The results of marked QR code in Figure 2 (b) after suffering noise attacks.

The results of marked QR code in Figure 2 (b) after suffering noise attacks.

Source publication
Article
Full-text available
QR code is designed as machine readable symbol, which is widely used in various fields of life due to its large message capacity and fast decoding speed. However, as a public standard, it will give rise to the security issue when delivering sensitive information with QR code. To overcome this weakness, this paper explores the characteristic of QR c...

Context in source publication

Context 1
... noise will degrade the quality of QR code, and reduce success rate of QR code capturing process. Figure 5 shows the result that marked QR code shown in Figure 2 (b) suffers different level of noise attack, such as salt & pepper, gaussian noise, gaussian blur, speckle noise. The results show that the attacked marked QR codes are still valid, and the embedding secret message can be extracted correctly. ...

Citations

... Ref. Description Programmability [**] Embedding a program in a QR code to make it executable Anti-counterfeiting [36] Placing hidden information within the QR code to prevent its copy/falsification [37] Use of visual features combined with QR codes to guarantee the authenticity of a product Improving beauty [38] Generation of artistic QR codes, which are embedded in a picture [39] Embedding a QR code within a micrography image [40] Embedding a QR code within a picture [41] Inserting a QR code in a picture by using deep learning technology Improving other technologies [42] Integrating QR codes and RFID technologies to decrease the complexity of RFID circuitry Improving recognition [43] Using an adaptive method based on binarization to improve recognition quality [44] Improving recognition quality when QR codes are placed in an uneven surface [45] Reducing the size of information in a QR code to improve recognition performance [46] A deblurring method is used to improve acquisition quality of QR codes [47] Improving recognition quality of QR code by fastly restoring out-of-focus blurred images [48] Removing perspective by identifying the vertex of a QR code [49] Improve the performance in recognizing multiple QR codes in a picture Increasing capacity [50] Increasing the capacity of a QR code by means of lossless compression [51] Using colored QR codes to improve the storage capacity [52] Improving the encoding efficiency of Chinese characters based on the use frequency Multiple information [53] Embedding three layers of information within one QR code [54] Embedding two layers of information within one QR code [55] Placing a QR code inside another QR code and reading both with different angles Printing type [56] QR codes printed with ink sensitive to pH for quality monitoring of food freshness [57] QR code is printed on a sand core surface for traceability [58] Printing the QR code by caving it on the surface of an object Security [59] Embedding a secret within the QR code by using colors [60] Embedding a secret within the QR code [61] Embedding a secret within the QR code for authentication [62] Using QR codes and singular value decomposition to encrypt images [63] Embedding privacy information by using two layers in the QR code [64] Protection for potential adversarial learning attacks using QR codes tree inside the eQR code. In this work, it is described and analyzed starting from Section IV. ...
Article
Full-text available
QR codes are increasingly used in a plurality of scenarios, and research activities are being successfully carried out to improve this technology and widen its contexts of applicability. After an extensive survey of the state-of-the-art on the subject, this work presents the new, promising possibility to embed a programming language in a QR code. This new kind of executable QR codes, we named eQR codes, enable interaction with end users even in the absence of an Internet connection, and provide a sort of IoT paradigm where intelligence is embedded in the object tag in the form of a program. Among all the possible languages that can be embedded, this work focuses on a powerful but compact (in terms of QR code storage occupation) dialect, termed QRtree, which is aimed at implementing decision trees. The eQR code technology makes a new class of applications possible, e.g., providing hints for navigation or instructions for using rescue devices in places with no network coverage like mountains and caves. Smart interactive user manuals are enabled as well. Besides defining the QRtree language and eQR code structure, this paper describes all the steps needed to generate eQR codes and to manage their execution in end-user devices. A simple yet realistic example and the related code are also presented, to practically show how this technology can be used to solve real-world problems. For the example, the QRtree version of the code takes 234B, less than one-half the size of an equivalent program in Python bytecode (634B).
... • Cloud computing offers various remote computer services over the internet, such as virtual infrastructure and storage [42]. • QR codes are widely used for transmitting information in diverse areas, with varying error-correction levels [43,44]. • Radio Frequency Identification (RFID) is a flow-control technology that aids in the traceability of goods throughout the production chain [45]. ...
Article
Full-text available
With the rise of globalization and technological competition, the food supply chain has grown more complex due to the multiple players and factors involved in the chain. Traditional systems fail to offer effective and reliable traceability solutions considering the increasing requirement for accountability and transparency in the food supply chain. Blockchain technology has been claimed to offer the food industry a transformative future. The inherent features of blockchain, including immutability and transparency, create a dependable and secure system for tracking food products across the whole supply chain, ensuring total control over their traceability from the origin to the final consumer. This research offers a comprehensive overview of multiple models to understand how the integration of blockchain and other digital technologies has transformed the food supply chain. This comprehensive systematic review of blockchain-based food-supply-chain frameworks aimed to uncover the capability of blockchain technology to revolutionize the industry and examined the current landscape of blockchain-based food traceability solutions to identify areas for improvement. Furthermore, the research investigates recent advancements and investigates how blockchain aligns with other emerging technologies of Industry 4.0 and Web 3.0. Blockchain technology plays an important role in improving food traceability and supply-chain operations. Potential synergies between blockchain and other emerging technologies of Industry 4.0 and Web 3.0 are digitizing food supply chains, which results in better management, automation, efficiencies, sustainability, verifiability, auditability, accountability, traceability, transparency, tracking, monitoring, response times and provenance across food supply chains.
... It consists of a grid of black and white squares arranged in a precise pattern recognized by devices with cameras or scanners [45]. QR codes have a higher storage capacity than traditional barcodes to store more complex information patterns [46,47]. ...
Article
Full-text available
Currently, outdoor navigation systems have widely been used around the world on smartphones. They rely on GPS (Global Positioning System). However, indoor navigation systems are still under development due to the complex structure of indoor environments, including multiple floors, many rooms, steps, and elevators. In this paper, we present the design and implementation of the Indoor Navigation System using Unity and Smartphone (INSUS). INSUS shows the arrow of the moving direction on the camera view based on a smartphone’s augmented reality (AR) technology. To trace the user location, it utilizes the Simultaneous Localization and Mapping (SLAM) technique with a gyroscope and a camera in a smartphone to track users’ movements inside a building after initializing the current location by the QR code. Unity is introduced to obtain the 3D information of the target indoor environment for Visual SLAM. The data are stored in the IoT application server called SEMAR for visualizations. We implement a prototype system of INSUS inside buildings in two universities. We found that scanning QR codes with the smartphone perpendicular in angle between 60∘ and 100∘ achieves the highest QR code detection accuracy. We also found that the phone’s tilt angles influence the navigation success rate, with 90∘ to 100∘ tilt angles giving better navigation success compared to lower tilt angles. INSUS also proved to be a robust navigation system, evidenced by near identical navigation success rate results in navigation scenarios with or without disturbance. Furthermore, based on the questionnaire responses from the respondents, it was generally found that INSUS received positive feedback and there is support to improve the system.
... It carries over 4,000 characters of data, which is encoded using special programs generating in the form of white and black squares. The QR code dissection is defined into 40 symbol versions and four error correction level (ECL) [4]. QR code can be useful in case sharing long links to Internet resources, e-mail address, geographical data, telephone numbers, text, pictures, video and audio information [5], for his reason, QR code is selected in this research to be exploited for text transferring when the bank management needs to upload or download text to / from cloud storage. ...
... If the currently valid transmission data is 1011, we fill it into the circle in order and proceed to check the following: if data is correct, ECC must be 010, and the entire Hamming code packet is 1011010. The Hamming SECDED here is based on the Hamming code (8,4) [19], which is used in the parity bit in the ECC multiaddition bit. The parity bit is used to indicate whether the original Hamming code packet contains an odd number of 1 or an even number of 1. ...
... In the Hamming SECDED architecture, 32-bit data requires at least 6-bit of ECC to work [19]. However, the minimum detection unit of MCU P2 /MCU S2 is 8 bits. ...
... Assuming the received data packet is R, it can be thought of as a 32-bit column vector. It is known [19] that the received ECC can be regarded directly as a feature (syndrome), and R and ECC formulas can be calculated to obtain the received syndrome. The syndrome related equation is given by ...
Article
Full-text available
Recently, inductive power transfer (IPT) system has been used for wireless charging of electric vehicles (EVs). However, most of them only treat the issue of single directional wireless power transfer (WPT). This research proposes a novel bi‐directional IPT (BD‐IPT) scheme EVs, which can simultaneously transmit power/data via magnetic field when the mutual inductance changes. For power transmission, resonant inverters with phase‐shift pulse width modulation (PSPWM) are used to generate carrier waves and alternating current. As for data transmission, a dedicated communication method with the accompanied protocol is proposed. Binary phase shift keying (BPSK) is used to simulate the two‐quadrature amplitude modulation (QAM), which generates digital signals for data transmission without the need of extra communication links. Hamming codes are combined with single‐error correction and double‐error detection (SECDED) to ensure communication quality.
... If the attacker obtains a share, they can use (24) to restore the secret QR code to the maximum. The probability (Pr(r)) that a module is right is: ...
... Simple method If the colors of the module are G or Y in a share, the color of the module in the restored image is Y . When the colors of modules are R, M, and W in a share, the color of the module in the restored image is W . Simple method is designed by (24). This method is that the white, magenta and red modules in share all become white modules. ...
... The W and M can be converted to W by COR from (24). Other colors may be converted to W or Y through COR. ...
Article
Full-text available
The secret sharing scheme can share the secret image with several shares. The secure transmission of the quick response (QR) code can be enhanced by the secret sharing scheme on the Internet. This paper proposes the QR code secret sharing scheme (QRCSSS) by using color QR codes. The standard QR code is modified to a color QR code. The color of the secret image is shared by the color of the share (color QR code). QRCSSS can generate two color QR codes. When two color QR codes are performed color OR, a secret color QR code is restored. The restored color QR code has contrast in color. It can be converted to a standard QR code by the proposed contrast enhancer. This paper analyzes how the color QR code can be decoded correctly by the general QR code decoder. The experimental results show that the proposed scheme is feasible.
... To ensure the safe transmission of secret information, people have come up with many methods. Such as public key [10,12,30,31], private key, information verification code, watermarking [16,19,21,24,28,29], information hiding [7,20,23,25,33], visual cryptography (VC) [8,9,17,32], digital steganography [1], and so on. Public key, private key, information verification code can ensure the security of information transmission. ...
Article
Full-text available
Visual cryptography (VC) is a technique that can encrypt images without complicated calculation. As the image, the quick response (QR) code can also be encrypted by VC to ensure its safe transmission on the network. In recent years, VC has developed rapidly. The original VC has been developed into many forms, such as (n, n)-VC, (k, n)-VC. These new VC schemes can be applied to the QR code to make it more secure in the network. This paper proposes a new VC scheme for the QR code by using the mechanism of the error correction code (ECC). ECC is used to control the number of shares to recover whether the secret QR code can be decoded correctly. The codewords in the same block of the QR code are evenly distributed to each share. If the number of shares is less than the threshold, the restored QR code will not be decoded correctly. The number of wrong codewords exceeds its error correction capability. The theoretical analysis shows that the proposed scheme is secure when the standard decoder is used. The experimental results also prove the feasibility of the proposed scheme.
... Huang et al. [25] proposed an efficient QR code secret embedding method based on Hamming code. This work investigates the characteristics of QR codes in order to suggest an effective secret concealing method for sensitive data contained within QR codes. ...
Article
Full-text available
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have resulted in breaches of privacy and data security. When it comes to protecting private information in today's Internet era, digital steganography is vital. Many academics are interested in digital video because it has a great capability for concealing important data. There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data. The visual imperceptibility, robustness, and embedding capacity of these approaches are all challenges that must be addressed. In this paper, a novel solution to reversible video steganography based on Discrete Wavelet Transform (DWT) and Quick Response (QR) codes is proposed to address these concerns. In order to increase the security level of the suggested method, an enhanced ElGamal cryptosystem has also been proposed. Prior to the embedding stage, the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes. Concurrently, it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation (LL), Horizontal (LH), Vertical (HL), and Diagonal (HH) sub-bands. Then, the encrypted Low (L), Medium (M), Quantile (Q), and High (H) QR codes are embedded into the HL sub-band, HH sub-band, U-component, and V-component of video frames, respectively, using the Least Significant Bit (LSB) technique. As a consequence of extensive testing of the approach, it was shown to be very secure and highly invisible, as well as highly resistant to attacks from Salt & Pepper, Gaussian, Poisson, and Speckle noises, which has an average Structural Similarity Index (SSIM) of more than 0.91. Aside from visual imperceptibility, the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio (PSNR) average of 52.143 dB, and embedding capacity 1 bpp.
... To reduce food waste, we propose SmartNoshWaste-a Blockchain based multi-layered framework utilizing machine learning (more specifically reinforcement learning), cloud computing and QR code in a decentralized Web 3.0 enabled smart city. Blockchain is an excellent technology to digitize and decentralize food supply chain data, whereas, QR code [15,16] could be utilized in concurrence to make the digitized data more accessible to consumers, especially via smartphones. We have chosen cloud computing [17,18] for the framework to improve the speed of computation to provide a seamless user experience in validating and accessing the data. ...
... QR code [15,15,16,24,25] is an effective information transmission medium, which is widely used today in various applications including product traceability, mobile payment, advertising, degree, and transcript generation, passport verification and in many other fields. QR code is defined into 40 symbol versions (to carry various data payloads) and 4 user-selectable error correction level (ECL): L, M, Q and H, which can correct up to 7%, 15%, 25%, and 30% error, respectively, when attacked by using defacement. ...
Article
Full-text available
Food waste is an important social and environmental issue that the current society faces, where one third of the total food produced is wasted or lost every year while more than 820 million people around the world do not have access to adequate food. However, as we move towards a decentralized Web 3.0 enabled smart city, we can utilize cutting edge technologies such as blockchain, artificial intelligence, cloud computing and many more to reduce food waste in different phases of the supply chain. In this paper, we propose SmartNoshWaste—a blockchain based multi-layered framework utilizing cloud computing, QR code and reinforcement learning to reduce food waste. We also evaluate SmartNoshWaste on real world food data collected from the nosh app to show the efficacy of the proposed framework and we are able to reduce food waste by 9.46% in comparison to the originally collected food data based on the experimental evaluation.
... Several studies have been conducted using secret hiding schemes based on hamming code and visual secret sharing schemes to protect QR code content and private information during online transactions [30][31][32][33][34][35][36]. e study described in [33] was related to computational security by supposing that the attacker technique was restricted to the QR code scanner. ...
Article
Full-text available
Recently, hackers intend to reproduce malicious links utilizing several ways to mislead users. They try to control victims’ machines or get their data remotely by gaining access to private information they use via cyberspace. QR codes are two-dimensional barcodes with the capacity to encode various data types and can be viewed by digital devices, such as smartphones. However, there is no approved protocol in QR code generation; therefore, QR codes might be exposed to several questionable attacks. QR code attacks might be perpetrated using barcodes, and there are some security countermeasures. Some of these solutions are restricted to malicious link detection techniques with knowledge of cryptographic methods. Therefore, this study aims to detect malicious links embedded in 1D (linear) and 2D (QR) codes. A cybercrime attack was proposed based on barcode counterfeiting that can be used to perform online attacks. A dataset of 100000 malicious and benign URLs was created via several resources, and their lexical features were obtained. Analyses were conducted to illustrate how different features and users deal with online barcode content. Several artificial intelligence models were implemented. A decision tree classifier was identified as the most suitable model for identifying malicious URLs. Our outcomes suggested that a secure artificial intelligence barcode scanner (BarAI) is recommended to detect malicious barcode links with an accuracy of 90.243%.