2011
DOI: 10.4156/ijiip.vol2.issue2.4
|View full text |Cite
|
Sign up to set email alerts
|

A Digital Watermark Algorithm for QR Code

Abstract: Technology that combines a 2D BarCode with a digital watermark is a topic of great interest in current research related to the security field. This paper presents a new digital watermark method for the QR Code(Quick Response Code). An invisible watermark is embedded in the QR Code image using watermark technology, and while this is being done, the DCT intermediate frequency coefficients are compared. To prevent the overflow of the QR Code in the DCT domain of the image, QR image need fuzzy processing and be ad… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…Besides, the marked QR code of the proposed scheme still maintains a portion of error correction capability (as shown in σ) and can be used to resist certain distortions. On the other hand, the new scheme conceals the secret by flipping the QR modules rather than hiding the secret in the pixels of spatial domain [10,11]; in the coefficients of frequency domain [8,9,12,13,15]; and in the width of rows and columns of the QR image [14]. Hence, the robustness of the entire modules can be enhanced than that of the related schemes [8][9][10][11][12][13][14].…”
Section: Analysis and Comparisonmentioning
confidence: 99%
See 4 more Smart Citations
“…Besides, the marked QR code of the proposed scheme still maintains a portion of error correction capability (as shown in σ) and can be used to resist certain distortions. On the other hand, the new scheme conceals the secret by flipping the QR modules rather than hiding the secret in the pixels of spatial domain [10,11]; in the coefficients of frequency domain [8,9,12,13,15]; and in the width of rows and columns of the QR image [14]. Hence, the robustness of the entire modules can be enhanced than that of the related schemes [8][9][10][11][12][13][14].…”
Section: Analysis and Comparisonmentioning
confidence: 99%
“…Recently, many studies have focused on providing barcode applications. In general, the applications can be classified into three categories: the image hiding [8][9][10][11], the watermarking [12][13][14][15], and the visual cryptography [7,16,17] techniques. The image hiding schemes [8][9][10][11] convert the secret to a QR code tag and then embed the secret QR tag into a cover image.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations