Visual QR Code with Beautication and Self-recovery Based on Data Hiding

  • Huili Cai
  • Bin YanEmail author
  • Jeng-Shyang Pan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 834)


For the problem of beautification and self-recovery of visual QR (Quick Response) code, this paper proposes two schemes. The first scheme uses data hiding and beautified QR code for self-recovery. By decoding this visual QR code, we can not only access the relevant links embedded in it but also restore the original image. However, the QR code may be maliciously tampered with by the attacker during transmission (e.g., redirected to a phishing website). For tampering protection and recovery of the QR code, the QR code is bound with the background image. This increases the security level when user scans a QR code. Experimental results demonstrate that the proposed algorithm is superior to the reference method in terms of visual quality.


Visual QR code Beautification Data hiding Self-recovery 



This work is supported by the National Natural Science Foundation of China (NSFC) (No. 61272432) and Shandong Provincial Natural Science Foundation (No. ZR2014JL044).


  1. 1.
  2. 2.
    Kan, T.W., Teng, C.H., Chou, W.S.: Applying QR code in augmented reality applications. In: Proceedings of the 8th International Conference on Virtual Reality Continuum and its Applications in Industry, pp. 253–257 (2009)Google Scholar
  3. 3.
    Qu, D.C., Pan, J.S., Weng, S.W., Xu, S.Q.: A novel reversible data hiding method for color images based on dynamic payload partition and cross-channel correlation. J. Inf. Hiding Multimed. Signal Process. 7(6) (2016)Google Scholar
  4. 4.
    Huang, H.C., Chang, F.C., Fang, W.C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011)CrossRefGoogle Scholar
  5. 5.
    Wakahara, T., Yamamoto, N., Ochi, H.: Image processing of dotted picture in the QR code of cellular phone. In: 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 454–458 (2010)Google Scholar
  6. 6.
    Wakahara, T., Yamamoto, N.: Image processing of 2-dimensional barcodes. In: 14th International Conference on Network-Based Information Systems, pp. 484–490 (2011)Google Scholar
  7. 7.
  8. 8.
    Liu, S.J., Zhang, J., Pan, J.S., Weng, C.J.: A novel information embedding and recovering method for qr code based on module subdivision. J. Inf. Hiding Multimed. Signal Process. 9(2), 515–522 (2018)Google Scholar
  9. 9.
    Zhang, S., Yoshino, K.: DWT-based watermarking using QR code. Sci. J. Kanagawa Univ. 19, 3–6 (2008)Google Scholar
  10. 10.
    Chung, C.H., Chen, W.Y., Tu, C.M.: Image hidden technique using QR-barcode. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 12–14 (2009)Google Scholar
  11. 11.
    Liu, S.J., Zhang, J., Pan, J.S., Weng, C.J.: SVQR: A novel secure visual quick response code and its anti-counterfeiting solution. J. Inf. Hiding Multimed. Signal Process. 8(5), 1132–1140 (2017)Google Scholar
  12. 12.
    Sarreshtedari, S., Akhaee, M.A.: A source-channel coding approach to digital image protection and self-recovery. IEEE Trans. Image Process 24(7), 2266–2277 (2015)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.College of Electronics Communication and PhysicsShandong University of Science and TechnologyQingdaoP. R. China
  2. 2.College of Computer Science and EngineeringShandong University of Science and TechnologyQingdaoP. R. China

Personalised recommendations