Covert QR Codes: How to Hide in the Crowd

被引:4
作者
Chow, Yang-Wai [1 ]
Susilo, Willy [1 ]
Baek, Joonsang [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017 | 2017年 / 10701卷
关键词
Covert message; Data hiding; Error correction; QR code; Secret sharing; SECURE;
D O I
10.1007/978-3-319-72359-4_42
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates a novel approach of distributing a hidden message via public channels. The proposed approach employs visual subterfuge to conceal secret information within a QR code. Using a QR code reader, any individual can decode the public information contained in the QR code. However, only authorized users who have the necessary credentials will be able to obtain the secret message, which is encoded in the form of a secret QR code. We call this a Covert QR (CQR) code scheme. To embed the secret information, this approach exploits the error correction mechanism inherent in the QR code structure. By using QR codes to conceal information, the proposed scheme has the advantage of reducing the likelihood of attracting the attention of potential adversaries. In addition, the information in QR codes can be scanned and decoded through the visual channel. As such, the secret information can be distributed on printed media and is not restricted to an electronic form.
引用
收藏
页码:678 / 693
页数:16
相关论文
共 22 条
[1]   Secure and distributed video surveillance via portable devices [J].
Albano, Pietro ;
Bruno, Andrea ;
Carpentieri, Bruno ;
Castiglione, Aniello ;
Castiglione, Arcangelo ;
Palmieri, Francesco ;
Pizzolante, Raffaele ;
Yim, Kangbin ;
You, Ilsun .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (02) :205-213
[2]  
[Anonymous], 2012, DIGITAL FORENSICS WA, DOI DOI 10.1007/978-3-642-32205-1
[3]  
[Anonymous], 2006, 180042006 ISOIEC
[4]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[5]   Secret handshakes from pairing-based key agreements [J].
Balfanz, D ;
Durfee, G ;
Shankar, N ;
Smetters, D ;
Staddon, J ;
Wong, HC .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :180-196
[6]   Robust Message Hiding for QR Code [J].
Bui, Thach V. ;
Vu, Nguyen K. ;
Nguyen, Thong T. P. ;
Echizen, Isao ;
Nguyen, Thuc D. .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :520-523
[7]   Nested image steganography scheme using QR-barcode technique [J].
Chen, Wen-Yuan ;
Wang, Jing-Wein .
OPTICAL ENGINEERING, 2009, 48 (05)
[8]  
Chin-Ho Chung, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P522, DOI 10.1109/IIH-MSP.2009.119
[9]   A QR Code Watermarking Approach Based on the DWT-DCT Technique [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Tonien, Joseph ;
Zong, Wei .
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 :314-331
[10]   Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Yang, Guomin ;
Phillips, James G. ;
Pranata, Ilung ;
Barmawi, Ari Moesriami .
INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 :409-425