1. Detection of Information Hiding at Anti-Copying 2D Barcodes
- Author
-
Junjie Chen, Ning Xie, Ji Hu, Changsheng Chenb, Qiqi Zhang, Yicong Chena, and Lei Huang
- Subjects
Scheme (programming language) ,Pixel ,Computer science ,Heuristic ,business.industry ,Pattern recognition ,Barcode ,law.invention ,law ,Robustness (computer science) ,Information hiding ,Media Technology ,Code (cryptography) ,Artificial intelligence ,Electrical and Electronic Engineering ,Heuristics ,business ,computer ,computer.programming_language - Abstract
This paper addresses the issue of detecting the use of information hiding at anti-copying 2D barcodes. Prior hidden information detection schemes have their roots in either heuristic-based or Machine Learning (ML). However, prior heuristics-based schemes lack a rigorous theoretical analysis. Prior ML-based information schemes lack robustness because a printed 2D barcode is very much environmentally dependent. Thus, an information hiding detection scheme trained in one environment often does not work well in another environment. In this paper, we propose two hidden information detection schemes for existing anti-copying 2D barcodes. The first scheme directly uses the pixel distance to detect the use of an information hiding scheme in a 2D barcode, referred to as the Pixel Distance Based Detection (PDBD) scheme. The second scheme first calculates the variance of raw signal and the covariance between the recovered and raw signals, and then based on the variance results, detects the use of information hiding scheme in a 2D barcode, referred to as the Pixel Variance Based Detection (PVBD) scheme. Moreover, we design advanced Illegitimately-Copying (IC) attacks to evaluate the security of two existing anti-copying 2D barcodes. We conduct extensive performance comparisons among the proposed schemes and prior schemes under different capturing devices, e.g., different scanners or camera phones. Our experimental results show that the PVBD scheme can correctly detect the existence of hidden information at both the 2LQR code and the LCAC 2D barcode. Moreover, the successful attacking probability of the proposed IC attacks achieves 0.6538 for the 2LQR code and 1 for the LCAC 2D barcode.
- Published
- 2022