Nested image steganography scheme using QR-barcode technique

被引:18
作者
Chen, Wen-Yuan [1 ]
Wang, Jing-Wein [2 ]
机构
[1] Natl Chin Yi Univ Technol, Dept Elect Engn, Taiping City, Taichung County, Taiwan
[2] Natl Kaohsiung Univ Appl Sci, Inst Photon & Commun, Kaohsiung 807, Taiwan
关键词
QR code; steganography; error correction; JPEG; image processing;
D O I
10.1117/1.3126646
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, QR bar code and image processing techniques are used to construct a nested steganography scheme. There are two types of secret data (lossless and lossy) embedded into a cover image. The lossless data is text that is first encoded by the QR barcode; its data does not have any distortion when comparing with the extracted data and original data. The lossy data is a kind of image; the face image is suitable for our case. Because the extracted text is lossless, the error correction rate of QR encoding must be carefully designed. We found a 25% error correction rate is suitable for our goal. In image embedding, because it can sustain minor perceptible distortion, we thus adopted the lower nibble byte discard of the face image to reduce the secret data. When the image is extracted, we use a median filter to filter out the noise and obtain a smoother image quality. After simulation, it is evident that our scheme is robust to JPEG attacks. Compared to other steganography schemes, our proposed method has three advantages: (i) the nested scheme is an enhanced security system never previously developed; (ii) our scheme can conceal lossless and lossy secret data into a cover image simultaneously; and (iii) the QR barcode used as secret data can widely extend this method's application fields. (C) 2009 Society of Photo-Optical Instrumentation Engineers. [DOI: 10.1117/1.3126646]
引用
收藏
页数:10
相关论文
共 16 条
[1]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[2]   Characterization of lead in soils of a rifle/pistol shooting range in central Florida, USA [J].
Chen, M ;
Daroub, SH ;
Ma, LQ ;
Harris, WG ;
Cao, XD .
SOIL & SEDIMENT CONTAMINATION, 2002, 11 (01) :1-17
[3]   Multiple-watermarking scheme for the European article-number bar code using adaptive phase-shift keying [J].
Chen, Wen-Yuan ;
Liu, Chen-Chung .
OPTICAL ENGINEERING, 2007, 46 (06)
[4]   A barcode shape descriptor for curve point cloud data [J].
Collins, A ;
Zomorodian, A ;
Carlsson, G ;
Guibas, LJ .
COMPUTERS & GRAPHICS-UK, 2004, 28 (06) :881-894
[5]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[6]  
Gao J. Z., 2007, P 31 ANN INT COMP SO, V2, P49
[7]   Reconstructing images of barcodes for construction site object recognition [J].
Gilsinn, DE ;
Cheok, GS ;
O'Leary, DP .
AUTOMATION IN CONSTRUCTION, 2004, 13 (01) :21-35
[8]  
LIU SF, 2004, THEORY APPL GREY SYS, P1
[9]  
LIU TY, 2007, COMP INF SCI IEEE AC, V6, P5
[10]   A wall-bounded turbulent mixing layer flow over an open step: I. Time-mean and spectral characteristics [J].
Liu, Ying Zheng ;
Ke, Feng ;
Chen, Han Ping ;
Sung, Hyung Jin .
JOURNAL OF TURBULENCE, 2006, 7 (65) :1-17