Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

An Efficient Technique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 100 - Number 14
Year of Publication: 2014
Authors:
Muthaiah. R M
Krishnamoorthy. N
10.5120/17590-8173

Muthaiah. R M and Krishnamoorthy. N. Article: An Efficient Technique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive. International Journal of Computer Applications 100(14):1-5, August 2014. Full text available. BibTeX

@article{key:article,
	author = {Muthaiah. R M and Krishnamoorthy. N},
	title = {Article: An Efficient Technique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {100},
	number = {14},
	pages = {1-5},
	month = {August},
	note = {Full text available}
}

Abstract

A highly efficient technique for hiding data behind images or any other digital media and to make them more secure from the intruders is proposed. There are concepts like digital watermarking, image steganography [3], fingerprinting that are intended for the same purpose but with slight variations. In this context, cryptography can also be used to ensure security of data but the difference between the former ones and the latter, to be told in a nut shell, is the concept of steganography [9] keenly focuses on keeping the existence of a message secret whereas the cryptographic techniques revolves around keeping the contents of the message secret and safe from the intruder. There are security threats when the above said techniques are used individually to protect and keep information secret. Hence we propose a technique where we hide the data behind any digital media, here behind an image and to have its existence secretive, we put the image with hidden data into a QR code and use a powerful encryption algorithm.

References

  • J. Fridrich, Multimedia Security Technologies for Digital Rights Management. Academic Press, 2006, ch. Steganalysis, pp. 349–381.
  • J. Fridrich, R. Du, and M. Long, "Steganalysis of LSB encoding in color images," in Proceedings of the IEEE International Conference on Multimedia and Expo. New York, USA: IEEE Computer Society Press, 2000.
  • Arvind Kumar, Km. Pooja, "Steganography- A Data Hiding Technique" International Journal of Computer Applications ISSN 0975 – 8887, Volume 9– No. 7, November 2010
  • Q. Li and E. Chang. On the possibility of non-invertible watermark schemes. In Proc. of IHW'04, Lecture Notes in Computer Science, volume 3200, Springer-Verlag, 2004.
  • Cox I. J. , Miller M. L. et al. , Digital watermarking and steganography, Morgan Kaufmann Publishers (2008).
  • ZuneraJalil, M. ArfanJaffar, and Anwar M. Mirza, "A Novel Text Watermarking Algorithm Using Image Watermark", International Journal of Innovative Computing, Information and Control (IJICIC) (indexed by ISI with Impact Factor 2. 93) (Scheduled to be published in February, 2011)
  • Dr. Martin Kutter and Dr. Frederic Jordan, "Digital Watermarking Technology", in AlpVision, Switzerland, pp 1 – 4.
  • Harpuneet Kaur, R. S. Salaria, "Robust Image Watermarking Technique to Increase Security and Capacity of Watermark Data", The IASTED International Conference on Communication, Network, and Information Security (CNIS–2006), MIT, Cambridge, Massachusetts, USA, Oct 9–11, 2006. (Communicated)
  • Moerland, T. , "Steganography and Steganalysis", Leiden Institute of Advanced Computing Science.
  • Wang, H & Wang, S, "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM, 47:10, October 2004
  • Provos, N. & Honeyman, P. , "Hide and Seek: An introduction to steganography", IEEE Security and Privacy Journal, 2003
  • Venkatraman, S. , Abraham, A. & Paprzycki, M. , "Significance of Steganography on Data Security", Proceedings of the International Conference on Information Technology: Coding and Computing, 2004
  • QR Code, Available at: www. qrcode. com
  • QR-Code Generator, http://qrcode. kaywa. com/, 2010.
  • International Standard. ISO/IEC 18004. Information technology --Automatic identification and data capture techniques -- QR Code 2005 bar code symbology specification. Second Edition. 2006-09-01.
  • GB/T 18284-2000 "Quick Response Code",Beijing, National Standards Press, 2000
  • W. Stallings. , "Cryptography and Network Security: Principles and Practice," Prentice-Hall, New Jersey, 1999.