Open Access

The Influence of Steganographic Methods and QR Code Resolutions on Data Hiding in Cover Images


Cite

RERHMAN, A. – SABA, T. – MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – ANJUM, A.: Data hiding technique in steganography for information security using number theory, in J. of Information Science, Saudi Arabia, 2018. Search in Google Scholar

MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – SABA, T.: A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform, in J. of Vis. Commun. and Image Represent., Pakistan, 2018. Search in Google Scholar

JOHNSON, N. F. – JAJODIA, S.: Exploring steganography: Seeing the unseen, Computer, vol. 31(2), pp. 26–34, 1998. Search in Google Scholar

BHAYA, W. S. – HABBAL, A.: A comprehensive survey on steganography and steganalysis techniques and tools, in Int. J. of Computer Science and Information Security, vol. 14(5), pp. 287, 2016. Search in Google Scholar

ZAIDOON, K. H. – ABID, H. S. – ZAIDAN, B. B.: A review on intelligent procestwo concealment approaches: Steganography and cryptography, in Int. J. of Pure and Applied Mathematics, vol. 117(22), pp. 473–485, 2017. Search in Google Scholar

WANG, R. Z., – WANG, S. J.: Image hiding by optimal LSB substitution and genetic algorithm, in Pattern Recognition, vol. 37(3), pp. 469–480, 2004. Search in Google Scholar

CHEN, W. C. – HSU, C. F.: A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique, in IEEE Transactions on Information Forensics and Security, vol. 3(1), pp. 24–30, 2008. Search in Google Scholar

TORKAMAN, M. R. N. – KAZAZI, N. S. – ROUDDINI, A.: Innovative Approach to Improve Hybrid Cryptography by Using DNA Steganography, in Int. J. on New Computer Architectures and Their Applications, Malaysia, 2012. Search in Google Scholar

WESTFELD, A. – PFITZMANN, B.: Attacks on steganographic systems, in Int. Workshop on Information Hiding, pp. 61–76, Springer, 1999. Search in Google Scholar

PROVOS, N. – HONEYMAN, P.: Hide and seek: An introduction to steganography, in IEEE Security & Privacy, vol. 1(3), pp. 32–44, 2003. Search in Google Scholar

LI, B. – HE, J. – HUANG, J. – SHI, Y. Q.: A survey on image steganography and steganalysis, in J. of Information Hiding and Multimedia Signal Processing, 2(2), 142–172, 2008. Search in Google Scholar

KODOVSKÝ, J. – FRIDRICH, J. – HOLUB, V.: Ensemble classifiers for steganalysis of digital media, in IEEE Transactions on Information Forensics and Security, vol. 7(2), pp. 432–444, 2012. Search in Google Scholar

FRIDRICH, J. – KODOVSKÝ, J.: Rich models for steganalysis of digital images, in IEEE Transactions on Information Forensics and Security, vol. 7(3), pp. 868–882, 2012. Search in Google Scholar

MORKEL, T. – ELOFF, J.H.P. – OLIVIER, M.S.: An Overview of Image Steganography, in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA 2005), Sandton, South Africa, 2005. Search in Google Scholar

CHEDDAD, A. – CONDELL, J. – CURRAN, K. – MC KEVITT, P.: Digital image steganography: Survey and analysis of current methods, in Signal Processing, vol. 90(3), pp. 727–752, 2010. Search in Google Scholar

WU, W. – LIN, Z. – WONG, W.: Application of QR-Code Steganography Using Data Embedding Technique, in Information Technology Convergence, pp. 597–605, 2013, DOI: 10.1007/978-94-007-6996-0_63. Search in Google Scholar

MAHESWARI, S. – HEMANTH, D.: Frequency domain QR code based image steganography using Fresnelet transform, in Int. J. of Electronics and Communications, vol. 69(2), pp. 539–544, 2015, DOI: 10.1016/j.aeue.2014.11.004. Search in Google Scholar

HAJDUK, V. – BRODA, M. – KOVÁČ, O. – LEVICKÝ, D.: Image steganography with using QR code and cryptography, in Int. Conf. Radioelektronika, pp. 4, 2016, DOI: 10.1109/RADIOELEK.2016.7477370. Search in Google Scholar

eISSN:
1338-3957
Language:
English