Visible Watermarking Scheme for Quick Response Code Based on Reversible Data Hiding

نویسندگان

  • Shun Zhang
  • Tiegang Gao
چکیده

Quick Response Code (QR Code) has become an important entrance of O2O (Online to Offline) in the era of mobile internet. Many applications, such as transformation of URLs, the descriptions of these images, and so on can be realized through embedding QR Code into images. However, the embedding of QR Code may destroy some image details in the corresponding area, which is annoying, especially in these applications that need high precision. The reversible recovery of original image is of importance. A reversible visible watermarking scheme is proposed for embedding QR Code into images. One can decode the information that is encoded in the QR Code and reversibly recover the original image after the QR Code is scanned successfully. Optimization has been achieved both by utilizing the features of QR Code when encoding and decoding in the visible watermarking period and by utilizing the blocking, scanning, and preprocessing of information in the reversible data hiding period. Experimental results have demonstrated the validity and efficiency of the proposed scheme. Better image quality has been achieved by the proposed scheme compared with existing schemes. Visible Watermarking Scheme for Quick Response Code Based on Reversible Data Hiding

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QR Code Application based Reversible Watermarking in Image Processing

In digital watermarking, images which have specific pattern images. They used as digital watermarks for variety purposes in copy prevention emerging solution. Conversely, several attacks still get unsolved in a robustness of invisible watermarking techniques. An effective technique for visible watermarking can be retrieved to identify the ownership of the protected media. The purpose to show th...

متن کامل

Locally most-powerful detector for secret key estimation in spread spectrum image steganography

Kernel Fisher discriminant for steganalysis of JPEG hiding methods p. 13 On estimation of secret message length in LSB steganography in spatial domain p. 23 Steganalysis using color wavelet statistics and one-class support vector machines p. 35 Steganalysis using modified pixel comparison and complexity measure p. 46 Performance evaluation of blind steganalysis classifiers p. 58 Searching for t...

متن کامل

A Survey on Reversible Image Data Hiding Scheme

The greater part of the reversible data hiding approaches proposed so far fuse a lossless information compression stage. The utilization of an elaborate data compression stage increases the complexity of watermarking. There are some watermarking plans that don't depend on extra data compression, with respect to example, circular histogram interpretation schemes. In this paper a survey is presen...

متن کامل

Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift

This paper first proposes a novel lossless data-hiding method, in which the magnitudes of gray level differences in pixel pairs are slightly increased so that the region of differences with small magnitudes can be used to carry the hidden message. Overflow is avoided by prohibiting modifications to certain pixel pairs, and a small number of labels marking these exceptions are also embedded for ...

متن کامل

Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images

In recent years image watermarking has become an important research area in data security, confidentiality and image integrity. Many watermarking techniques were proposed for medical images. However, medical images, unlike most of images, require extreme care when embedding additional data within them because the additional information must not affect the image quality and readability. Also the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJDCF

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2014