Skip to main content

Application of QR-Code Steganography Using Data Embedding Technique

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 253))

Abstract

Quick response (QR) code is a convenient product for mobile phone user. People can use the Smartphone camera to capture the code, and then decode it through dedicated reader application. Usually the code stands for text, contact information, or a web hyperlink. Users scan the image of QR code to display information or open a website page in the phone’s browser. QR codes appear everywhere on posters, publicity flyers, TV advertisements, and even business cards. Since QR code looks like random noise, its existence may hurt the picture of commodities. In this paper, we propose a data embedding scheme to camouflage the existence of QR code. Experimental results showed that the proposed scheme hides the QR code successfully. Moreover, the quality of stego-images is nearly to 30 dB.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Deshmukh O, Sonavane S (2013) Multi-share crypt-stego authentication system. Int J Comput Sci Mobile Comput 2(2):80–90

    Google Scholar 

  2. Huang HC, Chang FC, Fang WC (2009) Applications of reversible data hiding techniques with the quick response codes. Commun Comput Inf Sci 58:1–8

    Article  Google Scholar 

  3. Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: 4th international workshop on trustworthy ubiquitous computing, Paris, France, pp 1–6

    Google Scholar 

  4. Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for QR code based on watermark by compare DCT with DFT domain. In: 3rd international conference on computer and communication technologies, India, pp 144–148

    Google Scholar 

  5. Wu WC, Wu YC (2012) Improved reversible data hiding based on residue histogram shifting. In: 6th international conference on genetic and evolutionary computing, Kitakyushu, Japan, pp 23–26

    Google Scholar 

  6. Gray RM (1984) Vector quantization. IEEE ASSP Mag 1(2):4–29

    Article  Google Scholar 

  7. Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95

    Article  Google Scholar 

  8. Chang CC, Wu WC, Chen YH (2008) Joint coding and embedding techniques for multimedia images. Inf Sci 178:3543–3556

    Article  Google Scholar 

  9. Shrivakshan GT, Chandrasekar C (2012) A comparison of various edge detection techniques used in image processing. Int J Comput Sci Issues 9(1):269–276

    Google Scholar 

  10. Chang CC, Wu WC (2005) A steganographic method for hiding secret data using side match vector quantization. IEICE Trans Inf Syst E99-D(9):2159–2167

    Google Scholar 

  11. Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images Based on VQ indexing and inpainting. Signal Process 93(4):933–946

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by National Science Council, Taiwan, Republic of China, under the Grant NSC 101-2221-E-156-011 and NSC 99-2632-H-156-001-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen-Chuan Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Wu, WC., Lin, ZW., Wong, WT. (2013). Application of QR-Code Steganography Using Data Embedding Technique. In: Park, J., Barolli, L., Xhafa, F., Jeong, HY. (eds) Information Technology Convergence. Lecture Notes in Electrical Engineering, vol 253. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6996-0_63

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6996-0_63

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6995-3

  • Online ISBN: 978-94-007-6996-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics