QR Code Authentication with Embedded Message Authentication Code

被引:15
作者
Chen, Changsheng [1 ,2 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, Shenzhen, Peoples R China
[2] Shenzhen Univ, Shenzhen Key Lab Media Secur, Shenzhen, Peoples R China
关键词
QR code; Data embedding; Message authentication code; Error correction code; Authentication; BINARY IMAGES; DOCUMENTS; SECURITY;
D O I
10.1007/s11036-016-0772-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Quick Response (QR) code is widely used nowadays but its authenticity is an open issue. Attackers can easily replace the original barcode by a modified one which is generated through the standard encoder. This paper proposes to embed the authentication data such as message authentication code and cryptographic signature for QR code authentication. The scheme utilizes the redundancy of the error correction codewords to store the authentication data while still maintaining the default error correction capability. The stego barcode can be decoded by common users with a standard barcode decoder. The embedded data can be extracted with the knowledge of the barcode structure and the embedding process. The authenticity of the QR codes can then be verified off-line by the authorized user as and when needed. In our experiment, 100 % of the embedded data and encoded information can be retrieved correctly in the decodable barcodes with the off-the-shelf cameras. Security analysis shows that the proposed scheme is secure against attacks in tampering the barcode content. Compared with the existing data hiding scheme, the proposed method has much higher embedding capacity under the same error correction level.
引用
收藏
页码:383 / 394
页数:12
相关论文
共 36 条
[1]  
[Anonymous], 2006, INF TECHN AUT ID DAT, P18004
[2]  
[Anonymous], 2012, Conceptualising Customer Relationship Management and Its Impact on Customer Lifetime Value in the Taiwanese Banking Sector
[3]  
Arregoces M., 2003, DATA CTR FUNDAMENTAL
[4]  
Black J., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P216, DOI 10.1007/3-540-48405-1_14
[5]  
BoucyCastle.org, BOUNC CASTL CRYPT AP
[6]   2D Finite Rate of Innovation Reconstruction Method for Step Edge and Polygon Signals in the Presence of Noise [J].
Chen, Changsheng ;
Marziliano, Pina ;
Kot, Alex C. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (06) :2851-2859
[7]  
Daemen J., 2002, DESIGN RIJNDAEL AES, DOI DOI 10.1007/978-3-662-04722-4
[8]   HIDING INFORMATION INSIDE STRUCTURED SHAPES [J].
Das, Samarjit ;
Rane, Shantanu ;
Vetro, Anthony .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :1782-1785
[9]  
Ebling M, 2010, IEEE PERVAS COMPUT, V9, P24
[10]  
Eldefrawy M. H., 2012, 2012 International Symposium on Biometrics and Security Technologies (ISBAST 2012), P77, DOI 10.1109/ISBAST.2012.16