Skip to main content

2013 | OriginalPaper | Buchkapitel

Application of QR-Code Steganography Using Data Embedding Technique

verfasst von : Wen-Chuan Wu, Zi-Wei Lin, Wei-Teng Wong

Erschienen in: Information Technology Convergence

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Quick response (QR) code is a convenient product for mobile phone user. People can use the Smartphone camera to capture the code, and then decode it through dedicated reader application. Usually the code stands for text, contact information, or a web hyperlink. Users scan the image of QR code to display information or open a website page in the phone’s browser. QR codes appear everywhere on posters, publicity flyers, TV advertisements, and even business cards. Since QR code looks like random noise, its existence may hurt the picture of commodities. In this paper, we propose a data embedding scheme to camouflage the existence of QR code. Experimental results showed that the proposed scheme hides the QR code successfully. Moreover, the quality of stego-images is nearly to 30 dB.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Deshmukh O, Sonavane S (2013) Multi-share crypt-stego authentication system. Int J Comput Sci Mobile Comput 2(2):80–90 Deshmukh O, Sonavane S (2013) Multi-share crypt-stego authentication system. Int J Comput Sci Mobile Comput 2(2):80–90
2.
Zurück zum Zitat Huang HC, Chang FC, Fang WC (2009) Applications of reversible data hiding techniques with the quick response codes. Commun Comput Inf Sci 58:1–8CrossRef Huang HC, Chang FC, Fang WC (2009) Applications of reversible data hiding techniques with the quick response codes. Commun Comput Inf Sci 58:1–8CrossRef
3.
Zurück zum Zitat Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: 4th international workshop on trustworthy ubiquitous computing, Paris, France, pp 1–6 Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: 4th international workshop on trustworthy ubiquitous computing, Paris, France, pp 1–6
4.
Zurück zum Zitat Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for QR code based on watermark by compare DCT with DFT domain. In: 3rd international conference on computer and communication technologies, India, pp 144–148 Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for QR code based on watermark by compare DCT with DFT domain. In: 3rd international conference on computer and communication technologies, India, pp 144–148
5.
Zurück zum Zitat Wu WC, Wu YC (2012) Improved reversible data hiding based on residue histogram shifting. In: 6th international conference on genetic and evolutionary computing, Kitakyushu, Japan, pp 23–26 Wu WC, Wu YC (2012) Improved reversible data hiding based on residue histogram shifting. In: 6th international conference on genetic and evolutionary computing, Kitakyushu, Japan, pp 23–26
6.
7.
Zurück zum Zitat Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95CrossRef Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95CrossRef
8.
Zurück zum Zitat Chang CC, Wu WC, Chen YH (2008) Joint coding and embedding techniques for multimedia images. Inf Sci 178:3543–3556CrossRef Chang CC, Wu WC, Chen YH (2008) Joint coding and embedding techniques for multimedia images. Inf Sci 178:3543–3556CrossRef
9.
Zurück zum Zitat Shrivakshan GT, Chandrasekar C (2012) A comparison of various edge detection techniques used in image processing. Int J Comput Sci Issues 9(1):269–276 Shrivakshan GT, Chandrasekar C (2012) A comparison of various edge detection techniques used in image processing. Int J Comput Sci Issues 9(1):269–276
10.
Zurück zum Zitat Chang CC, Wu WC (2005) A steganographic method for hiding secret data using side match vector quantization. IEICE Trans Inf Syst E99-D(9):2159–2167 Chang CC, Wu WC (2005) A steganographic method for hiding secret data using side match vector quantization. IEICE Trans Inf Syst E99-D(9):2159–2167
11.
Zurück zum Zitat Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images Based on VQ indexing and inpainting. Signal Process 93(4):933–946CrossRef Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images Based on VQ indexing and inpainting. Signal Process 93(4):933–946CrossRef
Metadaten
Titel
Application of QR-Code Steganography Using Data Embedding Technique
verfasst von
Wen-Chuan Wu
Zi-Wei Lin
Wei-Teng Wong
Copyright-Jahr
2013
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6996-0_63

Neuer Inhalt