
However, Ohigashi et al. propose a detection
method that focuses on the principle of the construc-
tion method of fake QR codes (Ohigashi et al., 2021).
Dynamic fake QR codes have the same characteristics
as static fake QR codes. Thus, The countermeasure
methods in Reference (Ohigashi et al., 2021) work ef-
fectively. Dynamic fake QR codes require the irradia-
tion of a laser. Therefore, an effective countermeasure
can be achieved by adding atmospheric effects to the
laser beam. Specifically, it is considered effective to
install air conditioning, etc.
6 CONCLUSION
In this study, we proposed a method to generate a fake
QR code that can lead to a malicious site at arbitrary
timing by irradiating a laser beam onto a QR code.
Specifically, we considered that certain modules are
treated as bright areas when they are read by a cam-
era with laser irradiation. In addition, a study was
conducted on faking from long distances using laser
irradiation. Calculations showed the relationship of
the emission position to focus on the QR code. Sub-
sequently, experiments were conducted to confirm the
operation of QR code fake by laser irradiation at 10,
20, 30, 40, and 50 meters. In this experimental en-
vironment, the URL before the fake operation was
occasionally loaded at a distance of 50 or 100 me-
ters. The cause is owing to be that the air-conditioning
system was in operation. The air conditioning sys-
tem was centrally controlled and could not be shut
down for the experiments. The air conditioning may
have caused fluctuations in the atmosphere, making
it difficult for the laser beam to continue irradiating
the target module. Future experiments conducted over
longer distances, such as 1 km, will require more pre-
cise laser irradiation. It is necessary to study the ef-
fect of long-distance laser irradiation, which is sub-
ject to strong atmospheric fluctuations, on the fake
operation. Furthermore, we confirmed that the results
change with the angle of the reading, even at the same
laser power. In future work, we will study the change
of the inducing site with the angle of the reading rel-
ative to the laser irradiation.
ACKNOWLEDGEMENTS
This work was supported in part by the JSPS KAK-
ENHI JP24K14952.
REFERENCES
(2015). Information technology, Automatic Identification
and data capture techniques - QR Code bar code sym-
bology specification.
Degnan, J. J. (1985). Satellite laser ranging: Current sta-
tus and future prospects. IEEE Transactions on Geo-
science and Remote Sensing, GE-23(4):398–413.
Hecht, E. (2017). Optics. Pearson Education Inc., Essex,
5th edition.
Hemani, K. and Georges, K. (2017). Optical commu-
nication in space: Challenges and mitigation tech-
niques. IEEE Communications Surveys & Tutorials,
19(1):57–96.
Jin, K. and Zhou, W. (2019). Wireless laser power transmis-
sion: A review of recent progress. IEEE Transactions
on Power Electronics, 34(4):3842–3859.
Liu, Z., Barlow, J. F., Chan, P. W., Fung, J. C. H., Li, Y.,
Ren, C., Mak, H. W. L., and Ng, E. (2019). A review
of progress and applications of pulsed doppler wind
lidars. Remote. Sens., 11(21):2522.
Lucid Vision Labs (2024). Understanding digital
image sensors. https://thinklucid.com/tech-briefs/
understanding-digital-image-sensors/. Accessed:
2024-06-13.
Mohammad, A. K. and Murat, U. (2014). Survey on free
space optical communication: A communication the-
ory perspective. IEEE Communications Surveys & Tu-
torials, 16(4):2231–2258. Fourth quarter.
Ohigashi, T., Kawaguchi, S., Kobayashi, K., Kimura, H.,
Suzuki, T., Okabe, D., Ishibashi, T., Yamamoto, H.,
Inui, M., Miyamoto, R., Furukawa, K., and Izu, T.
(2021). Detecting fake QR codes using information
from error-correction. J. Inf. Process., 29:548–558.
Sato, T., Bhupathiraju, S. H. V., Clifford, M., Sugawara,
T., Chen, Q. A., and Rampazzi, S. (2023). Wip: In-
frared laser reflection attack against traffic sign recog-
nition systems. In Proceedings of the Inaugural Sym-
posium on Vehicle Security and Privacy (VehicleSec
2023), page 5 pages.
Smith, W. J. (2000). Modern Optical Engineering. McGraw
Hill Education Inc., New York, 3rd edition.
Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., and Fu,
K. (2020). Light commands: Laser-based audio injec-
tion on voice-controllable systems. In Proceedings of
the USENIX Security Symposium 2020, pages 2631–
2648.
Takita, M., Okuma, H., and Morii, M. (2018). A construc-
tion of fake QR codes based on error-correcting codes.
In Sixth International Symposium on Computing and
Networking, CANDAR, pages 188–193. IEEE Com-
puter Society.
Tech in Asia (2021). Thieves are pickpocketing wallet apps
in china. Tech in Asia. Accessed: 2021-03-28.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
462