Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction |
Huang, Peng-Cheng
(Xiamen University of Technology, Department of Computer Science)
Li, Yung-Hui (National Central University, Department of Computer Science and Information Engineering) Chang, Chin-Chen (Feng Chia University, Department of Information Engineering and Computer Science) Liu, Yanjun (Feng Chia University, Department of Information Engineering and Computer Science) |
1 | P.-Y. Lin, and Y.-H. Chen, "QR Code Steganography with Secret Payload Enhancement," in Proc. of 2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 1-5, Jul. 2016, Seattle, USA. |
2 | X. Zhang, and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, Vol. 10, No. 11, pp. 781-783, 2006. DOI |
3 | P.-Y. Lin, and Y.-H. Chen, "High Payload Secret Hiding Technology for QR Codes," EURASIP Journal on Image and Video Processing, Vol. 2017, No. 1, pp. 14, 2017. DOI |
4 | S.-Y. Shen, and L.-H. Huang, "A Data Hiding Scheme Using Pixel Value Differencing and Improving Exploiting Modification Directions," Computers & Security, Vol. 48, pp. 131-141, 2015. DOI |
5 | X.-T. Wang, C.-C. Chang, C.-C. Lin, and M.-C. Li, "A Novel Multi-Group Exploiting Modification Direction Method Based on Switch Map," Signal Processing, Vol. 92, No. 6, pp. 1525-1535, 2012. DOI |
6 | Denso Wave Inc. "QR Code Standardization," 2003. |
7 | J. Z. Gao, L. Prakash, and R. Jagatesan, "Understanding 2d-Barcode Technology and Applications in M-Commerce-Design and Implementation of a 2d Barcode Processing Solution," in Proc. of Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, Vol. 2, pp. 49-56, Aug. 2007. |
8 | I. Tkachenko, W. Puech, C. Destruel, O. Strauss, J.-M. Gaudin, and C. Guichard, "Two-Level QR Code for Private Message Sharing and Document Authentication," IEEE Transactions on Information Forensics and Security, Vol. 11, No. 3, pp. 571-583, 2016. DOI |
9 | L. Bi, Z. Feng, M. Liu, and W. Wang, "Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code," in Proc. of Electronic Commerce and Security, 2008 International Symposium on, pp. 527-530, 2008. |
10 | N. Teraura, and K. Sakurai, "Information Hiding in Subcells of a Two-Dimensional Code," in Proc. of 2012 IEEE 1st Global Conference on Consumer Electronics (GCCE), pp. 652-656, Oct. 2012. |
11 | I. S. Reed, and G. Solomon, "Polynomial Codes over Certain Finite Fields," Journal of the Society for Industrial and Applied Mathematics, Vol. 8, No. 2, pp. 300-304, 1960. DOI |
12 | Y.-J. Chiang, P.-Y. Lin, R.-Z. Wang, and Y.-H. Chen, "Blind QR Code Steganographic Approach Based Upon Error Correction Capability," KSII Transactions on Internet & Information Systems, Vol. 7, No. 10, pp. 2572-2543, 2013. |
13 | J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on Wet Paper," IEEE Transactions on signal processing, Vol. 53, No. 10, pp. 3923-3935, 2005. DOI |
14 | T. V. Bui, N. K. Vu, T. T. Nguyen, I. Echizen, and T. D. Nguyen, "Robust Message Hiding for Qr Code," in Proc. of 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520-523, Aug. 2014. |
15 | P. Elias, "Error-Correcting Codes for List Decoding," IEEE Transactions on Information Theory, Vol. 37, No. 1, pp. 5-12, 1991. DOI |