Image Processing

Nested image steganography scheme using QR-barcode technique

[+] Author Affiliations
Wen-Yuan Chen

National Chin-Yi University of Technology, Department of Electronic Engineering, 35 Lane 215, Section 1, Chung-Shan Road, Taiping City, Taichung County 411 Taiwain

Jing-Wein Wang

National Kaohsiung University of Applied Sciences,Institute of Photonics and Communications, 415 Chien Kung Road, Kaohsiung 807 Taiwan

Opt. Eng. 48(5), 057004 (May 06, 2009). doi:10.1117/1.3126646
History: Received December 18, 2008; Revised March 05, 2009; Accepted March 18, 2009; Published May 06, 2009
Text Size: A A A

In this paper, QR bar code and image processing techniques are used to construct a nested steganography scheme. There are two types of secret data (lossless and lossy) embedded into a cover image. The lossless data is text that is first encoded by the QR barcode; its data does not have any distortion when comparing with the extracted data and original data. The lossy data is a kind of image; the face image is suitable for our case. Because the extracted text is lossless, the error correction rate of QR encoding must be carefully designed. We found a 25% error correction rate is suitable for our goal. In image embedding, because it can sustain minor perceptible distortion, we thus adopted the lower nibble byte discard of the face image to reduce the secret data. When the image is extracted, we use a median filter to filter out the noise and obtain a smoother image quality. After simulation, it is evident that our scheme is robust to JPEG attacks. Compared to other steganography schemes, our proposed method has three advantages: (i) the nested scheme is an enhanced security system never previously developed; (ii) our scheme can conceal lossless and lossy secret data into a cover image simultaneously; and (iii) the QR barcode used as secret data can widely extend this method’s application fields.

© 2009 Society of Photo-Optical Instrumentation Engineers

Citation

Wen-Yuan Chen and Jing-Wein Wang
"Nested image steganography scheme using QR-barcode technique", Opt. Eng. 48(5), 057004 (May 06, 2009). ; http://dx.doi.org/10.1117/1.3126646


Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.