The Influence of Steganographic Methods and QR Code Resolutions on Data Hiding in Cover Images
Author:
Andrejčík Samuel1, Ovseník Ľuboš1, Oravec Jakub1
Affiliation:
1. Department of Electronics and Multimedia Telecommunication, Faculty of Electrical Engineering and Informatics , Technical University of Košice , Letná 9 , Košice , Slovak Republic , Tel. +421 55 602 4277
Abstract
Abstract
This work deals with digital image processing using the steganography technique in real life. Various steganography techniques face data authentication, data security, and copyright issues. Due to the fact that the problem of data security is currently very topical, these techniques are often sought after. This is related to the constant development of new algorithms that provide solutions that will safely hide the secret message in the image and at the same time will be resistant to various types of attacks. The motivation for writing this work lies in the technique of representing a secret message using a Quick Response code. Later in this work is comparison between our results and results of approach made by scientific community, which works with data hiding within steganographic principles. The secret message is written in the least significant bit plane of the cover image, which ensures that the modification of the image cannot be detected by the naked eye. The proposed solution is evaluated by mathematical quality assessment parameters Peak signal-to-noise ratio, Mean squared error, Normalized cross-correlation and Structural similarity index.
Publisher
Walter de Gruyter GmbH
Reference18 articles.
1. RERHMAN, A. – SABA, T. – MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – ANJUM, A.: Data hiding technique in steganography for information security using number theory, in J. of Information Science, Saudi Arabia, 2018. 2. MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – SABA, T.: A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform, in J. of Vis. Commun. and Image Represent., Pakistan, 2018. 3. JOHNSON, N. F. – JAJODIA, S.: Exploring steganography: Seeing the unseen, Computer, vol. 31(2), pp. 26–34, 1998. 4. BHAYA, W. S. – HABBAL, A.: A comprehensive survey on steganography and steganalysis techniques and tools, in Int. J. of Computer Science and Information Security, vol. 14(5), pp. 287, 2016. 5. ZAIDOON, K. H. – ABID, H. S. – ZAIDAN, B. B.: A review on intelligent procestwo concealment approaches: Steganography and cryptography, in Int. J. of Pure and Applied Mathematics, vol. 117(22), pp. 473–485, 2017.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Resistance to attack on the covering medium using various steganographic techniques;2024 34th International Conference Radioelektronika (RADIOELEKTRONIKA);2024-04-17
|
|