Increasing Secret Data Hiding Capacity in QR Code Using \(3 \times 3\) Subcells

  • Wisdarmanto ErlanggaEmail author
  • Ari Moesriami Barmawi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)


Recently, the use of QR code is becoming increasingly popular such that the majority smart-phone devices nowadays are capable reading them. Based on the development of camera technology in latest smart-phone devices, Teraura et al. proposed a method for hiding an additional data into a fine subcell structure of a monochrome QR code. Based on \(3 \times 3\) subcells configuration, the cover data is placed at the outer subcells while the embedded data is placed in a single center subcell. In general, QR code reader detects a cell color from its center pixel and such that it is difficult to extract the cover data of a \(3 \times 3\) subcells QR code. This research proposes an alternative method by accommodating different approaches in recognizing a cell color. The subcell selection for embedded data was kept secret by applying pseudorandom to randomize the bit data position in each cell. Experimental results show that using the proposed method, 97% of \(3 \times 3\) subcells QR code can be read by a general QR code reader. It uses 4 subcells to store 4 bits additional data and had embedded data capacity 4 times higher than the method of Teraura et al.


QR code Information hiding Subcells 


  1. 1.
    Wave, D.: Information technology automatic identification and data capture techniques QR code bar code symbology specification. International Organization for Standardization, ISO/IEC:18004, February 2015Google Scholar
  2. 2.
    Lin, P.-Y., Chen, Y.-H., Lu, E.J.-L., Chen, P.-J.: Secret hiding mechanism using QR barcode. In: 2013 International Conference on Signal-Image Technology and Internet-Based Systems (SITIS), pp. 22–25. IEEE (2013)Google Scholar
  3. 3.
    Bui, T.V., Vu, N.K., Nguyen, T.T., Echizen, I., Nguyen, T.D.: Robust message hiding for QR code. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520–523. IEEE (2014)Google Scholar
  4. 4.
    Barmawi, A.M., Yulianto, F.A.: Watermarking QR code. In: 2015 2nd International Conference on Information Science and Security (ICISS), pp. 1–4. IEEE (2015)Google Scholar
  5. 5.
    Teraura, N., Sakurai, K.: Information hiding in subcells of a two-dimensional code. In: The 1st IEEE Global Conference on Consumer Electronics 2012, pp. 652–656, October 2012Google Scholar
  6. 6.
    Kor Ashwini N, Kazi, N.M.: A survey of water mark technique. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 3(2) (2014)Google Scholar
  7. 7.
    Chen, W., Yang, G., Zhang, G.: A simple and efficient image pre-processing for QR decoder. In: 2nd International Conference on Electronic and Mechanical Engineering and Information Technology. Atlantis Press (2012)Google Scholar
  8. 8.
    Barker, E.B., Kelsey, J.M.: Recommendation for random number generation using deterministic random bit generators (revised). Information Technology Laboratory, Computer Security Division, National Institute of Standards and Technology, US Department of Commerce, Technology Administration (2007)Google Scholar
  9. 9.
    Fips, P.: 140-2. Security Requirements for Cryptographic Modules, vol. 25 (2001)Google Scholar
  10. 10.
    Easter, R.J., French, C., Gallagher, P.: Annex c: approved random number generators for FIPS PUB 140–2, security requirements for cryptographic modules. NIST, February 2012Google Scholar
  11. 11.
    Wave, D.: Point for setting the module size.—denso wave (2016).

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of ComputingTelkom UniversityBandungIndonesia

Personalised recommendations