Skip to main content

A General Steganalysis Method of QR Codes

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2022)

Abstract

With the wide application of quick response (QR) codes, its security has been paid more and more attention. There are many steganography schemes to embed the secret message into QR codes, which can be used in terrorist activities, spread viruses, etc. However, there is currently no effective scheme for detecting stego QR code. This paper divides the spatial QR code-based steganography schemes into three categories and then proposes a steganalysis method for QR codes. The method includes detecting stegao codes and recovering pure QR codes, which is realized by the code regeneration, module comparison, and embedded information filtering operations. Our method can perfectly distinguish the stego code and block the transmission of embedded information for the spatial QR code-based steganography schemes. Theoretical analysis and experiments show that the proposed method is feasible, universal, and robust.

Supported by the Program of the National University of Defense Technology and the National Natural Science Foundation of China (Number: 61602491).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. JTC1/SC, I.: Information technology - automatic identification and data capture techniques - QR code 2005 bar code symbology specification (2006)

    Google Scholar 

  2. Arntz, P.: QR code scams are making a comeback (2020). https://blog.malwarebytes.com/scams/2020/10/qr-code-scams-are-making-a-comeback/

  3. Shi, Y.Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016). https://doi.org/10.1109/ACCESS.2016.2573308

    Article  Google Scholar 

  4. Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. Inf. Forensics Secur. IEEE Trans. 8, 553–562 (2013). https://doi.org/10.1109/TIFS.2013.2248725

  5. Yan, X., Lu, Y., Yang, C.N., Zhang, X., Wang, S.: A common method of share authentication in image secret sharing. IEEE Trans. Circ. Syst. Video Technol. 31, 2896–2908 (2020)

    Article  Google Scholar 

  6. Yan, X., Lu, Y., Liu, L., Song, X.: Reversible image secret sharing. IEEE Trans. Inf. Forensics Secur. 15, 3848–3858 (2020). https://doi.org/10.1109/TIFS.2020.3001735

    Article  Google Scholar 

  7. Mohamed Amin, M., Salleh, M., Ibrahim, S., Katmin, M.: Stenography: random LSB insertion using discrete logarithm, pp. 234–238 (2003)

    Google Scholar 

  8. Tkachenko, I., Puech, W., Destruel, C., Strauss, O., Gaudin, J.M., Guichard, C.: Two-level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11, 1 (2016). https://doi.org/10.1109/TIFS.2015.2506546

    Article  Google Scholar 

  9. Chou, G.J., Wang, R.Z.: The nested QR code. IEEE Sig. Process. Lett. 27, 1230–1234 (2020). https://doi.org/10.1109/LSP.2020.3006375

    Article  Google Scholar 

  10. Cheng, Y., Fu, Z., Yu, B., Shen, G.: A new two-level QR code with visual cryptography scheme. Multimedia Tools Appl. 77(16), 20629–20649 (2018). https://doi.org/10.1007/s11042-017-5465-4

    Article  Google Scholar 

  11. Baharav, Z., Kakarala, R.: Visually significant QR codes: image blending and statistical analysis, pp. 1–6 (2013). https://doi.org/10.1109/ICME.2013.6607571

  12. Chiang, Y.J., Lin, P.Y., Wang, R.Z., Chen, Y.H.: Blind QR code steganographic approach based upon error correction capability. KSII Trans. Internet Inf. Syst. 7, 2527–2543 (2013). https://doi.org/10.3837/tiis.2013.10.012

    Article  Google Scholar 

  13. Bui, T., Vu, N., Nguyen, T., Echizen, I., Nguyen, T.: Robust message hiding for QR code, pp. 520–523 (2014). https://doi.org/10.1109/IIH-MSP.2014.135

  14. Huang, P.C., Li, Y.H., Chang, C.C., Liu, Y.: Efficient scheme for secret hiding in QR code by improving exploiting modification direction. KSII Trans. Internet Inf. Syst. 12(5), 2348–2365 (2018)

    Google Scholar 

  15. Lin, P.Y., Chen, Y.H.: High payload secret hiding technology for QR codes. EURASIP J. Image Video Process. 2017(1), 1–8 (2017)

    Article  Google Scholar 

  16. Wan, S., Lu, Y., Yan, X., Ding, W., Liu, H.: High capacity embedding methods of QR code error correction, pp. 70–79 (2018). https://doi.org/10.1007/978-3-319-72998-5_8

  17. Liu, S., Fu, Z., Yu, B.: A two-level QR code scheme based on polynomial secret sharing. Multimedia Tools Appl. 78, 21291–21308 (2019). https://doi.org/10.1007/s11042-019-7455-1

    Article  Google Scholar 

  18. Tan, L., Lu, Y., Yan, X., Liu, L., Chen, J.: (2, 2) threshold robust visual secret sharing scheme for QR code based on pad codewords. In: Yang, C.-N., Peng, S.-L., Jain, L.C. (eds.) SICBS 2018. AISC, vol. 895, pp. 619–628. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16946-6_50

    Chapter  Google Scholar 

  19. Luo, X., Liu, F., Lian, S., Yang, C., Gritzalis, S.: On the typical statistic features for image blind steganalysis. IEEE J. Sel. Areas Commun. 29, 1404–1422 (2011)

    Article  Google Scholar 

  20. Li, F., Zhang, X.: Steganalysis for color images based on channel co-occurrence and selective ensemble. J. Image Graph. (2015)

    Google Scholar 

  21. Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE Trans. Image Process. 12(2), 221–229 (2003). https://doi.org/10.1109/TIP.2002.807363

    Article  MathSciNet  Google Scholar 

  22. Kodovsky, J., Pevný, T., Fridrich, J.: Modern steganalysis can detect YASS, vol. 7541, p. 754102 (2010). https://doi.org/10.1117/12.838768

  23. Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012). https://doi.org/10.1109/TIFS.2012.2190402

    Article  Google Scholar 

  24. Holub, V., Fridrich, J.: Low-complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015). https://doi.org/10.1109/TIFS.2014.2364918

    Article  Google Scholar 

  25. Song, S.K., Gorla, N.: A genetic algorithm for vertical fragmentation and access path selection. Comput. J. 43(1), 81–93 (2000). https://doi.org/10.1093/comjnl/43.1.81

    Article  MATH  Google Scholar 

  26. Liu, F., Yan, X., Lu, Y.: Feature selection for image steganalysis using binary bat algorithm. IEEE Access 8, 4244–4249 (2020). https://doi.org/10.1109/ACCESS.2019.2963084

    Article  Google Scholar 

  27. Ni, J., Ye, J., YI, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12, 2545–2557 (2017). https://doi.org/10.1109/TIFS.2017.2710946

  28. Yang, L., Cao, X., He, D., Wang, C., Wang, X., Zhang, W.: Modularity based community detection with deep learning (2016)

    Google Scholar 

  29. Wei, L., Gao, P., Jia, L., Liu, M.: Image steganalysis based on convolution neural network. Appl. Res. Comput. 1, 235–238 (2019)

    Google Scholar 

  30. Li, L., Zhang, W., Qin, C., Chen, K., Zhou, W., Yu, N.: Adversarial batch image steganography against CNN-based pooled steganalysis. Sign. Process. 181, 107920 (2021). https://doi.org/10.1016/j.sigpro.2020.107920

    Article  Google Scholar 

  31. Chen, B., Li, H., Luo, W., Huang, J.: Image processing operations identification via convolutional neural network. Sci. Chin. (Inf. Sci.) 63(03), 275–281 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuehu Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, J., Chen, K., Wang, Y., Yan, X., Li, L. (2023). A General Steganalysis Method of QR Codes. In: Goel, S., Gladyshev, P., Nikolay, A., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 508. Springer, Cham. https://doi.org/10.1007/978-3-031-36574-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-36574-4_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-36573-7

  • Online ISBN: 978-3-031-36574-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics