Notice of Retraction A New Secure Hybrid Algorithm for QR-Code Images Encryption and Steganography

Mohammad Soltani, Amid Khatibi Bardsiri

Abstract


Notice of Retraction

-----------------------------------------------------------------------
After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of APTIKOM's Publication Principles.

We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

The presenting author of this paper has the option to appeal this decision by contacting ij.aptikom@gmail.com.

-----------------------------------------------------------------------

Encryption is a method, for the protection of useful information, which is used as one of the security purposes and steganography is the art of hiding the fact that communication is taking place, by hiding information in other Information. In this article at first, plain text message as a security information is converted to the (Quick Response Code) QR-code image and then we proposed a new secure hybrid algorithm for the encryption and steganography of generated QR-code. In this article image encryption is based on two-dimensional logistic chaotic map and AES algorithm and steganography technique is based on LSB algorithm. In addition, Huffman algorithm has come out as the most efficient compression technique and we can use Huffman algorithm to compress encrypted QR-code. Experimental results show that the scheme proposed in this article has a high security and better QR-Code images encryption and steganography quality.


References


Jaydip, S., Theory and Practice of Cryptography and Network Security Protocols and Technologies. 2013: InTech.

Sheeraz Arif, S.W.A.S., Ahmed Sikander Security Key Generation Algorithm for User Identification in Voice over IP (VOIP) Networks. Journal of Basic and Applied Scientific Research, 2011. 1(12): p. 3143-3148.

Ghotbi, A., Evaluating the Security Actions of Information Security Management System in the Electronic Stock Commerce, and Providing the Improvement Strategies. Journal of Basic and Applied Scientific Research, 2012. 2(3): p. 3046-3053.

Fard, E.B. and R.E. Atani. A novel image encryption method based on chaotic maps. in Computer and Knowledge Engineering (ICCKE), 2013 3th International eConference on. 2013. IEEE.

Wang, Y. and T. Li. Study on image encryption algorithm based on Arnold transformation and chaotic system. in Intelligent System Design and Engineering Application (ISDEA), 2010 International Conference on. 2010. IEEE.

Sharma, M. and M.K. Kowar, Image encryption techniques using chaotic schemes: a review. 2010.

Li, C., et al., On the security defects of an image encryption scheme. Image and Vision Computing, 2009. 27(9): p. 1371-1381.

Guardeño, D.A., Framework for the analysis and design of encryption strategies based on discrete-time chaotic dynamical systems. 2009, Universidad Politécnica de Madrid.

Shannon, C.E., Communication theory of secrecy systems. Bell Labs Technical Journal, 1949. 28(4): p. 656-715.

Ramesh, M., G. Prabakaran, and R. Bhavani, QR-Code Image Steganography. 2014.

Kaur, A., R. Kaur, and N. Kumar, A Review on Image Steganography Techniques. International Journal of Computer Applications, 2015. 123(4).

Champakamala, N., K. Padmini, and D. Radhika, Least Significant Bit algorithm for image steganography. International Journal of Advance Computer Technology, 2013. 3(4): p. 34-38.

Khare, A., M. Kunari, and P. Khare, Efficient algorithm for digital image steganography. Journal of Information Science, Knowledge and Research in Computer Science and Application, 2010: p. 1-5.

Luo, L., et al., Reversible image watermarking using interpolation technique. IEEE Transactions on information forensics and security, 2010. 5(1): p. 187-193.

Kumar, K.S., et al., Performance comparison of robust steganography based on multiple transformation techniques. Int. J. Comp. Tech. Appl, 2011. 2(4): p. 1035-1047.

Muttoo, S. and S. Kumar, A Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm. World of Computer Science and Information Technology Journal, 2011. 6: p. 239-246.

Zhang, S., et al., DWT-Based Watermarking Using QR Code. 2008.

Espejel-Trujillo, A., et al., Identity document authentication based on VSS and QR codes. Procedia Technology, 2012. 3: p. 241-250.

Wave, D., QR code features. QR Code. com, 2010.

Verhulst, P.-F. Nouv. m´em. de l’Academie Royale des Sci. et Belles-Lettres de Bruxelles 1845, 18, 1–41.

Verhulst, P.-F. M´em. de l’Academie Royale des Sci. des Lettres et des Beaux-Arts de Belgique 1847, 20, 1–32.

Hashemi, S.M., Chaos and its application in engineering. AlU publication Tehran 2009.

Schuster, H.G. and W. Just, Deterministic chaos: an introduction. 2006: John Wiley & Sons.

Afraĭmovich, V.S. and S.-B. Hsu, Lectures on chaotic dynamical systems. 2003: American Mathematical Soc.

Huang, C. and H. Nien, Multi chaotic systems based pixel shuffle for image encryption. Optics Communications, 2009. 282(11): p. 2123-2127.

Kumar, D.A.P., et al., Data Hiding Using LSB with QR Code Data Pattern Image.

Veenadevi, S. and A. Ananth, Fractal image compression using quadtree decomposition and huffman coding. Signal & Image Processing, 2012. 3(2): p. 207.

Liu, B. and Y. Yan. An improved fractal image coding based on the quadtree. in Image and Signal Processing (CISP), 2010 3rd International Congress on. 2010. IEEE.

Yu, H., et al. Based on quadtree fractal image compression improved algorithm for research. in E-Product E-Service and E-Entertainment (ICEEE), 2010 International Conference on. 2010. IEEE.

Kamran, M., A.I. Sipra, and M. Nadeem. A novel domain optimization technique in Fractal image Compression. in Intelligent Control and Automation (WCICA), 2010 8th World Congress on. 2010. IEEE.

Srivastava, R. and O. Singh, Performance Analysis of Image Encryption Using Block Based Technique. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2015. 4(5): p. 4266-4271.

Fournier-Prunaret, D. and R. Lopez-Ruiz, Basin bifurcations in a two-dimensional logistic map. arXiv preprint nlin/0304059, 2003.

Young, L.-S., Dimension, entropy and Lyapunov exponents. Ergodic theory and dynamical systems, 1982. 2(01): p. 109-124.

Wu, Y., et al., Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging, 2012. 21(1): p. 013014-1-013014-15.




DOI: https://doi.org/10.11591/APTIKOM.J.CSIT.109

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 APTIKOM Journal on Computer Science and Information Technologies



ISSN: 2528-2417, e-ISSN: 2528-2425

CSIT Stats

 

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.