Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3301551.3301593acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicitConference Proceedingsconference-collections
research-article

Security Mechanism Improvement for 2D Barcodes using Error Correction with Random Segmentation

Published: 29 December 2018 Publication History

Abstract

2D barcode becomes a famous technology in information security issue in this decade. We propose a security mechanism improvement method by applying the error correction with random segmentation (ECRS) technique. In this paper, we use private key array for segmentation of the original texts be-fore merging the segmented texts whose were encoded by using error correction coding approach. Our proposed method has two advantages when com-pare with the traditional Reed-Solomon error correction coding algorithm. On one hand, our ECRS performs random segmentation using multiple redundant code to protect data. On the other hand, the ECRS protects the code from being falsified by using encryption keys. Our experiments manifest that the proposed method improves the security degree of significance while just only few sacrificing coding times.

References

[1]
Kato, Hiroko, and K. T. Tan. "2D barcodes for mobile phones." (2005): 48--48.
[2]
Kato, Hiroko, and Keng T. Tan. "Pervasive 2D barcodes for camera phone applications." IEEE Pervasive Computing 6.4 (2007).
[3]
ISO, BS. "IEC 16022: Information Technology-Automatic Identification and Data Capture Techniques-Data Matrix Bar Code Symbology Specification." BS ISO/IEC 16022 (2006).
[4]
Culp, James C., et al. "Identification of units in customized production." U.S. Patent No. 6,976,627. 20 Dec. (2005).
[5]
ISO, IEC. "Automatic identification and data capture techniques." Bar code symbology specification. EAN, UPC (2000).
[6]
Wang, Ynjiun P. "System for encoding and decoding data in machine readable graphic form." U.S. Patent No. 5,243,655. 7 Sep. (1993).
[7]
Chandler, Donald G., Eric P. Batterman, and Govind Shah. "Hexagonal, information encoding article, process and system." U.S. Patent No. 4,874,936. 17 Oct. (1989).
[8]
Reed, I.; Solomon, G.; Polynomial codes over certain finite fields, Journal of the Society for Industrial and Applied Mathematics, 8(2):300304, (1960).
[9]
Chen, Changsheng, et al. "Picode: A new picture-embedding 2d barcode." IEEE Transactions on Image Processing 25.8 (2016): 3444--3458.
[10]
Meerwald, Peter, and Andreas Uhl. "Survey of wavelet-domain watermarking algorithms." Security and Watermarking of Multimedia Contents III. Vol. 4314. International Society for Optics and Photonics, (2001).
[11]
Liu, Tong, and Zheng-ding Qiu. "The survey of digital watermarking-based image authentication techniques." Signal Processing, 2002 6th International Conference on. Vol. 2. IEEE, (2002).
[12]
Dittmann, Jana, Lucilla Croce Ferri, and Claus Vielhauer. "Hologram watermarks for document authentications." Information Technology: Coding and Computing, 2001. Proceedings. International Conference on. IEEE, (2001).
[13]
Vatsa, Mayank, et al. "Robust biometric image watermarking for fingerprint and face template protection." IEICE Electronics Express 3.2 (2006): 23--28.
[14]
Teraura, Nobuyuki. Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional Code. Innovative Mobile and Internet Services in Ubiquitous Computing. ( 2018).
[15]
Wang, Yu-Mei, et al. "Secured graphic QR code with infrared watermark." 2018 IEEE International Conference on Applied System Invention (ICASI). IEEE, (2018).
[16]
Purnomo, Ariana Tulus, Yudi Satria Gondokaryono, and Chang-Soo Kim. "Mutual authentication in securing mobile payment system using encrypted QR code based on public key infrastructure." Frontiers of Information Technology (FIT), 2016 International Conference on. IEEE, (2016).
[17]
Xu, Peng, et al. "Conditional identity-based broadcast proxy re-encryption and its application to cloud email." IEEE Transactions on Computers 65.1 (2016): 66--79.
[18]
Samonas, Spyridon, and David Coss. "THE CIA STRIKES BACK: REDEFINING CONFIDENTIALITY, INTEGRITY AND AVAILABILITY IN SECURITY." Journal of Information System Security 10.3 (2014).
[19]
Jiao, Shuming, et al. "Is QR code an optimal data container in optical encryption systems from an error-correction coding perspective?" JOSA A 35.1 (2018): A23-A29.
[20]
Gao, Jerry Zeyu, Lekshmi Prakash, and Rajini Jagatesan. "Understanding 2d-barcode technology and applications in m-commerce-design and implementation of a 2d barcode processing solution." Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International. Vol. 2. IEEE, 2007.

Index Terms

  1. Security Mechanism Improvement for 2D Barcodes using Error Correction with Random Segmentation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICIT '18: Proceedings of the 6th International Conference on Information Technology: IoT and Smart City
    December 2018
    344 pages
    ISBN:9781450366298
    DOI:10.1145/3301551
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • The Hong Kong Polytechnic: The Hong Kong Polytechnic University
    • TU: Tianjin University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 December 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. error correction codes
    2. security key
    3. security mechanism
    4. two-dimensional barcodes

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    ICIT 2018
    ICIT 2018: IoT and Smart City
    December 29 - 31, 2018
    Hong Kong, Hong Kong

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 60
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media