Two-dimensional barcode information hiding algorithm based on reed-solomon codes

被引:0
作者
机构
[1] College of Information Science and Engineering, Hunan University, Changsha
[2] College of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha
来源
Luo, Gang | 1600年 / Binary Information Press卷 / 10期
基金
中国国家自然科学基金;
关键词
Information hiding; Information security; Reed-solomon codes; Two-dimensional barcode;
D O I
10.12733/jcis12146
中图分类号
学科分类号
摘要
Two-dimensional barcode (2D code) is a graphic symbol used to record data. Since it is easy to be used, the 2D code is widely applied in mobile applications, such as E-Business and payment on mobile phone. In this paper, we propose a 2D code information hiding algorithm based on Reed-Solomon codes. This algorithm utilizes the redundancy generated by Reed-Solomon codes to embed secret information into the 2D code. Thus the 2D code with hiding information can be normally decoded without being suspected. What's more, a series of theoretical analysis and experimental results have shown that the proposed algorithm has good imperceptibility, robustness and high embedding capacity. 1553-9105/Copyright © 2014 Binary Information Press
引用
收藏
页码:8983 / 8990
页数:7
相关论文
共 10 条
  • [1] Luo W., Huang J., Edge adaptive image steganography based on LSB matching revisited, IEEE Transactions on Information Forensics and Security, 5, 2, pp. 201-214, (2010)
  • [2] Sabeti V., Samavi S., Shirani S., An adaptive LSB matching steganography based on octonary complexity measure, Multimedia Tools and Applications, 64, 3, pp. 777-793, (2013)
  • [3] Yang C., Weng C., Wang S., Et al., Adaptive data hiding in edge areas of images with spatial LSB domain systems, IEEE Transactions on Information Forensics and Security, 3, 3, pp. 488-497, (2008)
  • [4] Mielikainen J., LSB matching revisited, IEEE Signal Processing Letters, 13, 5, pp. 285-287, (2006)
  • [5] Luo W., Huang F., Huang J., A more secure steganography based on adaptive pixel-value differencing scheme, Multimedia Tools and Applications, 52, 2-3, pp. 407-430, (2011)
  • [6] Wu D., Tsai W., A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, 24, 9, pp. 1613-1626, (2003)
  • [7] Westfeld A., F5 a steganographic algorithm, Information Hiding, pp. 289-302, (2001)
  • [8] Tang M., A steganalysis of information hiding for F5, Journal of Computational Information Systems, 6, 1, pp. 55-62, (2010)
  • [9] Fridrich J., Goljan M., Hogea D., Attacking the outguess, Proceedings of the ACM Workshop on Multimedia and Security, (2002)
  • [10] Sklar B., Reed Solomon Codes