Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3523181.3523189acmotherconferencesArticle/Chapter ViewAbstractPublication PagesasseConference Proceedingsconference-collections
research-article

Secret Message CDMA Multiplexing via QR Codes

Published: 18 April 2022 Publication History

Abstract

In this paper, we propose an innovative secret message multiplexing scheme for QR code based on the technology of Code Division Multiple Access (CDMA). Multiple secret messages distributed for several participants are encoded into a CDMA codeword through CDMA multiplexing and then embedded in the padding region of the cover QR code. In this way, everyone can read the public message of marked QR code by any standard QR code reader, but only the authorized user can decode the dedicated hidden secret message using a correct secret key. This feature helps the proposed scheme to possess strong data security. Meanwhile, the robust error correction capacity of QR code is still maintained. The proposed secret message multiplexing scheme is efficient and feasible for private message delivery applications.

References

[1]
G. Xuan, J. Chen, J. Zhu, Y. Q. Shi, Z. Ni, and W. Su, Lossless data hiding based on integer wavelet transform, in Proc. IEEE Workshop Multimedia Signal Processing., St.Thomas, VI, USA, Dec. 2002, pp. 312–315.
[2]
F. Li, Q. Mao, and C. C. Chang, A reversible data hiding method based on IWT and the Sudoku method, Int. J. Netw. Secur., vol. 18, no. 3, pp. 410–419, 2014.
[3]
C. Y. Yang and W. C. Hu, Reversible data hiding in the spatial and frequency domains, Int. J. Image Process., vol. 3, no. 6, pp. 373–384, 2010.
[4]
C. C. Lin, X. L. Liu, W. L. Tai, and S. M. Yuan, A novel reversible data hiding scheme based on AMBTC compression technique, Multimedia Tools Appl., vol. 74, no. 11, pp. 3823–3842, Jun. 2015.
[5]
W. Hong, Y. B. Ma, H. C. Wu, and T. S. Chen, An efficient reversible data hiding method for AMBTC compressed images, Multimedia Tools Appl., vol. 76, no. 4, pp. 5441–5460, Feb. 2017.
[6]
H. Wu and F. Huang, Reversible data hiding based on partitioning the prediction values, in Digital Forensics and Watermarking, vol. 12022. Cham, Switzerland: Springer, 2020 pp. 195–203.
[7]
X. Gao, Z. Pan, E. Gao, and G. Fan, Reversible data hiding for high dynamic range images using two-dimensional prediction-error histogram of the second time prediction, Signal Process., vol. 173, Aug. 2020, Art. no. 107579.
[8]
C. C. Chang, C. T. Li, and K. Chen, Privacy-preserving reversible information hiding based on arithmetic of quadratic residues, IEEE Access, vol. 7, pp. 54117–54132, 2019.
[9]
C. C. Chang and Y. Liu, Fast turtle shell-based data embedding mechanisms with good visual quality, J. Real-Time Image Process., vol. 16, no. 3, pp. 589–599, Jun. 2019.
[10]
C. C. Lin, C. C. Chang, and Z. M. Wang, Reversible data hiding scheme using adaptive block truncation coding based on an edge-based quantization approach, Symmetry, vol. 11, no. 6, p. 765, Jun. 2019.
[11]
C. C. Chang, T. C. Lu, G. Horng, Y. H. Huang, and Y. M. Hsu, A high payload data embedding scheme using dual stego-images with reversibility, in Proc. 9th Int. Conf. Inf., Commun. Signal Process., Tainan, Taiwan, Dec. 2013, pp. 1–5.
[12]
A. Malik, H. Wang, A. N. Khan, Y. Chen, and Y. Chen, A novel lossless data hiding scheme in homomorphically encrypted images, in Digital Forensics and Watermarking (Lecture Notes in Computer Science), vol. 12022. Cham, Switzerland: Springer, 2019.
[13]
P. Puteaux, D. Trinel, and W. Puech, High-capacity data hiding in encrypted images using MSB prediction, in Proc. 6th Int. Conf. Image Process. Theory, Tools Appl. (IPTA), Oulu, Finland, Dec. 2016, pp. 1–6.
[14]
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613.
[15]
Blakley GR (1979) Safeguarding cryptographic keys, vol 48. Proceedings of American Federation of Information Processing Societies National Computer Conference, New York, pp 313–317.
[16]
M. Naor and A. Shamir, Visual cryptography, in Advances in Cryptology—EUROCRYPT (Lecture in Computer Science), vol. 950. Berlin, Germany: Springer, 1994.
[17]
C. C. Chang, P. Y. Lin, Z. H. Wang, and M. C. Li, A Sudoku-based secret image sharing method with reversibility, J. Commun., vol. 5, no. 1, pp. 5–12, 2010.
[18]
C. C. Chang, T. D. Kieu, and Y. C. Chou, Reversible data hiding method using two steganographic images, in Proc. TENCON-IEEE Region 10th Conf., Taipei, Taiwan, Oct./Nov. 2007, pp. 1–4.
[19]
Liu, Y., Chang, CC. A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77, 25295–25310 (2018). https://doi.org/10.1007/s11042-018-5785-z
[20]
C. C. Chang, J. H. Horng, C. S. Shih, and C. C. Chang, A maze matrix-based secret image sharing scheme with cheater detection, Sensors, vol. 20, no. 13, p. 3802, Jul. 2020.
[21]
K. Gao, J. H. Horng and C. C. Chang, A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix, in IEEE Access, vol. 8, pp. 174325-174341, 2020.
[22]
Huang, PC., Li, YH., Chang, CC. Efficient QR code authentication mechanism based on Sudoku. Multimed Tools Appl 78, 26023–26045 (2019). https://doi.org/10.1007/s11042-019-07795-8
[23]
Huang, PC., Chang, CC., Li, YH. High-payload secret hiding mechanism for QR codes. Multimed Tools Appl 78, 22331–22350 (2019). https://doi.org/10.1007/s11042-019-7600-x
[24]
A. J. Viterbi, CDMA: Principles of Spread Spectrum Communications: Addison-Wesley, 1995.
[25]
J. G. Proakis, Digital Communications, 4th ed: McGraw Hill, 2001.
[26]
T. S. Rappaport, Wireless Communications: Principles and Practice, 2nd ed: Prentice Hall, 2001.
[27]
R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, Theory of Spread- Spectrum Communications—A Tutorial, IEEE Trans. Commun., vol. COM-30, pp. 855-884, May 1982.
[28]
R. L. Pickholtz, L. B. Milstein, and D. L. Schilling, Spread Spectrum for Mobile Communications, IEEE Trans. Veh. Technol., vol. 40, pp. 313-322, May 1991.
[29]
S. Moshavi, Multi-User Detection for DS-CDMA Communications, IEEE Commun. Mag., pp. 124-136, Oct. 1996.
[30]
ISO B (2005) IEC 18004: 2006. Information technology Automatic identification and data capture techniques QR Code:126
[31]
Inc. D-W (2003) QR code standardization. www.qrcode.com/en/about/standards.html. Accessed 24 Nov 2017

Cited By

View all
  • (2023)A Novel CDMA-Based Secret Message Multiplexing Scheme by Image Data HidingMathematics10.3390/math1103070411:3(704)Online publication date: 30-Jan-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference
February 2022
202 pages
ISBN:9781450387453
DOI:10.1145/3523181
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 April 2022

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ASSE' 22

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)5
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Novel CDMA-Based Secret Message Multiplexing Scheme by Image Data HidingMathematics10.3390/math1103070411:3(704)Online publication date: 30-Jan-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media