The inclusion of watermarks based on QR Code analysis


  • Jumana Waleed Department of Computer Science, College of Science, University of Diyala
  • Sarah Saadoon Jasim Middle Technical University, Computer Science/Technical college of Management – Baghdad/Dept. of IT
  • Thekra Abbas Department of Computer Science, College of Science, Almustanseriah University





QR Code Analysis, Unimportant Locations, Digital Watermarking, QR Code Ridge, Hidden Capacity.


With the quick arrival of high grades of acceptance, the QR Code technology is becoming more adaptable and usable every day by more and more people. Lately, the utilization of two dimensional QR codes for the powerful encoding of information with a big capacity becomes significantly growing; especially for encoding the identity. Because the identity is private information, it requires being further authenticated. This paper firstly works on analyzing the content of the QR Code and finding the unimportant locations inside it; Then, a combination of the digital watermarking concept and QR Code technology is used to substitute the founded unimportant locations by the watermark for the purpose of increasing the authenticity for the owner of the identity. The experimental results show that the inclusion of watermark bits inside the detected unimportant locations did not affect the process of decoding and retrieving information from the QR Code.




[1] Muming Li, Peng Cao, Liuping Feng, Lifang Yu, Jianbo Chen and Jing Wang, (2017), "The research of QR code image correction based on image gray feature", 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS), Harbin, China, pp. 1-5.

[2] Jumana Waleed, Huang Dong Jun, and Saad Hameed, (2014), “A robust Optimal Zero-Watermarking Technique for Secret Watermark Sharing," International Journal of Security and Its Applications Vol.8, No.5, pp.349-360.

[3] Jumana Waleed Huang Dong Jun, and Saad Hameed., (2015), "An optimized digital image watermarking technique based on cuckoo search (CS)", ICIC Express Letters, Part B: Applications, Vol. 6, No. 10, pp. 2629-2634.

[4] Abhinaya. M, A. Umamakeswari, (2018), "A Robust Image Watermarking Method based on Contourlet Transform for Correcting Geometric Attacks", International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.24, pp. 24-28.

[5] Pillai Praveen Thulasidharan, Madhu S. Nair, (2015), "QR code based blind digital image watermarking with attack detection code", AEU - International Journal of Electronics and Communications, Vol. 69, No. 7, PP. 1074-1084.

[6] Weijun Zhang and Xuetian Meng, (2015), "An improved digital watermarking technology based on QR code," 2015 4th International Conference on Computer Science and Network Technology (ICCSNT), Harbin, pp. 1004-1007.

[7] Jumana Waleed, Huang Dong Jun, Sarah Saadoon, Saad Hameed, Hiyam Hatem, (2015), "An Immune Secret QR-Code Sharing based on a Twofold Zero Watermarking Scheme", International Journal of Multimedia and Ubiquitous Engineering Vol.10, No.4, pp.399-412.

[8] K. J. Kavitha and B. P. Shan, (2017), "Implementation of DWM for medical images using IWT and QR code as a watermark," 2017 Conference on Emerging Devices and Smart Systems (ICEDSS), Tiruchengode, pp. 252-255.

[9] A. M. Barmawi and F. A. Yulianto, (2015), "Watermarking QR Code," 2015 2nd International Conference on Information Science and Security (ICISS), Seoul, pp. 1-4.

[10] H. P. Nguyen, A. Delahaies, F. Retraint, D. H. Nguyen, M. Pic and F. Morain-Nicolier, (2017), "A watermarking technique to secure printed QR codes using a statistical test," 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Montreal, QC, pp. 288-292.

[11] A. Mishra and M. Mathuria, (2017), "Multilevel security feature for online transaction using QR code & digital watermarking," 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, pp. 48-51.

[12] S. Tiwari, (2016), "An Introduction to QR Code Technology," 2016 International Conference on Information Technology (ICIT), Bhubaneswar, pp. 39-44.

View Full Article: