Reversible Data Hiding using QR Codes for Android
نویسندگان
چکیده
منابع مشابه
High payload secret hiding technology for QR codes
Quick response (QR) code has become one of the more popular two-dimensional barcodes because of its greater data capacity and higher damage resistance. The barcode scanners can easily extract the information hidden in the QR code while scanning the data modules. However, some sensitive data directly stored in QR codes are insecure in real-world QR applications, such as the e-ticket and e-coupon...
متن کاملSteganalysis for Reversible Data Hiding
In recent years, several lossless data hiding techniques have been proposed for images. Lossless data embedding can take place in the spatial domain or in the transform domain. They utilized characteristics of the difference image or the transform coefficient histogram and modify these values slightly to embed the data. However, after embedding message bits these steganography changed the natur...
متن کاملLossless Image Recovery Using Reversible Data Hiding
Recently, more and more importance is given to reversible data hiding (RDH) technique in images, since it has the capability of recovering the original image which is used for embedding data, without loss protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the images, which may be subject to some errors on data extraction and/or image...
متن کاملReversible Data Hiding Scheme Using Toffoli Gate
In this paper, we propose a new reversible data hiding scheme without distortion of stego image. In the proposed scheme, Toffoli gate is used in embedding and extraction procedures. This gate provides a distortionless of stego image because it has a characteristic of self-inverse. In the experimental results, the embedding capacity and PSNR of the proposed technique are greater than the previou...
متن کاملLossless Data Hiding Technique using Reversible Function
The most of the previous lossless data hiding techniques are that secret data are embedded into cover image. So, the relationship between the embedding capacity and PSNR of these techniques is always an inverse proportion. In contrast, the embedded position information of secret data are embedded into a location map in the proposed technique in order to achieve thedirectly proportional relation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/17049-7120