2020
DOI: 10.1109/access.2020.2971984
|View full text |Cite
|
Sign up to set email alerts
|

Steganography of Encrypted Messages Inside Valid QR Codes

Abstract: Steganography is considered the first line of defense in information security as it hides a secret message (payload) inside an innocent looking file (container) to transfer the payload under the adversary's nose without noticing it. Steganographic systems only use the container to hide the payload. In this paper, we present a steganographic system that uses the container not only to hide the payload, but also to give misleading information to the adversary. To achieve this goal, we use quick response (QR) code… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 21 publications
0
12
0
2
Order By: Relevance
“…To ensure and confirm the superiority of the proposed optoaudio cryptosystem using XORing mask, LASM, and Hartley transform (HT), it is compared with the recent state-of-the-art methods [22,40,41,42] in terms of various metrics like SD, correlation coefficient, NPCR, and UACI. The comparison study between the proposed opto-audio cryptosystem and the related state-of-the-art methods [20,38,39,40] are employed on the Female-Male audio. Table VIVI shows the results of comparison between the proposed opto-audio cryptosystem and the related state-ofthe-art methods [22,40,41,42] for Female-Male audio.…”
Section: Comparison Study Between the Proposed Opto-audio Cryptosystem And The Related State-of-theart Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…To ensure and confirm the superiority of the proposed optoaudio cryptosystem using XORing mask, LASM, and Hartley transform (HT), it is compared with the recent state-of-the-art methods [22,40,41,42] in terms of various metrics like SD, correlation coefficient, NPCR, and UACI. The comparison study between the proposed opto-audio cryptosystem and the related state-of-the-art methods [20,38,39,40] are employed on the Female-Male audio. Table VIVI shows the results of comparison between the proposed opto-audio cryptosystem and the related state-ofthe-art methods [22,40,41,42] for Female-Male audio.…”
Section: Comparison Study Between the Proposed Opto-audio Cryptosystem And The Related State-of-theart Methodsmentioning
confidence: 99%
“…If G1(x,y) = G2(x,y), then T(x,y) = 1; Alternatively, T(x,y) = 0. The NPCR can be calculated as [37][38][39]:…”
Section: A3 Plainaudio Sensitivity Testsmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the above observations, there is a considerable lack of research on protecting the confidential information of QR codes. Anyone can easily scan and retrieve QR data content through barcode readers [ 16 , 17 , 18 , 19 ]; therefore, the protection of private data is critical. Traditional image hiding or watermarking techniques require additional image processing processes/computers that are not suitable for real-time scanning and direct retrieval of QR codes by barcode readers.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, certain technique has been introduced to hide encrypted data using EK-EQR algorithm [43] to improve traceability system [44]. There is also necessity in the further improvement for QR code to protect information with steganography or cryptography in order to guard the knowledge against the attackers [45], which consider the error correction levels up to 30% [46] to the linkage of multimedia data [47], [48]. Interestingly, mobile computing present a great way to easily apply attendance systems [49] to large and complex battlefield interconnection systems [50], allowing QR codes to work and communicate with users anytime, anywhere and on any device.…”
mentioning
confidence: 99%