IT19 Color Quick Response Codes for High Profile Security

Color Quick Response Codes for High Profile
Security Application
Dr. Alex Mathews
Sathyashree. S
Department of Information Technology
College of Applied Sciences - Sohar
Sohar, Sultanate of Oman
dr.alex.soh@cas.edu.om
Department of Information Technology
College of Applied Sciences - Sohar
Sohar, Sultanate of Oman
sathya_degala.soh@cas.edu.om
Dr. Karthikeyan
Department of Information Technology
College of Applied Sciences – Sohar
Sohar, Sultanate of Oman
karthikeyan.soh@cas.edu.om
Abstract -- In image processing, the security is of vital
importance and a major requirement for many applications
which includes the product identification and authentication. In
this paper, we propose a high level security method by
integrating the holograms with the color QR codes and digital
watermarking in order to provide high intensity of security and
robustness. In addition, a spectral estimation technique is used
for color reconstruction that improves the object image. The
simulation work is done using MATLAB and the effectiveness of
the proposed method is confirmed. The results of the spectral
estimation prove the accuracy.
Keywords— Holograms, Security, CQR codes, Data hiding,
Data Storage.
I. INTRODUCTION
Image processing plays a crucial role in the development of
technologies for dealing with security issues. Some of the
important applications of image processing include computer
vision, remote sensing, feature extraction, face detection,
forecasting, optical character recognition, finger print
detection, microscope imaging, medical image processing and
morphological imaging [9]. The reality of security includes
areas like internal security, business applications, economic
security and defense.
This paper presents the research on a practical security
measure for identification and authentication of product in
image processing. In this paper, three levels of security are
provided. CQR code structure and watermarking is used along
with hologram to improve the level of security. Here the secret
text is first converted into a Colored Quick Response code
(CQR code). It is a two-dimensional structure used to transmit
information. It is intended to be decoded at high speed. It has
superior data density allied with high speed reading. Typically,
a QR Code is composed by black white modules we use of
colored modules in order to increase data density.
Color hologram using more than two wavelengths[2] as
reference beam is generated from this QR code. At the
decoding stage the spectral estimation technique is used for
better color reproducibility. As the number of wavelengths
increases the spectral estimation become more accurate.
This CQR code is watermarked into a color image using a
suitable method which has high capacity. Here Integer Wavelet
Transform (IWT) is used and double key is incorporated so it
has high hiding capacity, high security and good visual quality.
Color hologram is generated from this watermarked color
image to provide good level of security[8] and during the
reproduction side spectral estimation technique is used to
improve the color reproduction.
The rest of the paper is organized as follows. The next
Section describes the theoretical background of the proposed
work. In Section III, the simulation work of color QR codes
and holograms are described. Section IV includes the results.
Finally, Section V concludes the paper.
II. THEORETICAL BACKGROUND
A. CQR codes
The proposed CQR Code is made up of 49x49 modules.
A module is defined as a colored square area that represents
data/redundancy bits (00-red, 01-green, 10-blue, and 11white) or function patterns (black over white background).
The size of each module is nxn pixels, depending on the
desired overall CQR code size. Modules are distributed over
two discriminate regions which are the function patterns and
the encoding region.
The function patterns have exactly the same aspect for all
CQR Codes and are divided into: (a) quite zone (b) finder
patterns and (c) separators. The quite zone is the 4-module
white area that surrounds the code on all four sides.
Finder patterns are the three identical symbols located at
the upper-left, upper-right and lower-left corners of the code
and are used for correct image positioning at the decoder.
Separators are the 1x8 or 8x1-module elements that separate
encoding region and finder patterns. The encoding region
contains information and redundancy bits. Figure 1 illustrates
the above described CQR Code elements. From the 2401
(49x49) modules, 192 are inside the standard region and 2209
are inside the encoding region. Since each module represents 2
bits, we have 4418 bits available, from which 1024 are
information bits and 3392 are redundancy bits.
B. Computer Generated Color Holograms
Computer generated holography[1][7] utilizes the wave
theory of light to represent both the object and reference
waves mathematically. The superposition of these waves at
any point in space is calculated to obtain the interference
pattern required for constructing the hologram [3][4].Based on
Fig. 1. The CQR Code structure. Modules are distributed over function
patterns and encoding region.
is used. This is estimated by use of MMSE method as
𝑟̂ = 𝐶𝑟 𝐻𝑡 (𝐻𝐶𝑟 𝐻𝑡)
−1
𝑔
𝐶𝑟 = 〈(𝑟 − 𝑟̅)(𝑟 − 𝑟̅)𝑡 〉
(1)
(2)
where ^ and t denote estimator and transposition respectively
and Cr is a mxm covariance matrix of the spectral reflectance
of many samples of spectral reflectance distribution.
III. SIMULATION
A. Computer Generated Holograms
The computer generated holograms were generated and
reconstructed using Matlab (version R2013a).The reference
wave is a combination of different wavelengths. The loaded
object image is converted into matrix for further manipulation.
The Fourier Transform operation gives the far field amplitude
calculation given in equation. The addition of the far field
matrices of the object and reference is performed by using
matrix addition. The resulting matrix is the hologram matrix.
The square of the matrix gives the intensity values across the
hologram plane. The reconstruction is done using spectral
estimation [6]. More accurate spectral estimation can improve
the color reproduction since the color reproduction depends on
the continuous spectrum of the object. As the number of
recording wavelengths increases, the more accurate will be the
color reproduction. However, it takes longer when the number
of recording wavelengths is increased because the holograms
are sequentially recorded with each recording wavelength.
the Fraunhofer diffraction formula, the Fourier Transform
operation is utilized to give the far field amplitude calculation
required for calculating the interference pattern.
The spectral estimation technique is introduced to the color
digital holography to improve color reproduction Figure 2
shows the principle of color digital holography using spectral
estimation [2]. First, in this technique, three lasers operating at
different wavelengths corresponding to primary colors, red,
green, and blue (R, G, B) are used for recording of hologram
and three reconstructed images are obtained by each
wavelength in the same way as conventional color digital
holography. Second, spectral reflectance distribution on a
pixel to pixel basis is obtained from reconstructed images by
the spectral estimation method. Finally, the tristimulus values
(x,y,z) of the reconstructed image under the arbitrary
illumination are calculated from estimated spectrum.
Parameters are defined as follows: m is the number of
wavelengths for sample, r is the mx1 vector of the spectral
reflectance of the object, H is the 3xm vector comprising the
spectral power distribution of the illuminant and the spectral
sensitivity of the sensor, and g is the 3x1 vector of the
intensity value. To estimate the spectral reflectance
distribution of the object from the three reconstructed intensity
distributions, Minimum Mean Square Error (MMSE) method
Fig. 2. Schematic diagram of four-wavelength color digital holography.
B. CQR code Simulation
In CQR code each module is represented by one out of five
possible colors taken from the 24-bit RGB color space [6].
Red, green, blue and white colors are chosen because of their
maximum equidistance on the RGB color space. This
facilitates color thresholding on the decoding step. The
positioning of the modules in the encoding region is vertical
bottom-up, from the most right to the most left column, as
shown in Figure 4.
The encoding process is simple and shown in Figure 3.
First, we binarize the information that must be transmitted.
Considering that each group of 16 bits represents one symbol,
the redundancy symbols are generated using the ReedSolomon algorithm and then combined with the original data
symbols. Each group of two bits is mapped into one of the 4
possible colors. Finally, the modules are organized. Figure 5
shows an example of synthesized Colored QR Code. This
example will be used throughout the paper. Once the
information has been properly encoded, the synthesized CQR
Code is printed. In our experiments, we considered the size of
1.3 cmx1.3 cm which represents the print-scanned version of
the reduced CQR code.
Input
Message
Binarize the
string data
Mapping to
color codes
Organize the
modules
CQR
CODE
C. Watermarked Computer generated Holograms
Digital watermarks[5] embedded into the product provide
authenticity to the product. The secret user defined watermark
image is embedded into a cover image. The watermarked
image is converted into a computer generated hologram[7]. A
cover image and a secret watermark are provided to the
program. The cover image and secret watermark are the input
parameters to the program.
The watermarked image is resized to avoid overlapping in
reconstructed image and is converted into a computer
generated hologram. The far field diffraction patterns of the
watermarked image and the reference image are obtained by
using Fourier transform. The addition of these diffraction
patterns generates the computer generated hologram. The
reconstruction of the hologram is done by using Discrete
Fourier Transform (DFT) algorithms. The reconstructed image
contains the watermarked image. The secret watermark is then
extracted from the cropped portion of the reconstructed image.
Decoding of the product identification code from the
holographic barcodes requires a reference from the object
wave, which is called as the difference key. The retrieval of
secret watermark from watermarked computer generated
holograms also requires secret key. This help to increase the
level of security because even if an attacker is able to
reconstruct the hologram, he will not be able to access the
product identification code or the secret watermark. This
provides high profile security to the product.
IV. RESULT
Retrieved
message
Binary to
string
conversion
Convert to
Binary
values
Fig. 3. Encoding and Decoding of CQR Codes.
Scan each
module
Computer generated holograms have been integrated with
concepts of CQR codes and digital watermarking to provide
high profile security to the product. The simulation was done
using Matlab version 2013a. The results obtained during the
simulation of holographic barcodes and watermarked
computer generated holograms are discussed in this section.
Fig. 5. Colored CQR Code.
Fig. 4. Positioning of modules in the encoding region
In the generation of holographic barcodes, the input product
identification code is entered by the user using the Graphical
User Interface (GUI). CQR Code corresponding to input code
generated is shown in Figure 6.The CQR Code, after resizing
and modification, is provided as the data to be hidden the
color image.
Fig. 6. Generated CQR Code.
In watermarked computer generated holograms, a secret
watermark image provided by the manufacturer is used to
watermark a cover image. The watermarked image shown in
Figure 7 is taken as object for the generation of computer
generated holograms. The object image is modified and
resized to avoid overlapping. The diffraction pattern
corresponding to the object image obtained using Fourier
Transform operation. The superimposing of diffraction pattern
of object image and reference image generated the
watermarked computer generated hologram, shown in Figure
8. The object image is reconstructed using spectral estimation
which is shown in Figure 9 and the reconstructed image is
cropped to obtain the watermarked image. The secret
watermark is recovered from this cropped portion and from
that CQR is retrieved.
Fig. 9. Spectral Estimation.
V. CONCLUSION
The image security is a major concern for many application
in the current era. In this paper, we propose a security method
that generates a Color QR code for the encrypted text followed
by the digital holography on the color QR codes to improve the
color reproduction using a spectral estimation technique. In
addition, the resulting object is watermarked to give an image
with high security. The simulation has been carried out in
MATLAB and the experimental results show that the proposed
algorithm is effective and provides high level of security.
The future work includes the optical implementation of the
holographic CQR Code and watermarked computer generated
holograms.
REFERENCES
Fig. 7. Watermarked color image.
Fig. 8. Computer Generated Hologram
[1] Ulf Schnars, Werner P O J¨uptner, “Digital recording and
numerical reconstruction of holograms” , Measurement Science
and Technology ,IOP Publishing Ltd, August 2012, p.85–101
[2] Yasunori ito, yuki shimozato, peng xia, tatsuki tahara, takashi
kakue, yasuhiro awatsuji, kenzo nishio, shogo ura, toshihiro
kubota, osamu matoba, “Four-wavelength color digital
holography”, journal of display technology, vol. 8, no. 10,
October 2012
[3] Tung H. Jeong “Basic Principles and Applications of
Holography”, Lake Forest College,Lake Forest, llinois;
Fundamentals Of Photonics, Module 1.10,SPIE Digital Library
[4] Sheeja M.K., Ajith Kumar P.T., Achuthsankar S. Nair,
“Encrypted Fourier holographic data storage with variable data
reference wave for optical information security”, Proceedings of
SPIE, Photonics Asia 2007, Vol. 6832, Beijing, China, Nov.
2007.
[5] Sheeja M.K., Ajith Kumar P.T., Achuthsankar S. Nair,
“Optically watermarked variable data micro holograms for anticounterfeiting”, Proceedings of IEEE co-sponsored International
conference on Robotics, Vision, Information and Signal
Processing (ROVISP 2007), p 641– 644, Penang Island,
Malaysia, Nov. 2007.
[6] M. K. Sheeja, P. T. Ajith Kumar, S. Nair Achuthsankar
“Photopolymer-based holographic variable data storage system
for security applications” Proc. SPIE. 6352, Optoelectronic
Materials and Devices 635224 (September 21, 2006) doi:
10.1117/12.689041
[7] Arathy Nandan R, Dr. Sheeja.M.K; “Implementation of
computer generated hologram for high profile security
applications.” International Conference on Technological
Advancements And Green Governance (ICTAGG) 2014.
[8] Arathy Nandan R, Dr. Sheeja.M.K;”Implementation of four
wavelength digital hologram for security applications”,
International Conference on Innovations, Advances in Science
Engineering and Technology (IC IASET) 2014.
[9] Basavaprasad B, Ravi M, “A study on the importance of image
processing and its applications” International Journal of
Research in Engineering and Technology, IJRET May 2014,
Vol.3, p 155-160.