Abstract
Steganography is a technology used for hiding the digital information into an electronic document so that it can be used only by the authorized entity and not available to trespassers. In the recent era, QR code is used versatile in all the applications. The data capacity of QR code is more as the information is codified in the form of image. Image Steganography can be achieved in spatial, transformation or hybrid domain. In this paper, a novel hybrid domain Steganography is employed for embedding encrypted QR code image in Source Image to get stego Image using Discrete Wavelet Transforms and Random Bit Binary Search (DWT - RBBS) technique. The information is encrypted using DES encryption algorithm and is codified to QR code image. This QR code image is then embedded into the source image using DWT-RBBS technique resulting in multiple level of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chang, J.H.: An introduction to QR code using scholarly journals. Sci. Ed. J. 1(2), 113–117 (2014)
Yuan, T., Wang, Y., Xu, K.: Two-layer QR codes. IEEE Trans. Image Process. 28(9), 4413–4428 (2019)
Liu, Z., Zeng, Q., Wang, C., Lu, Q.: Application research of QR code barcode in validation of express delivery. In: Shen, G., Huang, X. (eds.) ECWAC 2011. CCIS, vol. 143, pp. 346–351. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20367-1_56
Yanti, N., Surya, W.A., Akhyar, A., Frica A.A.: Implementation of Advanced Encryption Standard (AES) and QR code algorithm on digital legalization system. In: International Conference on Energy, Environment, Epidemiology and Information System (ICENIS), pp 1–7 (2018)
Alexandre, B., Richard, D., Nuno, A., Nuno, L., Marco, V.: Understanding how to use static analysis tool for detecting cryptography misuse in software. IEEE Trans. Relaibility 68(4), 1384–1403 (2019)
Suguna, S., Dhanakoti, V., Manjupriya, R.: A study on symmetric and asymmetric key encryption algorithms. Int. Res. J. Eng. Technol. (IRJET) 3(4), 27–31 (2016)
Kaur, N., Sodhi, S.: Data Encryption Standard Algorithm (DES) for secure data transmission. Int. J. Comput. Appl. 8, 31–37 (2016)
Hang, Z., Kejiang, C., Weiming, Z., Nenghai, Y.: Comments on steganography using reversible texture synthesis. IEEE Trans. Image Process. 26(4), 1623–1625 (2017)
Jie, W., Xiaoqing, J., et al.: A cover selection HEVC video steganography based on intra prediction mode. IEEE Access 7, 119393–119402 (2019)
Sharma, R., Sharma, N.: A more private & secure E-mail system using image steganography (EPS) and data mining. In: International Conference on Advances in Information Communication Technology and Computing, Article no 104, pp 1–5 (2016)
Lokesswara Reddy, V.: Improved secure data transfer using video steganographic technique. Int. J. Rough Sets Data Anal. 4(3), 16 (2017)
Iuliia, T., William, P.: Two-level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11(3), 571–583 (2016)
Baharav, Z., Kakarala, R.: Visually significant QR codes: image blending and statistical analysis. In: International Conference on Multimedia and Expo (ICME), pp 1–6 (2013)
Arce, G.R., Lau, D.L., Villarreal, O.P.: QR images: optimized image embedding in QR codes. IEEE Trans. Image Process. 23(7), 2842–2853 (2014)
Lin, Pei-Yu., Chen, Y.-H.: High payload secret hiding technology for QR codes. EURASIP J. Image and Video Process. 2017(1), 1–8 (2017). https://doi.org/10.1186/s13640-016-0155-0. Springer Open Access
Dev, S., Mondal, K., et al.: Advanced steganography algorithm using randamized intermediate QR host embedded within any encrypted secret message. Int. J. Mod. Educ. Comput. Sci. 6, 59–67 (2012)
Guo, L., Ni, J., Shi, Y.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)
Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2016)
VladimÃr, H., Martin, B., et al.: Image steganography with using QR code and cryptography. In: Conference on Radio Elektronika, Slovak republic, pp 1– 4 (2016)
Daphney, J., Girish, S.: A method of data hiding in QR code using image steganography. Int. J. Adv. Res. Ideas Innov. Technol. 4(3), 1111–1113 (2018)
Ramesh, M., Prabakaran, G., Bhavani, R.: QR-DWT code image steganography. Int. J. Comput. Intell. Inf. 3(1), 9–13 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shashikiran, B.S., Shaila, K., Venugopal, K.R. (2021). Hybrid Domain Steganography for Embedding DES Encrypted QR Code Using Random Bit Binary Search. In: Vinh, P.C., Rakib, A. (eds) Context-Aware Systems and Applications, and Nature of Computation and Communication. ICCASA ICTCC 2020 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 343. Springer, Cham. https://doi.org/10.1007/978-3-030-67101-3_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-67101-3_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67100-6
Online ISBN: 978-3-030-67101-3
eBook Packages: Computer ScienceComputer Science (R0)