You are here: Home Contents V11 N2 V11N2_Omerasevic.html
Personal tools

A Novel Steganography Approach for Hiding QR Codes by Using 2-D Discrete Wavelet Transformation

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 11, Number 2 (2015)
Pages 131148
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Damir Omerasevic — PrinTec Group of Companies, Bosnia and Herzegovina
Dragan Pleskonjic — GTECH, Serbia
Narcis Behlilovic — University of Sarajevo, Bosnia and Herzegovina
Sasa Mrdovic — University of Sarajevo, Bosnia and Herzegovina
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

This paper proposes a novel steganographic method which uses Discrete Wavelet Transformation (DWT) for hiding secret messages. The secret message is embedded in the QR Code. The QR Code carries a secret message, which is created by a GNU Privacy Guard (GPG), which is signed and encrypted by RSA keys.

 

 

Keywords

Access Control Lists, Solomon Four-group, Structured Approach, Task Complexity, Self-efficacy

 

 

References

Chung C.H., Chen W.Y., and Tu C.M. (2009). Image Hidden Technique Using QR-Barcode. In the Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09). IEEE Computer Society, Washington, DC, USA, (p. 522-525=. doi=10.1109/IIH-MSP.2009.119 http://dx.doi.org/10.1109/IIH-MSP.2009.119

Gupta, V., and Barve, A. (2014, Aug). Robust and Secured Image Watermarking using DWT and Encryption with QR Codes. In the International Journal of Computer Applications (IJCA), Vol.100, No.14, (p. 33-37). doi: 10.5120/17596-8391

Lin, N., Shen, J., Guo, X., and Zhou, J. (2011, May). A robust image watermarking based on DWT-QR decomposition. At the International Conference on Communication Software and Networks (ICCSN) 2011, 3rd, (p. 684-688). doi: 10.1109/ICCSN.2011.6014360

Islam, M.W., and Alzahir, S. (2013, Jan). A novel QR code guided image stenographic technique. At the IEEE International Conference on Consumer Electronics (ICCE), 2013, (p. 586-587). doi: 10.1109/ICCE.2013.6487028

Mayer, G. (2009). Image Repository. Retrieved 06.04.2015, from Fractal Coding and Analysis Group, University of Waterloo, Canada: http://links.uwaterloo.ca/Repository.html

Omerasevic, D., Behlilovic N., and Mrdovic, S. (2013, Jul). CryptoStego - A novel approach for creating cryptographic keys and messages. At the International Conference on Systems, Signals and Image Processing (IWSSIP), 2013 2oth (p. 83-86). doi: 10.1109/IWSSIP.2013.6623455

Omerasevic, D., Behlilovic, N., Mrdovic, S., and Sarajlic, A. (2013, Nov). Comparing randomness on various video and Audio Media File types. At the Telecommunications forum (TELFOR), 2013 21st (p. 381-384). doi: 10.1109/TELFOR.2013.6716249

Omerasevic, D., Behlilovic N., and Mrdovic, S. (2014, Sep). An implementation of secure key exchange by using QR codes. In ELMAR (ELMAR), 2014 56th (p. 1-4). doi: 10.1109/ELMAR.2014.6923341

Omerasevic, D., Behlilovic N., and Mrdovic, S. (2014, Nov). Secure message exchange protocol for Smart Grids. In Telecommunications forum (TELFOR), 2014 22nd (p. 158-161). doi: 10.1109/TELFOR.2014.7034379