“…As indicated earlier, to optimize secondary message decoding 4 , we use state of the art error correction codes from the 5G NR standard. These codes work with soft detection statistics, specifically bit-wise LLRs, which we compute using a statistical model of the coding channel for the secondary data.…”
Section: B Optimized Secondary Message Eccmentioning
confidence: 99%
“…In the approach proposed in [3], the standard black modules of printed QR codes are replaced with high resolution texture patterns that can be used to communicate additional private data and to authenticate the original printed document carrying the QR code (versus copies). In another approach [4], a QR code is placed within another one to create a nested QR code, where, the constituent barcodes can carry independent messages that can be recovered from two images of the nested QR code (captured at slightly different distances and/or angles) with a QR code reader. Two optimally designed layers are used in a specialized physical deployment in [5], where by capturing images of the two-layer QR code from its right/left side a QR code reader can recover messages from either of the two layers.…”
<p> We present optimized modulation and coding for the recently introduced dual modulated QR (DMQR) codes that extend traditional QR codes to carry additional secondary data in the orientation of elliptical dots that replace black modules in the barcode images. By dynamically adjusting the dot size, we realize gains in embedding strength for both the intensity modulation and the orientation modulation that carry the primary and secondary data, respectively. Furthermore, we develop a model for the coding channel for the secondary data that enables soft-decoding via 5G NR (new radio) codes already supported by mobile devices. The performance gains for the proposed optimized designs are characterized via theoretical analysis, simulations, and actual experiments using smartphone devices. The theoretical analysis and simulations inform our design choices for the modulation and coding, and the experiments characterize the overall improvement in performance for the optimized design over the prior unoptimized designs. Importantly, the optimized designs significantly increase usability of DMQR codes with commonly used QR code beautification that cannibalizes a portion of the barcode image area for the insertion of a logo or image. In experiments with a capture distance of 15 inches, the optimized designs increase the decoding success rates between 10% and 32% for the secondary data while also providing gains for primary data decoding at larger capture distances. When used with beautification in typical settings, the secondary message is decoded with a high success rate for the proposed optimized designs, whereas it invariably fails for the prior unoptimized designs.</p>
“…As indicated earlier, to optimize secondary message decoding 4 , we use state of the art error correction codes from the 5G NR standard. These codes work with soft detection statistics, specifically bit-wise LLRs, which we compute using a statistical model of the coding channel for the secondary data.…”
Section: B Optimized Secondary Message Eccmentioning
confidence: 99%
“…In the approach proposed in [3], the standard black modules of printed QR codes are replaced with high resolution texture patterns that can be used to communicate additional private data and to authenticate the original printed document carrying the QR code (versus copies). In another approach [4], a QR code is placed within another one to create a nested QR code, where, the constituent barcodes can carry independent messages that can be recovered from two images of the nested QR code (captured at slightly different distances and/or angles) with a QR code reader. Two optimally designed layers are used in a specialized physical deployment in [5], where by capturing images of the two-layer QR code from its right/left side a QR code reader can recover messages from either of the two layers.…”
<p> We present optimized modulation and coding for the recently introduced dual modulated QR (DMQR) codes that extend traditional QR codes to carry additional secondary data in the orientation of elliptical dots that replace black modules in the barcode images. By dynamically adjusting the dot size, we realize gains in embedding strength for both the intensity modulation and the orientation modulation that carry the primary and secondary data, respectively. Furthermore, we develop a model for the coding channel for the secondary data that enables soft-decoding via 5G NR (new radio) codes already supported by mobile devices. The performance gains for the proposed optimized designs are characterized via theoretical analysis, simulations, and actual experiments using smartphone devices. The theoretical analysis and simulations inform our design choices for the modulation and coding, and the experiments characterize the overall improvement in performance for the optimized design over the prior unoptimized designs. Importantly, the optimized designs significantly increase usability of DMQR codes with commonly used QR code beautification that cannibalizes a portion of the barcode image area for the insertion of a logo or image. In experiments with a capture distance of 15 inches, the optimized designs increase the decoding success rates between 10% and 32% for the secondary data while also providing gains for primary data decoding at larger capture distances. When used with beautification in typical settings, the secondary message is decoded with a high success rate for the proposed optimized designs, whereas it invariably fails for the prior unoptimized designs.</p>
“…Both black and white colors permit encoding and decoding of the data [35,36]. Each QR codes stores vertical and horizontal strings of text comprised of standardized encoding modes, i.e., numeric characters, alphanumeric characters, letters, symbols, Byte characters, and Kanji/Kana [35,37,38]. It can encode 7089 numeric characters, 4296 alphanumeric characters, 2953 bytes [33,35,36].…”
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) that uses a standard public key cryptography technique (RSA), and Fernet encryption to secure a QR code and the records in the databases. The evolutionary prototyping model was adopted when developing the native mobile money application prototypes to prove that the algorithm is feasible and provides a higher degree of security. The developed applications were tested, and a detailed security analysis was conducted. The results show that the proposed algorithm is secure, efficient, and highly effective against the various threat models. It also offers secure and efficient authentication and ensures data confidentiality, integrity, non-repudiation, user anonymity, and privacy. The performance analysis indicates that it achieves better overall performance compared with the existing mobile money systems.
“…In addition to the abovementioned use of AMBTC images, RAW images and ordinary images as carriers, research on selecting a quick response (QR) code as the carrier image has gradually emerged. A QR code [17] is a twodimensional, machine-readable optical label composed of black and white modules, which, as a popular carrier, has been widely applied in various fields due to its high-capacity and faulttolerant capabilities.In recent years, there are also examples of applying QR codes to the medical field. For example, Yan et al [18] designed several schemes based on QR code secure technology to achieve user privacy protection on X-ray transparency, access control to view the medical privacy record, infusion bottle confirmation with technical authentication, secure patient wrist ID, and fast payment.…”
In the field of medical image content protection and security sharing, the introduction of blockchain technology has a problem in that the secret key may be lost and cannot be recovered. Therefore, this paper proposes an authenticable medical image-sharing scheme based on an embedded small shadow QR code and a blockchain framework. First, a small shadow image is obtained by employing a secret image-sharing method based on the Chinese remainder theorem. Then, the shadow image is embedded into a QR code with error correction. This not only ensures the security and integrity of the shadow image transmission in the public channel but also avoids the problem where the secret key is lost and cannot be recovered. Compared with some existing excellent schemes, our scheme adopts a hash bit stream for authentication purposes and employs smart contracts to authenticate and restore secret images, thus reducing the local load. In addition, experiments validate that the recovered secret medical image is lossless and that the cover QR code is more robust and secure. This method is suitable for medical image content protection and security sharing.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.