Skip to main content
Top

2023 | OriginalPaper | Chapter

A Data Hiding Technique Based on QR Code Decomposition in Transform Domain

Authors : Sakhi Bandyopadhyay, Subhadip Mukherjee, Biswapati Jana, Partha Chowdhuri

Published in: Proceedings of International Conference on Frontiers in Computing and Systems

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Designed and created by Toyota subsidiary Denso Wave, quick response (QR) code has now been commonly used in many suitable applications to deal with real-time data because it can be read quickly by smartphones or tablets. The covering of information is indeed the technique of keeping secret knowledge inside the source media. Two qualities would have a strong approach to data hiding: high consistency of the stego image as well as high potentiality for concealing. In this paper, a redundant discrete wavelet transform (RDWT) domain-based information hiding method using QR code decomposition is proposed. An appropriate cover is torn down by RDWT mechanism, and the private image is concealed within the sub-bands of the factorized QR code. For the purpose of demonstrating the effectiveness of the proposed approach with respect to imperceptibility, capability and robustness to different signal processing assaults, multiple tests and case analysis are conducted.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jana B, Giri D, Mondal SK (2018) Dual image based reversible data hiding scheme using (7, 4) hamming code. Multimedia Tools Appl 77(1):763–785CrossRef Jana B, Giri D, Mondal SK (2018) Dual image based reversible data hiding scheme using (7, 4) hamming code. Multimedia Tools Appl 77(1):763–785CrossRef
2.
go back to reference Subhedar MS, Mankar VH (2014) High capacity image steganography based on discrete wavelet transform and singular value decomposition. In: Proceedings of the 2014 international conference on information and communication technology for competitive strategies, pp 1–7 Subhedar MS, Mankar VH (2014) High capacity image steganography based on discrete wavelet transform and singular value decomposition. In: Proceedings of the 2014 international conference on information and communication technology for competitive strategies, pp 1–7
3.
go back to reference Guo J-M, Prasetyo H (2014) Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 68(9):816–834CrossRef Guo J-M, Prasetyo H (2014) Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 68(9):816–834CrossRef
4.
go back to reference Hwang J, Kim J, Choi J (2006) A reversible watermarking based on histogram shifting. In: International workshop on digital watermarking, Springer, pp 348–361 Hwang J, Kim J, Choi J (2006) A reversible watermarking based on histogram shifting. In: International workshop on digital watermarking, Springer, pp 348–361
5.
go back to reference Mukherjee S, Jana B (2019) A novel method for high capacity reversible data hiding scheme using difference expansion. Int J of Nat Comput Res (IJNCR) 8(4):13–27CrossRef Mukherjee S, Jana B (2019) A novel method for high capacity reversible data hiding scheme using difference expansion. Int J of Nat Comput Res (IJNCR) 8(4):13–27CrossRef
6.
go back to reference Banerjee A, Jana B (2019) A robust reversible data hiding scheme for color image using reed-solomon code. Multimedia Tools Appl 78(17):24903–24922CrossRef Banerjee A, Jana B (2019) A robust reversible data hiding scheme for color image using reed-solomon code. Multimedia Tools Appl 78(17):24903–24922CrossRef
7.
go back to reference Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Process 38:77–94CrossRef Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Process 38:77–94CrossRef
8.
go back to reference Xiao M, He Z (2015) High capacity image steganography method based on framelet and compressive sensing. In: MIPPR 2015: multispectral image acquisition, Pprocessing, and analysis, vol 9811. International Society for Optics and Photonics, p 98110Y Xiao M, He Z (2015) High capacity image steganography method based on framelet and compressive sensing. In: MIPPR 2015: multispectral image acquisition, Pprocessing, and analysis, vol 9811. International Society for Optics and Photonics, p 98110Y
10.
go back to reference Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based on qr decomposition. Multimedia Tools Appl 72(1):987–1009CrossRef Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based on qr decomposition. Multimedia Tools Appl 72(1):987–1009CrossRef
11.
go back to reference Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130CrossRef Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130CrossRef
12.
go back to reference Singh N, Sharma D (2017) An efficient multiple data hiding technique for medical images using qr code authentication. Int J Sci Res Sci Eng Technol 3(1):135–139 Singh N, Sharma D (2017) An efficient multiple data hiding technique for medical images using qr code authentication. Int J Sci Res Sci Eng Technol 3(1):135–139
13.
go back to reference Huang H-C, Chen Y-H, Chang F-C, Tseng C-T (2020) Multi-purpose watermarking with qr code applications. In: 2020 IEEE 2nd global conference on life sciences and technologies (LifeTech). IEEE, pp 42–45 Huang H-C, Chen Y-H, Chang F-C, Tseng C-T (2020) Multi-purpose watermarking with qr code applications. In: 2020 IEEE 2nd global conference on life sciences and technologies (LifeTech). IEEE, pp 42–45
Metadata
Title
A Data Hiding Technique Based on QR Code Decomposition in Transform Domain
Authors
Sakhi Bandyopadhyay
Subhadip Mukherjee
Biswapati Jana
Partha Chowdhuri
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-0105-8_42