chang, F.-C., Fang, W.-C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011)
International Organization for Standardization: Information technology – automatic identification and data capture techniques – QR code 2005 bar code symbology specification. ISO/IEC 18004:2006 (2006)
Lee, H.C., Dong, C.R., Lin, T.M.: Digital watermarking based on JND model and QR code features. In: Pan, J.S., Yang, C.N., Lin, C.C. (eds.) Advances in Intelligent Systems and Applications – Volume 2. SIST, vol 21, pp. 141–148. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35473-1_15
Lin, P.-Y., Chen, Y.-H., Lu, E.J.-L., Chen, P.-J.: Secret hiding mechanism using QR barcode. In: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 22–25. IEEE (2013)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419
Pizzolante, R., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F.: Text compression and encryption through smart devices for mobile communication. In: 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 672–677, July 2013
Sorniotti, A., Molva, R.: A provably secure secret handshake with dynamic controlled matching. Comput. Secur. 29(5), 619–627 (2010). Challenges for Security, Privacy and Trust
Wan, S., Lu, Y., Yan, X., Wang, Y., Chang, C.: Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J. Real-Time Image Process., 1–16 (2017)
Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42(11), 3071–3082 (2009)
Weir, J., Yan, W.Q.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196–210. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32205-1_17
Wu, W.-C., Lin, Z.-W., Wong, W.-T.: Application of QR-code steganography using data embedding technique. In: Park, J.J.J.H., Barolli, L., Xhafa, F., Jeong, H.Y. (eds.) Information Technology Convergence. LNEE, vol. 253, pp. 597–605. Springer, Dordrecht (2013). https://doi.org/10.1007/978-94-007-6996-0_63
Yan, W., Wier, J., Kankanhalli, M.S.: Image secret sharing. In: Cimato, S., Yang, C.-N. (eds.) Visual Cryptography and Secret Image Sharing, pp. 381–402. CRC Press, Taylor and Francis Group (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chow, YW., Susilo, W., Baek, J. (2017). Covert QR Codes: How to Hide in the Crowd. In: Liu, J., Samarati, P. (eds) Information Security Practice and Experience. ISPEC 2017. Lecture Notes in Computer Science(), vol 10701. Springer, Cham. https://doi.org/10.1007/978-3-319-72359-4_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-72359-4_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72358-7
Online ISBN: 978-3-319-72359-4
eBook Packages: Computer ScienceComputer Science (R0)