A Novel Steganography Approach for Hiding QR Codes by Using 2-D Discrete Wavelet Transformation
Full text | |||
Source | Journal of Information Systems Security Volume 11, Number 2 (2015)
Pages 131–148
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Damir Omerasevic — PrinTec Group of Companies, Bosnia and Herzegovina
Dragan Pleskonjic — GTECH, Serbia
Narcis Behlilovic — University of Sarajevo, Bosnia and Herzegovina
Sasa Mrdovic — University of Sarajevo, Bosnia and Herzegovina
|
||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
This paper proposes a novel steganographic method which uses Discrete Wavelet Transformation (DWT) for hiding secret messages. The secret message is embedded in the QR Code. The QR Code carries a secret message, which is created by a GNU Privacy Guard (GPG), which is signed and encrypted by RSA keys.
Keywords
Access Control Lists, Solomon Four-group, Structured Approach, Task Complexity, Self-efficacy
References
Chung C.H., Chen W.Y., and Tu C.M. (2009). Image Hidden Technique Using QR-Barcode. In the Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09). IEEE Computer Society, Washington, DC, USA, (p. 522-525=. doi=10.1109/IIH-MSP.2009.119 http://dx.doi.org/10.1109/IIH-MSP.2009.119
Gupta, V., and Barve, A. (2014, Aug). Robust and Secured Image Watermarking using DWT and Encryption with QR Codes. In the International Journal of Computer Applications (IJCA), Vol.100, No.14, (p. 33-37). doi: 10.5120/17596-8391
Lin, N., Shen, J., Guo, X., and Zhou, J. (2011, May). A robust image watermarking based on DWT-QR decomposition. At the International Conference on Communication Software and Networks (ICCSN) 2011, 3rd, (p. 684-688). doi: 10.1109/ICCSN.2011.6014360
Islam, M.W., and Alzahir, S. (2013, Jan). A novel QR code guided image stenographic technique. At the IEEE International Conference on Consumer Electronics (ICCE), 2013, (p. 586-587). doi: 10.1109/ICCE.2013.6487028
Mayer, G. (2009). Image Repository. Retrieved 06.04.2015, from Fractal Coding and Analysis Group, University of Waterloo, Canada: http://links.uwaterloo.ca/Repository.html
Omerasevic, D., Behlilovic N., and Mrdovic, S. (2013, Jul). CryptoStego - A novel approach for creating cryptographic keys and messages. At the International Conference on Systems, Signals and Image Processing (IWSSIP), 2013 2oth (p. 83-86). doi: 10.1109/IWSSIP.2013.6623455
Omerasevic, D., Behlilovic, N., Mrdovic, S., and Sarajlic, A. (2013, Nov). Comparing randomness on various video and Audio Media File types. At the Telecommunications forum (TELFOR), 2013 21st (p. 381-384). doi: 10.1109/TELFOR.2013.6716249
Omerasevic, D., Behlilovic N., and Mrdovic, S. (2014, Sep). An implementation of secure key exchange by using QR codes. In ELMAR (ELMAR), 2014 56th (p. 1-4). doi: 10.1109/ELMAR.2014.6923341
Omerasevic, D., Behlilovic N., and Mrdovic, S. (2014, Nov). Secure message exchange protocol for Smart Grids. In Telecommunications forum (TELFOR), 2014 22nd (p. 158-161). doi: 10.1109/TELFOR.2014.7034379