Image Processing

Nested image steganography scheme using QR-barcode technique

[+] Author Affiliations
Wen-Yuan Chen

National Chin-Yi University of Technology, Department of Electronic Engineering, 35 Lane 215, Section 1, Chung-Shan Road, Taiping City, Taichung County 411 Taiwain

Jing-Wein Wang

National Kaohsiung University of Applied Sciences,Institute of Photonics and Communications, 415 Chien Kung Road, Kaohsiung 807 Taiwan

Opt. Eng. 48(5), 057004 (May 06, 2009). doi:10.1117/1.3126646
History: Received December 18, 2008; Revised March 05, 2009; Accepted March 18, 2009; Published May 06, 2009
Text Size: A A A

In this paper, QR bar code and image processing techniques are used to construct a nested steganography scheme. There are two types of secret data (lossless and lossy) embedded into a cover image. The lossless data is text that is first encoded by the QR barcode; its data does not have any distortion when comparing with the extracted data and original data. The lossy data is a kind of image; the face image is suitable for our case. Because the extracted text is lossless, the error correction rate of QR encoding must be carefully designed. We found a 25% error correction rate is suitable for our goal. In image embedding, because it can sustain minor perceptible distortion, we thus adopted the lower nibble byte discard of the face image to reduce the secret data. When the image is extracted, we use a median filter to filter out the noise and obtain a smoother image quality. After simulation, it is evident that our scheme is robust to JPEG attacks. Compared to other steganography schemes, our proposed method has three advantages: (i) the nested scheme is an enhanced security system never previously developed; (ii) our scheme can conceal lossless and lossy secret data into a cover image simultaneously; and (iii) the QR barcode used as secret data can widely extend this method’s application fields.

© 2009 Society of Photo-Optical Instrumentation Engineers


Wen-Yuan Chen and Jing-Wein Wang
"Nested image steganography scheme using QR-barcode technique", Opt. Eng. 48(5), 057004 (May 06, 2009). ; http://dx.doi.org/10.1117/1.3126646

Access This Article
Sign In to Access Full Content
Please Wait... Processing your request... Please Wait.
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Your Session has timed out. Please sign back in to continue.
Sign In to Access Full Content

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections


Buy this article ($18 for members, $25 for non-members).
Sign In