The Influence of Steganographic Methods and QR Code Resolutions on Data Hiding in Cover Images

Author:

Andrejčík Samuel1,Ovseník Ľuboš1,Oravec Jakub1

Affiliation:

1. Department of Electronics and Multimedia Telecommunication, Faculty of Electrical Engineering and Informatics , Technical University of Košice , Letná 9 , Košice , Slovak Republic , Tel. +421 55 602 4277

Abstract

Abstract This work deals with digital image processing using the steganography technique in real life. Various steganography techniques face data authentication, data security, and copyright issues. Due to the fact that the problem of data security is currently very topical, these techniques are often sought after. This is related to the constant development of new algorithms that provide solutions that will safely hide the secret message in the image and at the same time will be resistant to various types of attacks. The motivation for writing this work lies in the technique of representing a secret message using a Quick Response code. Later in this work is comparison between our results and results of approach made by scientific community, which works with data hiding within steganographic principles. The secret message is written in the least significant bit plane of the cover image, which ensures that the modification of the image cannot be detected by the naked eye. The proposed solution is evaluated by mathematical quality assessment parameters Peak signal-to-noise ratio, Mean squared error, Normalized cross-correlation and Structural similarity index.

Publisher

Walter de Gruyter GmbH

Reference18 articles.

1. RERHMAN, A. – SABA, T. – MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – ANJUM, A.: Data hiding technique in steganography for information security using number theory, in J. of Information Science, Saudi Arabia, 2018.

2. MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – SABA, T.: A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform, in J. of Vis. Commun. and Image Represent., Pakistan, 2018.

3. JOHNSON, N. F. – JAJODIA, S.: Exploring steganography: Seeing the unseen, Computer, vol. 31(2), pp. 26–34, 1998.

4. BHAYA, W. S. – HABBAL, A.: A comprehensive survey on steganography and steganalysis techniques and tools, in Int. J. of Computer Science and Information Security, vol. 14(5), pp. 287, 2016.

5. ZAIDOON, K. H. – ABID, H. S. – ZAIDAN, B. B.: A review on intelligent procestwo concealment approaches: Steganography and cryptography, in Int. J. of Pure and Applied Mathematics, vol. 117(22), pp. 473–485, 2017.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Resistance to attack on the covering medium using various steganographic techniques;2024 34th International Conference Radioelektronika (RADIOELEKTRONIKA);2024-04-17

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3