Information Technology Convergence pp 597-605 | Cite as
Application of QR-Code Steganography Using Data Embedding Technique
Abstract
Quick response (QR) code is a convenient product for mobile phone user. People can use the Smartphone camera to capture the code, and then decode it through dedicated reader application. Usually the code stands for text, contact information, or a web hyperlink. Users scan the image of QR code to display information or open a website page in the phone’s browser. QR codes appear everywhere on posters, publicity flyers, TV advertisements, and even business cards. Since QR code looks like random noise, its existence may hurt the picture of commodities. In this paper, we propose a data embedding scheme to camouflage the existence of QR code. Experimental results showed that the proposed scheme hides the QR code successfully. Moreover, the quality of stego-images is nearly to 30 dB.
Keywords
Quick response (QR) code Data embedding Vector quantization Codebook clusteringNotes
Acknowledgments
This work was supported by National Science Council, Taiwan, Republic of China, under the Grant NSC 101-2221-E-156-011 and NSC 99-2632-H-156-001-MY3.
References
- 1.Deshmukh O, Sonavane S (2013) Multi-share crypt-stego authentication system. Int J Comput Sci Mobile Comput 2(2):80–90Google Scholar
- 2.Huang HC, Chang FC, Fang WC (2009) Applications of reversible data hiding techniques with the quick response codes. Commun Comput Inf Sci 58:1–8CrossRefGoogle Scholar
- 3.Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: 4th international workshop on trustworthy ubiquitous computing, Paris, France, pp 1–6Google Scholar
- 4.Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for QR code based on watermark by compare DCT with DFT domain. In: 3rd international conference on computer and communication technologies, India, pp 144–148Google Scholar
- 5.Wu WC, Wu YC (2012) Improved reversible data hiding based on residue histogram shifting. In: 6th international conference on genetic and evolutionary computing, Kitakyushu, Japan, pp 23–26Google Scholar
- 6.Gray RM (1984) Vector quantization. IEEE ASSP Mag 1(2):4–29CrossRefGoogle Scholar
- 7.Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95CrossRefGoogle Scholar
- 8.Chang CC, Wu WC, Chen YH (2008) Joint coding and embedding techniques for multimedia images. Inf Sci 178:3543–3556CrossRefGoogle Scholar
- 9.Shrivakshan GT, Chandrasekar C (2012) A comparison of various edge detection techniques used in image processing. Int J Comput Sci Issues 9(1):269–276Google Scholar
- 10.Chang CC, Wu WC (2005) A steganographic method for hiding secret data using side match vector quantization. IEICE Trans Inf Syst E99-D(9):2159–2167Google Scholar
- 11.Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images Based on VQ indexing and inpainting. Signal Process 93(4):933–946CrossRefGoogle Scholar