Abstract
Quick response (QR) code is a convenient product for mobile phone user. People can use the Smartphone camera to capture the code, and then decode it through dedicated reader application. Usually the code stands for text, contact information, or a web hyperlink. Users scan the image of QR code to display information or open a website page in the phone’s browser. QR codes appear everywhere on posters, publicity flyers, TV advertisements, and even business cards. Since QR code looks like random noise, its existence may hurt the picture of commodities. In this paper, we propose a data embedding scheme to camouflage the existence of QR code. Experimental results showed that the proposed scheme hides the QR code successfully. Moreover, the quality of stego-images is nearly to 30 dB.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Deshmukh O, Sonavane S (2013) Multi-share crypt-stego authentication system. Int J Comput Sci Mobile Comput 2(2):80–90
Huang HC, Chang FC, Fang WC (2009) Applications of reversible data hiding techniques with the quick response codes. Commun Comput Inf Sci 58:1–8
Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: 4th international workshop on trustworthy ubiquitous computing, Paris, France, pp 1–6
Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for QR code based on watermark by compare DCT with DFT domain. In: 3rd international conference on computer and communication technologies, India, pp 144–148
Wu WC, Wu YC (2012) Improved reversible data hiding based on residue histogram shifting. In: 6th international conference on genetic and evolutionary computing, Kitakyushu, Japan, pp 23–26
Gray RM (1984) Vector quantization. IEEE ASSP Mag 1(2):4–29
Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95
Chang CC, Wu WC, Chen YH (2008) Joint coding and embedding techniques for multimedia images. Inf Sci 178:3543–3556
Shrivakshan GT, Chandrasekar C (2012) A comparison of various edge detection techniques used in image processing. Int J Comput Sci Issues 9(1):269–276
Chang CC, Wu WC (2005) A steganographic method for hiding secret data using side match vector quantization. IEICE Trans Inf Syst E99-D(9):2159–2167
Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images Based on VQ indexing and inpainting. Signal Process 93(4):933–946
Acknowledgments
This work was supported by National Science Council, Taiwan, Republic of China, under the Grant NSC 101-2221-E-156-011 and NSC 99-2632-H-156-001-MY3.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Wu, WC., Lin, ZW., Wong, WT. (2013). Application of QR-Code Steganography Using Data Embedding Technique. In: Park, J., Barolli, L., Xhafa, F., Jeong, HY. (eds) Information Technology Convergence. Lecture Notes in Electrical Engineering, vol 253. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6996-0_63
Download citation
DOI: https://doi.org/10.1007/978-94-007-6996-0_63
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6995-3
Online ISBN: 978-94-007-6996-0
eBook Packages: EngineeringEngineering (R0)