Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Hiding Secret Text in Quick Response Code and Transforming the Position of the Secret Data using Rotation Transformation

V. Ramya and G. Gopinath
School of Computer Science, Engineering and Applications, Bharathidasan University, Tiruchirappalli, Tamil Nadu, 620023, India
Research Journal of Applied Sciences, Engineering and Technology  2014  19:4124-4129
http://dx.doi.org/10.19026/rjaset.7.776  |  © The Author(s) 2014
Received: December 14, 2013  |  Accepted: January 01, 2014  |  Published: May 15, 2014

Abstract

In order to provide high security and safety in the field of information hiding, this study proposes a novel technology using Steganography. An exotic steganographic algorithm, is used in this study, which Hides the secret text data in a 2D plane (Here, in our case let the 2D plane be the QR code), after encryption and the position of the secret data will be changed using rotation transformation. The proposed algorithm has been tested under various imperceptibility characters such as PSNR, MSE, Human Vision Quality Metrics and Histograms are compared to both cover image and the stego image. This novel algorithm shows Lower MSE, higher PSNR values and it is evident that the proposed algorithm is robust to JPEG attacks.

Keywords:

Cryptography, information hiding, quick response codes, steganography, transformation,


References

  1. Arash, H.L., A.M. Azizah and M.D. Salwani, 2011. A Survey on Image Steganography Algorithms and Evaluation. In: Snasel, V., J. Platos and E. El-Qawasmeh (Eds.), ICDIPC, 2011, Part I. CCIS 188, Springer-Verlag, Berlin, Heidelbfrg, pp: 406-418.
    PMid:21771420    
  2. Chin-Ho, C., C. Wen-Yuan and T. Ching-Ming, 2009. Image hidden technique using QR-barcode. Proceeding of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp: 522-525.
  3. Holan, S., L. Shijian and L.L.L. Chew, 2011. Combination of document image binarization techniques. Proceeding of the International Conference on Document Analysis and Recognition, pp: 22-26.
  4. Islam, M.D. and S. Zahir, 2013. A novel QR code guided image stenographic technique. Proceeding of the IEEE International Conference on Consumer Electronics (ICCE), pp: 586-587.
    CrossRef    
  5. Jiejing, Z., L. Yunfei and L. Peng, 2010. Research on Binarization of QR code image. Proceeding of the International Conference on Multimedia Technology (ICMT), pp: 1-4.
  6. Liao, Z.L., T.L. Huang, R. Wang and X.Y. Zhou, 2010. A method of image analysis for QR code recognition. Proceeding of the International Conference on Intelligent Computing and Integrated Systems (ICISS, 2010), pp: 250-253.
    CrossRef    
  7. Peter, K., L. Manuel, M. Martin, M. Lindsay, S. Sebastian, S. Mayank and W. Edgar, 2010. QR code security. TwUC, 1040: 8-10.
  8. Spaulding, J. and H. Noda, Kyushu Inst. of Technol., Kitakyushu, M.N.J. Shirazi, 2002. Application of bit-plane decomposition steganography to wavelet encoded images Image Processing. Proceedings International Conference on image processing Volume 2.
  9. Su, J. and H. Niu, 2010. Design and realization of an improved information hiding algorithm. Proceeding of the 2nd International Conference on Computer and Automation Engineering (ICCAE), 3: 177-179.
    PMCid:PMC2817905    
  10. Vavilis, S. and K. Ergina, 2011. A tool for tuning binarization techniques. Proceeding of the International Conference on Document Analysis and Recognition, pp: 1-5.
  11. Wang, N.W., T. Chwei-Shyong, H. Min-Shiang, 2005. A high quality steganographic method with pixel-value differencing and modulus function Journal of Systems and Software, 81(1): 150-158.
    CrossRef    
  12. Zou, X., C.L. He and Z.J. Liang, 2010. A binarization method of quick response code image. Proceeding of the 2nd International Conference on Signal Processing Systems (ICSPS, 2010), 3: 317-320.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved