Skip to main content

Hybrid Domain Steganography for Embedding DES Encrypted QR Code Using Random Bit Binary Search

  • Conference paper
  • First Online:
Context-Aware Systems and Applications, and Nature of Computation and Communication (ICCASA 2020, ICTCC 2020)

Abstract

Steganography is a technology used for hiding the digital information into an electronic document so that it can be used only by the authorized entity and not available to trespassers. In the recent era, QR code is used versatile in all the applications. The data capacity of QR code is more as the information is codified in the form of image. Image Steganography can be achieved in spatial, transformation or hybrid domain. In this paper, a novel hybrid domain Steganography is employed for embedding encrypted QR code image in Source Image to get stego Image using Discrete Wavelet Transforms and Random Bit Binary Search (DWT - RBBS) technique. The information is encrypted using DES encryption algorithm and is codified to QR code image. This QR code image is then embedded into the source image using DWT-RBBS technique resulting in multiple level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chang, J.H.: An introduction to QR code using scholarly journals. Sci. Ed. J. 1(2), 113–117 (2014)

    Article  Google Scholar 

  2. Yuan, T., Wang, Y., Xu, K.: Two-layer QR codes. IEEE Trans. Image Process. 28(9), 4413–4428 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  3. Liu, Z., Zeng, Q., Wang, C., Lu, Q.: Application research of QR code barcode in validation of express delivery. In: Shen, G., Huang, X. (eds.) ECWAC 2011. CCIS, vol. 143, pp. 346–351. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20367-1_56

    Chapter  Google Scholar 

  4. Yanti, N., Surya, W.A., Akhyar, A., Frica A.A.: Implementation of Advanced Encryption Standard (AES) and QR code algorithm on digital legalization system. In: International Conference on Energy, Environment, Epidemiology and Information System (ICENIS), pp 1–7 (2018)

    Google Scholar 

  5. Alexandre, B., Richard, D., Nuno, A., Nuno, L., Marco, V.: Understanding how to use static analysis tool for detecting cryptography misuse in software. IEEE Trans. Relaibility 68(4), 1384–1403 (2019)

    Article  Google Scholar 

  6. Suguna, S., Dhanakoti, V., Manjupriya, R.: A study on symmetric and asymmetric key encryption algorithms. Int. Res. J. Eng. Technol. (IRJET) 3(4), 27–31 (2016)

    Google Scholar 

  7. Kaur, N., Sodhi, S.: Data Encryption Standard Algorithm (DES) for secure data transmission. Int. J. Comput. Appl. 8, 31–37 (2016)

    Google Scholar 

  8. Hang, Z., Kejiang, C., Weiming, Z., Nenghai, Y.: Comments on steganography using reversible texture synthesis. IEEE Trans. Image Process. 26(4), 1623–1625 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  9. Jie, W., Xiaoqing, J., et al.: A cover selection HEVC video steganography based on intra prediction mode. IEEE Access 7, 119393–119402 (2019)

    Article  Google Scholar 

  10. Sharma, R., Sharma, N.: A more private & secure E-mail system using image steganography (EPS) and data mining. In: International Conference on Advances in Information Communication Technology and Computing, Article no 104, pp 1–5 (2016)

    Google Scholar 

  11. Lokesswara Reddy, V.: Improved secure data transfer using video steganographic technique. Int. J. Rough Sets Data Anal. 4(3), 16 (2017)

    Google Scholar 

  12. Iuliia, T., William, P.: Two-level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11(3), 571–583 (2016)

    Article  Google Scholar 

  13. Baharav, Z., Kakarala, R.: Visually significant QR codes: image blending and statistical analysis. In: International Conference on Multimedia and Expo (ICME), pp 1–6 (2013)

    Google Scholar 

  14. Arce, G.R., Lau, D.L., Villarreal, O.P.: QR images: optimized image embedding in QR codes. IEEE Trans. Image Process. 23(7), 2842–2853 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  15. Lin, Pei-Yu., Chen, Y.-H.: High payload secret hiding technology for QR codes. EURASIP J. Image and Video Process. 2017(1), 1–8 (2017). https://doi.org/10.1186/s13640-016-0155-0. Springer Open Access

    Article  Google Scholar 

  16. Dev, S., Mondal, K., et al.: Advanced steganography algorithm using randamized intermediate QR host embedded within any encrypted secret message. Int. J. Mod. Educ. Comput. Sci. 6, 59–67 (2012)

    Google Scholar 

  17. Guo, L., Ni, J., Shi, Y.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)

    Article  Google Scholar 

  18. Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2016)

    Article  Google Scholar 

  19. Vladimír, H., Martin, B., et al.: Image steganography with using QR code and cryptography. In: Conference on Radio Elektronika, Slovak republic, pp 1– 4 (2016)

    Google Scholar 

  20. Daphney, J., Girish, S.: A method of data hiding in QR code using image steganography. Int. J. Adv. Res. Ideas Innov. Technol. 4(3), 1111–1113 (2018)

    Google Scholar 

  21. Ramesh, M., Prabakaran, G., Bhavani, R.: QR-DWT code image steganography. Int. J. Comput. Intell. Inf. 3(1), 9–13 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. S. Shashikiran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shashikiran, B.S., Shaila, K., Venugopal, K.R. (2021). Hybrid Domain Steganography for Embedding DES Encrypted QR Code Using Random Bit Binary Search. In: Vinh, P.C., Rakib, A. (eds) Context-Aware Systems and Applications, and Nature of Computation and Communication. ICCASA ICTCC 2020 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 343. Springer, Cham. https://doi.org/10.1007/978-3-030-67101-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67101-3_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67100-6

  • Online ISBN: 978-3-030-67101-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics