CFP last date
20 December 2024
Reseach Article

An Efficient Technique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive

by Muthaiah. R M, Krishnamoorthy. N
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 14
Year of Publication: 2014
Authors: Muthaiah. R M, Krishnamoorthy. N
10.5120/17590-8173

Muthaiah. R M, Krishnamoorthy. N . An Efficient Technique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive. International Journal of Computer Applications. 100, 14 ( August 2014), 1-5. DOI=10.5120/17590-8173

@article{ 10.5120/17590-8173,
author = { Muthaiah. R M, Krishnamoorthy. N },
title = { An Efficient Technique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 14 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number14/17590-8173/ },
doi = { 10.5120/17590-8173 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:29:55.540091+05:30
%A Muthaiah. R M
%A Krishnamoorthy. N
%T An Efficient Technique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 14
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A highly efficient technique for hiding data behind images or any other digital media and to make them more secure from the intruders is proposed. There are concepts like digital watermarking, image steganography [3], fingerprinting that are intended for the same purpose but with slight variations. In this context, cryptography can also be used to ensure security of data but the difference between the former ones and the latter, to be told in a nut shell, is the concept of steganography [9] keenly focuses on keeping the existence of a message secret whereas the cryptographic techniques revolves around keeping the contents of the message secret and safe from the intruder. There are security threats when the above said techniques are used individually to protect and keep information secret. Hence we propose a technique where we hide the data behind any digital media, here behind an image and to have its existence secretive, we put the image with hidden data into a QR code and use a powerful encryption algorithm.

References
  1. J. Fridrich, Multimedia Security Technologies for Digital Rights Management. Academic Press, 2006, ch. Steganalysis, pp. 349–381.
  2. J. Fridrich, R. Du, and M. Long, "Steganalysis of LSB encoding in color images," in Proceedings of the IEEE International Conference on Multimedia and Expo. New York, USA: IEEE Computer Society Press, 2000.
  3. Arvind Kumar, Km. Pooja, "Steganography- A Data Hiding Technique" International Journal of Computer Applications ISSN 0975 – 8887, Volume 9– No. 7, November 2010
  4. Q. Li and E. Chang. On the possibility of non-invertible watermark schemes. In Proc. of IHW'04, Lecture Notes in Computer Science, volume 3200, Springer-Verlag, 2004.
  5. Cox I. J. , Miller M. L. et al. , Digital watermarking and steganography, Morgan Kaufmann Publishers (2008).
  6. ZuneraJalil, M. ArfanJaffar, and Anwar M. Mirza, "A Novel Text Watermarking Algorithm Using Image Watermark", International Journal of Innovative Computing, Information and Control (IJICIC) (indexed by ISI with Impact Factor 2. 93) (Scheduled to be published in February, 2011)
  7. Dr. Martin Kutter and Dr. Frederic Jordan, "Digital Watermarking Technology", in AlpVision, Switzerland, pp 1 – 4.
  8. Harpuneet Kaur, R. S. Salaria, "Robust Image Watermarking Technique to Increase Security and Capacity of Watermark Data", The IASTED International Conference on Communication, Network, and Information Security (CNIS–2006), MIT, Cambridge, Massachusetts, USA, Oct 9–11, 2006. (Communicated)
  9. Moerland, T. , "Steganography and Steganalysis", Leiden Institute of Advanced Computing Science.
  10. Wang, H & Wang, S, "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM, 47:10, October 2004
  11. Provos, N. & Honeyman, P. , "Hide and Seek: An introduction to steganography", IEEE Security and Privacy Journal, 2003
  12. Venkatraman, S. , Abraham, A. & Paprzycki, M. , "Significance of Steganography on Data Security", Proceedings of the International Conference on Information Technology: Coding and Computing, 2004
  13. QR Code, Available at: www. qrcode. com
  14. QR-Code Generator, http://qrcode. kaywa. com/, 2010.
  15. International Standard. ISO/IEC 18004. Information technology --Automatic identification and data capture techniques -- QR Code 2005 bar code symbology specification. Second Edition. 2006-09-01.
  16. GB/T 18284-2000 "Quick Response Code",Beijing, National Standards Press, 2000
  17. W. Stallings. , "Cryptography and Network Security: Principles and Practice," Prentice-Hall, New Jersey, 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography data hiding steganography water marking QR codes.