Abstract
With the wide application of quick response (QR) codes, its security has been paid more and more attention. There are many steganography schemes to embed the secret message into QR codes, which can be used in terrorist activities, spread viruses, etc. However, there is currently no effective scheme for detecting stego QR code. This paper divides the spatial QR code-based steganography schemes into three categories and then proposes a steganalysis method for QR codes. The method includes detecting stegao codes and recovering pure QR codes, which is realized by the code regeneration, module comparison, and embedded information filtering operations. Our method can perfectly distinguish the stego code and block the transmission of embedded information for the spatial QR code-based steganography schemes. Theoretical analysis and experiments show that the proposed method is feasible, universal, and robust.
Supported by the Program of the National University of Defense Technology and the National Natural Science Foundation of China (Number: 61602491).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
JTC1/SC, I.: Information technology - automatic identification and data capture techniques - QR code 2005 bar code symbology specification (2006)
Arntz, P.: QR code scams are making a comeback (2020). https://blog.malwarebytes.com/scams/2020/10/qr-code-scams-are-making-a-comeback/
Shi, Y.Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016). https://doi.org/10.1109/ACCESS.2016.2573308
Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. Inf. Forensics Secur. IEEE Trans. 8, 553–562 (2013). https://doi.org/10.1109/TIFS.2013.2248725
Yan, X., Lu, Y., Yang, C.N., Zhang, X., Wang, S.: A common method of share authentication in image secret sharing. IEEE Trans. Circ. Syst. Video Technol. 31, 2896–2908 (2020)
Yan, X., Lu, Y., Liu, L., Song, X.: Reversible image secret sharing. IEEE Trans. Inf. Forensics Secur. 15, 3848–3858 (2020). https://doi.org/10.1109/TIFS.2020.3001735
Mohamed Amin, M., Salleh, M., Ibrahim, S., Katmin, M.: Stenography: random LSB insertion using discrete logarithm, pp. 234–238 (2003)
Tkachenko, I., Puech, W., Destruel, C., Strauss, O., Gaudin, J.M., Guichard, C.: Two-level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11, 1 (2016). https://doi.org/10.1109/TIFS.2015.2506546
Chou, G.J., Wang, R.Z.: The nested QR code. IEEE Sig. Process. Lett. 27, 1230–1234 (2020). https://doi.org/10.1109/LSP.2020.3006375
Cheng, Y., Fu, Z., Yu, B., Shen, G.: A new two-level QR code with visual cryptography scheme. Multimedia Tools Appl. 77(16), 20629–20649 (2018). https://doi.org/10.1007/s11042-017-5465-4
Baharav, Z., Kakarala, R.: Visually significant QR codes: image blending and statistical analysis, pp. 1–6 (2013). https://doi.org/10.1109/ICME.2013.6607571
Chiang, Y.J., Lin, P.Y., Wang, R.Z., Chen, Y.H.: Blind QR code steganographic approach based upon error correction capability. KSII Trans. Internet Inf. Syst. 7, 2527–2543 (2013). https://doi.org/10.3837/tiis.2013.10.012
Bui, T., Vu, N., Nguyen, T., Echizen, I., Nguyen, T.: Robust message hiding for QR code, pp. 520–523 (2014). https://doi.org/10.1109/IIH-MSP.2014.135
Huang, P.C., Li, Y.H., Chang, C.C., Liu, Y.: Efficient scheme for secret hiding in QR code by improving exploiting modification direction. KSII Trans. Internet Inf. Syst. 12(5), 2348–2365 (2018)
Lin, P.Y., Chen, Y.H.: High payload secret hiding technology for QR codes. EURASIP J. Image Video Process. 2017(1), 1–8 (2017)
Wan, S., Lu, Y., Yan, X., Ding, W., Liu, H.: High capacity embedding methods of QR code error correction, pp. 70–79 (2018). https://doi.org/10.1007/978-3-319-72998-5_8
Liu, S., Fu, Z., Yu, B.: A two-level QR code scheme based on polynomial secret sharing. Multimedia Tools Appl. 78, 21291–21308 (2019). https://doi.org/10.1007/s11042-019-7455-1
Tan, L., Lu, Y., Yan, X., Liu, L., Chen, J.: (2, 2) threshold robust visual secret sharing scheme for QR code based on pad codewords. In: Yang, C.-N., Peng, S.-L., Jain, L.C. (eds.) SICBS 2018. AISC, vol. 895, pp. 619–628. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16946-6_50
Luo, X., Liu, F., Lian, S., Yang, C., Gritzalis, S.: On the typical statistic features for image blind steganalysis. IEEE J. Sel. Areas Commun. 29, 1404–1422 (2011)
Li, F., Zhang, X.: Steganalysis for color images based on channel co-occurrence and selective ensemble. J. Image Graph. (2015)
Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE Trans. Image Process. 12(2), 221–229 (2003). https://doi.org/10.1109/TIP.2002.807363
Kodovsky, J., Pevný, T., Fridrich, J.: Modern steganalysis can detect YASS, vol. 7541, p. 754102 (2010). https://doi.org/10.1117/12.838768
Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012). https://doi.org/10.1109/TIFS.2012.2190402
Holub, V., Fridrich, J.: Low-complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015). https://doi.org/10.1109/TIFS.2014.2364918
Song, S.K., Gorla, N.: A genetic algorithm for vertical fragmentation and access path selection. Comput. J. 43(1), 81–93 (2000). https://doi.org/10.1093/comjnl/43.1.81
Liu, F., Yan, X., Lu, Y.: Feature selection for image steganalysis using binary bat algorithm. IEEE Access 8, 4244–4249 (2020). https://doi.org/10.1109/ACCESS.2019.2963084
Ni, J., Ye, J., YI, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12, 2545–2557 (2017). https://doi.org/10.1109/TIFS.2017.2710946
Yang, L., Cao, X., He, D., Wang, C., Wang, X., Zhang, W.: Modularity based community detection with deep learning (2016)
Wei, L., Gao, P., Jia, L., Liu, M.: Image steganalysis based on convolution neural network. Appl. Res. Comput. 1, 235–238 (2019)
Li, L., Zhang, W., Qin, C., Chen, K., Zhou, W., Yu, N.: Adversarial batch image steganography against CNN-based pooled steganalysis. Sign. Process. 181, 107920 (2021). https://doi.org/10.1016/j.sigpro.2020.107920
Chen, B., Li, H., Luo, W., Huang, J.: Image processing operations identification via convolutional neural network. Sci. Chin. (Inf. Sci.) 63(03), 275–281 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, J., Chen, K., Wang, Y., Yan, X., Li, L. (2023). A General Steganalysis Method of QR Codes. In: Goel, S., Gladyshev, P., Nikolay, A., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 508. Springer, Cham. https://doi.org/10.1007/978-3-031-36574-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-031-36574-4_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-36573-7
Online ISBN: 978-3-031-36574-4
eBook Packages: Computer ScienceComputer Science (R0)