DOI QR코드

DOI QR Code

A Study on Method to Improve Recognition Rate of Digital Watermark Using QR Code

QR 코드를 이용한 디지털 워터마크의 인식률 개선 방법 연구

  • Cho, Dae-Jea (Dept. of Multimedia Eng., Andong National University) ;
  • Koh, Jae-Sung (Dept. of Multimedia Eng., Andong National University)
  • 조대제 (안동대학교 멀티미디어공학과) ;
  • 고재성 (안동대학교 멀티미디어공학과)
  • Received : 2014.08.19
  • Accepted : 2014.10.11
  • Published : 2014.10.31

Abstract

In existing digital watermarking method, there is a limit to the size of the watermark can be inserted, depending on the size of the original image so have been studied a method of using QR code that can hold more information as a digital watermark. QR-code not only can save much information in itself, but also can include various informations because of its link function. This paper proposes the method to improve the recognition rate for the extracted QR code has been inserted as a watermark. The algorithm proposed in this paper is designed in such a way to repair damaged by analyzing the structure of QR code. QR code has a function to recover the error for itself but the embedded information is lost by severe damage. When the post-processing is applied by the suggested method in the paper, recognition rate is improved because can recover the embedded data by correcting errors even if watermarks are severe damaged.

기존의 디지털 워터마킹 방법은 원 영상의 크기에 따라 삽입 할 수 있는 워터마크의 크기는 한계가 있어, 보다 많은 정보를 담을 수 있는 QR 코드를 생성하여 디지털 워터마크로 사용하는 방법이 연구되고 있다. QR코드는 자체에도 많은 정보를 저장할 수 있을 뿐 아니라, 링크 기능을 가지고 있어서 다양한 정보를 포함하는 것이 가능하다. 본 논문에서는 워터마크로 삽입되었다가 추출된 QR 코드에 대한 인식률을 개선 할 수 있는 방법을 제시하였다. 본 논문에서 제시한 알고리즘은 QR 코드의 구조를 분석하여 훼손된 부분을 복구하는 방식으로 설계하였다. QR 코드는 자체적으로 에러를 복구하는 기능을 가지고 있으나 훼손이 심하면 내장된 정보를 잃게 된다. 하지만 논문에서 제시한 방법을 적용하여 후처리 작업을 하면 워터마크가 심하게 손상되더라도 내장된 정보를 복구할 수 있어 인식률을 개선할 수 있다.

Keywords

Acknowledgement

Supported by : 안동대학교

References

  1. H. Xiang, L. Wang, H. Lin, and J. Shi, "Digital Watermarking Systems with Chaotic Sequences", Proceedings of the Security and Watermarking of Multimedia Contents, pp. 449-457, Jan. 1999.
  2. M. Barni, F. Bartolini, A. De Rosa, and A. Piva, "Capacity of the Watermark-Channel: How Many Bits Can Be Hidden Within a Digital Image?", Proceedings of the Security and Watermarking of Multimedia Contents, pp. 437-448, Jan. 1999.
  3. Ming Si and Jibo Si, "Research on Embedding and Extracting Methods for Digital Watermarks Applied to QR code Images", New Zealand Journal of Agricultural Research, Vol. 50, pp. 861-867, July 2007. https://doi.org/10.1080/00288230709510361
  4. H. C. Lee and C. R. Dong, "Digital Watermarking based on JND Model and QR code Features", AISA, Vol. 2, pp. 141-148, Feb. 2013.
  5. D. J. Cho, "Study on Method of New Digital Watermark Generation using QR-code", Proceedings of BWCCA(Conference on Broadband, Wireless Computing, Communication and Applications), pp. 585-588, Oct. 2013.
  6. D. J. Cho, "A Study on the Watermarking Algorithm for Integrity Authentication of 3D Triangular Mesh Models", JKIIT, Vol. 9, No. 12, pp. 153-159, Dec. 2011.
  7. J. I. Kim, J. S. Kim, and G. R. Kwon, "A Robust Watermarking using Quantized AC Coefficients", JKIIT, Vol. 11, No. 6, pp. 85-90, June 2013.
  8. B. M. Yoon and Y. H. Kim, "Performance Analysis of Transform Domain-based Watermarking Algorithm", JKIIT, Vol. 4, No. 6, pp. 101-108, Dec. 2006.
  9. ISO/IEC 18804:2000. Information technology - Automatic identification and data capture techniques - Bar code symbology - QR code, 2000.
  10. ISO/IEC 15420:2000. Information technology - Automatic identification and data capture techniques - Bar code symbology specification - EAN/UPC, 2000.
  11. http://www.swetake.com/qrcode/qr1_en.html
  12. H. K. Yang, "A Study of Security Weaknesses of QR Codes and Its Countermeasures", The Journal of IIBC, Vol. 12, No. 1, pp. 83-89, Feb. 2012.
  13. Y. S. Im and E. Y. Kang, "Watermarking and QR Code in Digital Image Coding", The Journal of IIBC, Vol. 12, No. 6, pp. 99-104, Dec. 2012.

Cited by

  1. Decoding Hidden Data from Image Barcode Via Deep Convolutional Neural Networks vol.17, pp.5, 2014, https://doi.org/10.14801/jkiit.2019.17.5.65