Skip to main content
Erschienen in: Mobile Networks and Applications 3/2017

17.11.2016

QR Code Authentication with Embedded Message Authentication Code

verfasst von: Changsheng Chen

Erschienen in: Mobile Networks and Applications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Quick Response (QR) code is widely used nowadays but its authenticity is an open issue. Attackers can easily replace the original barcode by a modified one which is generated through the standard encoder. This paper proposes to embed the authentication data such as message authentication code and cryptographic signature for QR code authentication. The scheme utilizes the redundancy of the error correction codewords to store the authentication data while still maintaining the default error correction capability. The stego barcode can be decoded by common users with a standard barcode decoder. The embedded data can be extracted with the knowledge of the barcode structure and the embedding process. The authenticity of the QR codes can then be verified off-line by the authorized user as and when needed. In our experiment, 100 % of the embedded data and encoded information can be retrieved correctly in the decodable barcodes with the off-the-shelf cameras. Security analysis shows that the proposed scheme is secure against attacks in tampering the barcode content. Compared with the existing data hiding scheme, the proposed method has much higher embedding capacity under the same error correction level.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
1
the smallest black/white blocks in a barcode as is shown in Fig. 1b.
 
Literatur
1.
2.
Zurück zum Zitat Villan R, Voloshynovskiy S, Koval O, Pun T (2006) Multilevel 2-D bar codes: Toward high-capacity storage modules for multimedia security and management. IEEE Trans Inf Forensics Secur 1(4):405–420CrossRef Villan R, Voloshynovskiy S, Koval O, Pun T (2006) Multilevel 2-D bar codes: Toward high-capacity storage modules for multimedia security and management. IEEE Trans Inf Forensics Secur 1(4):405–420CrossRef
3.
Zurück zum Zitat Park N, Lee W, Woo W Barcode-assisted planar object tracking method for mobile augmented reality. In: Proc. of International Symposium on Ubiquitous Virtual Reality, Jul. 2011, pp 40–43 Park N, Lee W, Woo W Barcode-assisted planar object tracking method for mobile augmented reality. In: Proc. of International Symposium on Ubiquitous Virtual Reality, Jul. 2011, pp 40–43
4.
Zurück zum Zitat Gao J, Kulkarni V, Ranavat H, Chang L, Mei H A 2D barcode-based mobile payment system. In: Proc. of International Conference on Multimedia and Ubiquitous Engineering, Jun. 2009, pp 320–329 Gao J, Kulkarni V, Ranavat H, Chang L, Mei H A 2D barcode-based mobile payment system. In: Proc. of International Conference on Multimedia and Ubiquitous Engineering, Jun. 2009, pp 320–329
5.
Zurück zum Zitat Ebling M, Cáceres R (2010) Bar codes everywhere you look. IEEE Pervasive Comput 9:24–5CrossRef Ebling M, Cáceres R (2010) Bar codes everywhere you look. IEEE Pervasive Comput 9:24–5CrossRef
6.
Zurück zum Zitat Kato H, Tan KT (2007) Pervasive 2D barcodes for camera phone applications. IEEE Pervasive Comput 6:476–85CrossRef Kato H, Tan KT (2007) Pervasive 2D barcodes for camera phone applications. IEEE Pervasive Comput 6:476–85CrossRef
7.
Zurück zum Zitat Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: Proc. of the International Conference on Advances in Mobile Computing and Multimedia, pp 430–435 Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: Proc. of the International Conference on Advances in Mobile Computing and Multimedia, pp 430–435
8.
Zurück zum Zitat Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: Perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRef Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: Perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRef
9.
Zurück zum Zitat Rowe RK (2011) Copy-resistant barcodesc. SPIE Newsroom Rowe RK (2011) Copy-resistant barcodesc. SPIE Newsroom
10.
Zurück zum Zitat Wilds M, Chambers S Bar code authentication, Patent US 2010/0 012 736 A1, Jan., 2010 Wilds M, Chambers S Bar code authentication, Patent US 2010/0 012 736 A1, Jan., 2010
11.
Zurück zum Zitat Eldefrawy M, Alghathbar K, Khan M Hardcopy document authentication based on public key encryption and 2D barcodes. In: Proc. of International Symposium on Biometrics and Security Technologies, Mar. 2012, pp 77–81 Eldefrawy M, Alghathbar K, Khan M Hardcopy document authentication based on public key encryption and 2D barcodes. In: Proc. of International Symposium on Biometrics and Security Technologies, Mar. 2012, pp 77–81
12.
Zurück zum Zitat Li CM, Hu P, Lau WC Authpaper: Protecting paper-based documents and credentials using authenticated 2d barcodes. In: 2015 IEEE International Conference on Communications (ICC). IEEE, 2015, pp 7400–7406 Li CM, Hu P, Lau WC Authpaper: Protecting paper-based documents and credentials using authenticated 2d barcodes. In: 2015 IEEE International Conference on Communications (ICC). IEEE, 2015, pp 7400–7406
13.
Zurück zum Zitat Kishk S, Javidi B (2004) Robust and secure two-dimensional barcode system. Opt Eng 43(10):2256–2265CrossRef Kishk S, Javidi B (2004) Robust and secure two-dimensional barcode system. Opt Eng 43(10):2256–2265CrossRef
15.
Zurück zum Zitat Tzeng C-H, Tsai W-H (2003) A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Commun Lett 7(9):443–445CrossRef Tzeng C-H, Tsai W-H (2003) A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Commun Lett 7(9):443–445CrossRef
16.
Zurück zum Zitat Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimedia 6(4):528–538CrossRef Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimedia 6(4):528–538CrossRef
17.
Zurück zum Zitat Yang H, Kot A C (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimedia 9(3):475–486CrossRef Yang H, Kot A C (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimedia 9(3):475–486CrossRef
18.
Zurück zum Zitat Yang H, Kot AC, Rahardja S (2008) Orthogonal data embedding for binary images in morphological transform domain- a high-capacity approach. IEEE Trans Multimedia 10(3):339–351CrossRef Yang H, Kot AC, Rahardja S (2008) Orthogonal data embedding for binary images in morphological transform domain- a high-capacity approach. IEEE Trans Multimedia 10(3):339–351CrossRef
19.
Zurück zum Zitat Villán R, Voloshynovskiy S, Koval O, Vila J, Topak E, Deguillaume F, Rytsar Y, Pun T (2006). In: III EJD, Wong PW (eds) Text data-hiding for digital and printed documents: theoretical and practical considerations, vol 6072, p 607212. SPIE Villán R, Voloshynovskiy S, Koval O, Vila J, Topak E, Deguillaume F, Rytsar Y, Pun T (2006). In: III EJD, Wong PW (eds) Text data-hiding for digital and printed documents: theoretical and practical considerations, vol 6072, p 607212. SPIE
20.
Zurück zum Zitat Varna A, Rane S, Vetro A (2009) Data hiding in hard-copy text documents robust to print, scan and photocopy operations. In: Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pp 1397–1400 Varna A, Rane S, Vetro A (2009) Data hiding in hard-copy text documents robust to print, scan and photocopy operations. In: Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pp 1397–1400
21.
Zurück zum Zitat Das S, Rane S, Vetro A Hiding information inside structured shapes. In: Proc. of IEEE International Conference on Acoustics Speech and Signal Processing, Mar 2010, pp 1782–1785 Das S, Rane S, Vetro A Hiding information inside structured shapes. In: Proc. of IEEE International Conference on Acoustics Speech and Signal Processing, Mar 2010, pp 1782–1785
23.
Zurück zum Zitat Moreira J, Farrell P (2006) Essentials of Error-Control Coding. Wiley Moreira J, Farrell P (2006) Essentials of Error-Control Coding. Wiley
24.
Zurück zum Zitat (2006) Information technology–Automatic Identification and data capture techniques–QR Code 2005 bar code symbology,BS ISO/IEC 18004:2006, International Organization for Standardization (2006) Information technology–Automatic Identification and data capture techniques–QR Code 2005 bar code symbology,BS ISO/IEC 18004:2006, International Organization for Standardization
25.
Zurück zum Zitat (2011) Information technology -Security techniques - Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher, BS ISO/IEC 9797-1:2011, International Organization for Standardization (2011) Information technology -Security techniques - Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher, BS ISO/IEC 9797-1:2011, International Organization for Standardization
26.
Zurück zum Zitat Information technology -Security techniques - Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash function BS ISO/IEC 9797-2:2011 International Organization for Standardization (2011) Information technology -Security techniques - Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash function BS ISO/IEC 9797-2:2011 International Organization for Standardization (2011)
27.
Zurück zum Zitat Information technology -Security techniques - Message Authentication Codes (MACs) Part 3: Mechanisms using a universal hash-function BS ISO/IEC 9797-3:2011 International Organization for Standardization (2011) Information technology -Security techniques - Message Authentication Codes (MACs) Part 3: Mechanisms using a universal hash-function BS ISO/IEC 9797-3:2011 International Organization for Standardization (2011)
28.
Zurück zum Zitat Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P UMAC: Fast and secure message authentication. In: Advances in Cryptology - CRYPTO’99, ser. Lecture Notes in Computer Science, M. Wiener, Ed. Springer Berlin Heidelberg, 1999, vol. 1666, pp 216–233 Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P UMAC: Fast and secure message authentication. In: Advances in Cryptology - CRYPTO’99, ser. Lecture Notes in Computer Science, M. Wiener, Ed. Springer Berlin Heidelberg, 1999, vol. 1666, pp 216–233
29.
Zurück zum Zitat Krovetz T (2006) UMAC: Message Authentication Code using Universal Hashing. Request for Comments:4418 Krovetz T (2006) UMAC: Message Authentication Code using Universal Hashing. Request for Comments:4418
30.
Zurück zum Zitat Arregoces M, Portolani M (2003) Data Center Fundamentals. Cisco Press Arregoces M, Portolani M (2003) Data Center Fundamentals. Cisco Press
31.
Zurück zum Zitat FIPS (2009) Digital signature standard. Ferderal Information Processing Standards Publication:186–3 FIPS (2009) Digital signature standard. Ferderal Information Processing Standards Publication:186–3
32.
Zurück zum Zitat Johnson D, Menezes A, Vanstone S (2001) The Elliptic Curve Digital Signature Algorithm (ECDSA). Int J Inf Secur 1:36–63CrossRef Johnson D, Menezes A, Vanstone S (2001) The Elliptic Curve Digital Signature Algorithm (ECDSA). Int J Inf Secur 1:36–63CrossRef
33.
Zurück zum Zitat Hankerson D, Menezes A J, Vanstone S (2003) Guide to Elliptic Curve Cryptography. Secaucus, NJ, USA: Springer-Verlag New York, Inc. Hankerson D, Menezes A J, Vanstone S (2003) Guide to Elliptic Curve Cryptography. Secaucus, NJ, USA: Springer-Verlag New York, Inc.
34.
Zurück zum Zitat Rivest R L, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefMATH Rivest R L, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefMATH
35.
Zurück zum Zitat Chen C, Marziliano P, Kot A C (2012) 2D finite rate of innovation reconstruction method for step edge and polygon signals in the presence of noise. IEEE Trans Signal Process 60(6):2851–2859MathSciNetCrossRef Chen C, Marziliano P, Kot A C (2012) 2D finite rate of innovation reconstruction method for step edge and polygon signals in the presence of noise. IEEE Trans Signal Process 60(6):2851–2859MathSciNetCrossRef
38.
Zurück zum Zitat Daemen J, Rijmen V (2002) The Design of Rijndael: AES - The Advanced Encryption Standard. Secaucus, NJ, USA: Springer-Verlag New York, IncMATH Daemen J, Rijmen V (2002) The Design of Rijndael: AES - The Advanced Encryption Standard. Secaucus, NJ, USA: Springer-Verlag New York, IncMATH
39.
Zurück zum Zitat Chen C, Marziliano P, Kot AC (2012) 2D Finite Rate of Innovation Reconstruction Method for Step Edge and Polygon Signals in the Presence of Noise. IEEE Trans Signal Process 60(6):2851–2859MathSciNetCrossRef Chen C, Marziliano P, Kot AC (2012) 2D Finite Rate of Innovation Reconstruction Method for Step Edge and Polygon Signals in the Presence of Noise. IEEE Trans Signal Process 60(6):2851–2859MathSciNetCrossRef
40.
Zurück zum Zitat Wen J, Zhu X, Li D (2013) Improved Bounds on the Restricted Isometry Constant for Orthogonal Matching Pursuit. Electron Lett 49:1487–1489CrossRef Wen J, Zhu X, Li D (2013) Improved Bounds on the Restricted Isometry Constant for Orthogonal Matching Pursuit. Electron Lett 49:1487–1489CrossRef
41.
Metadaten
Titel
QR Code Authentication with Embedded Message Authentication Code
verfasst von
Changsheng Chen
Publikationsdatum
17.11.2016
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 3/2017
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-016-0772-y

Weitere Artikel der Ausgabe 3/2017

Mobile Networks and Applications 3/2017 Zur Ausgabe

Neuer Inhalt