About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Digital Forensics and Cyber Crime. 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings

Research Article

A General Steganalysis Method of QR Codes

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-36574-4_28,
        author={Jia Chen and Kunlin Chen and Yongjie Wang and Xuehu Yan and Longlong Li},
        title={A General Steganalysis Method of QR Codes},
        proceedings={Digital Forensics and Cyber Crime. 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings},
        proceedings_a={ICDF2C},
        year={2023},
        month={7},
        keywords={QR codes Steganography Steganalysis Code regeneration Protection},
        doi={10.1007/978-3-031-36574-4_28}
    }
    
  • Jia Chen
    Kunlin Chen
    Yongjie Wang
    Xuehu Yan
    Longlong Li
    Year: 2023
    A General Steganalysis Method of QR Codes
    ICDF2C
    Springer
    DOI: 10.1007/978-3-031-36574-4_28
Jia Chen1, Kunlin Chen1, Yongjie Wang1, Xuehu Yan1,*, Longlong Li1
  • 1: National University of Defense Technology, 460 Huangshan Road, Shushan District
*Contact email: publictiger@126.com

Abstract

With the wide application of quick response (QR) codes, its security has been paid more and more attention. There are many steganography schemes to embed the secret message into QR codes, which can be used in terrorist activities, spread viruses, etc. However, there is currently no effective scheme for detecting stego QR code. This paper divides the spatial QR code-based steganography schemes into three categories and then proposes a steganalysis method for QR codes. The method includes detecting stegao codes and recovering pure QR codes, which is realized by the code regeneration, module comparison, and embedded information filtering operations. Our method can perfectly distinguish the stego code and block the transmission of embedded information for the spatial QR code-based steganography schemes. Theoretical analysis and experiments show that the proposed method is feasible, universal, and robust.

Keywords
QR codes Steganography Steganalysis Code regeneration Protection
Published
2023-07-16
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-36574-4_28
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL