SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 250
Study of 3D Barcode with Steganography for Data Hiding
Megha S M1, Chethana C2
1Student of Master of Technology, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64,
2 Assistant Professor, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -3D barcode is the one where third dimensional
will be added as a color. In the 2D barcode bars and squares
are the main features. Steganography is a practice of
concealing messages or information within other non-secret
text or data in order to give protection to the data from the
third person. Steganographytakes cryptographyastepfarther
by hiding an encrypted message so that no one suspects it
exists. 3D will be used mostly in the process of transmission of
data it is very difficult to decode because it is uses the high
data encrypted messages that cannot be decoded by third
person. This paper gives the brief introduction about how the
3D barcodes are to be used in the data hiding using
steganography in order to secure from others.
KeyWords: stegochannel,steganography,Coverchannel.
1. INTRODUCTION TO STEGANOGRAPHY
Steganography is method of hiding the data in a
message in order to give security to the data. It is the
practice of concealing a file, message, image or video within
another file. The word steganography combines the Greek
word steganos meaning “covered, concealed or protected”
and graphein meaning “writing”. The first steganography
was done in the year 1499 by Johannes Trithemius.
The advantage of steganography overcryptography
alone is that the intended secret message does not attract
attention to itself as an object of security. It includes the
concealment of information within computer files. In digital
steganography, electronic communications may include
stenographic coding inside of a transport layer, such as
document file, image file, program or protocol. Media files
are ideal for steganograhic transmission because of their
large size.
Steganography has been widely used for centuries.
Here are some examples:
 Hidden messages within a wax tablet:Intheancient
days the people used to write on the wood and
cover them with the wax in order to protect that
from the other middle mans and these will be in the
form of pictorial representation.
 The messages on the body of a person will also be
used in the method of hiding the data.
 The hidden or the important data will be written
with the secret inks and those will be corrupted
when they use other chemicals.
 Post messages will also be used in the days where
those are to be covered by some stamp and those
data are not to be disclosed to others in the middle
of transmission.
 The signs are to be used to communicate in orderto
give privacy and those can be decode d by
authorized person only.
2. LITERATURE SURVEY
A. 3D Barcodes.
The barcodes are the one where we can hide the data and
those data will be reached safely to the authorized person
without disclosed to others in the middle. The barcodes are
mainly made up of bars and squares in the black and white
color format. In 3D barcodes the third dimensional will be
added as the color. The main reasonforintroductionofthese
3D barcodes are high temperature resistant.
The 3D barcodes are embossed on the product and
the scanner recognizes new character in the string by the
lower regions of the code. This work in much the same way
as the white lines or spaces in linear barcodes. The 3D
barcodes also make it nearly impossible to alter or obstruct
the barcodes information and results in fewer inventory
mistakes and in turn lowers operating costs of a
manufacturing process or applied after with a press.
3D barcodeareto bescannedfromdifferentscanner
where we will use the laser light to scan the barcode. That
red height as a function of time the laser light takes to travel
to the code section and project back.
Fig 1: 3 D Barcode
.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 251
Advantages of 3D barcode are:
1. It is very difficult to modify the encoded
information because is no error correction level in
the system.
2. This one will have large amount of data hiding
capacity.
3. This will help in encoding image, video and voice
message in the barcode.
4. These are high temperature resistant.
5. This will provide high level of security to the
expensive products like gold, diamond and some
pharmaceutical products.
Disadvantages of 3D barcode are:
1. These are costly to generate.
2. The generation requires perfect knowledge of
coding and color coding information.
3. These require special type of scanner to scan the
barcode.
B) Classifications of 3D barcode:
The 3d barcode will be classified into mainly 3 types they
are:
1. Paper Memory Barcodes
2. Nano Barcodes
3. High Capacity color Barcodes.
Paper Memory Barcodes:
This type of barcode will be introduced by a Japanese
company named “content color of Asia” in year 2006. This
code is similar to that of 2D barcode where third
dimensional is added as color. In his directly we can add
image directly. The data capacity of the paper memory code
is 0.6mb to 1.8mb.
Nano Barcodes:
These are also similar like QR code. This type of barcode
was introduced by National Physical Laboratory. The length
of the barcode is length of a single skin cell of a person. This
will help in making about 90,000 squares. The information
will be stored in the system between black and white lines.
High Capacity Color Barcode:
This type of barcode was introduced by the Microsoft
Company in 2007. These type of barcode help in storing
large amount of data than traditional 2Dbarcode.Increating
the barcode they will use eight different colors.
C. Specification Of QR code:
The QR code are made up of modules which contains small
black and white color squares.
There are some specifications in the barcode they are:
1. Alignment Pattern: It is used when there is a
deformation due to displacement of modules.
2. Position Pattern: The three corners of QR codes are
used for detecting position. The ratio of black and
white modules is used to specify the edge and
displacement of code.
3. Error Correction Information: It is used when part
of QR code is absent.
4. Margin: The black area around the QR code is called
Margin.
5. Timing Pattern: Modules are used to determine the
coordinates which are arranged alternatively.
6. Format Information: Itincludesthe errorcorrection
code rate and mask pattern.
D) 3B Barcode Scanner:
A barcode reader is an electronic device that can read and
output printed barcodes to a computer. Like a flatbed
scanner, it consists of a light source, a lens and a light sensor
translating optical impulses into electronic ones.
Additionally, nearly all barcode readers contain decoder
circuitry analyzing the bar codes image data provided bythe
sensor and sending the barcode content to the scanner
output port.
Fig 2: 3D barcode Scanner
Laser scanners work the same way as pen type
readers except that they use a laser beam as the light source
and typically employ either a reciprocating mirror or a
rotating prism to scan the laser beam back and forth across
the bar code. As with the pen type reader, a photo-diode is
used to measure the intensity of the lightreflectedback from
the bar code. In both pen readers and laser scanners, the
light emitted by the reader is rapidly varied in brightness
with a data pattern and the photo-diode receive circuitry is
designed to detect only signals with the same modulated
pattern.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 252
E) Decoding Process of Barcode:
barcodes
Fig 3: Decoding process of the barcodes.
The fig3 explains about how the barcodes will be decoded
using the scanners. In this the image will be converted into
binary format. After converting into binary format the
pattern matching will separate into alignment finder and
versions of the barcode. Then those data will be used to
extract for perspective transformationandthesedata will be
used to extract information. If any errors are present in the
extraction those will be debugged and then the decoded
information will be used.
3. PROPOSED SYSTEM
There are mainly two phase they are
1. 3D barcode generation and embedding phase.
2. 3D barcode extraction phase.
3D barcode generation and embedding phase:
In order to generate the 3D barcode there are some steps
they are as follows:
Step1: Generate a colored barcode by using three colors
barcodes images Red, green, blue with each image
individually encoded with information.
Step2: Take the generated barcode image as the cover
image. Based on some random key Extract red, green, blue
component. Step3: Calculate the Euclidean distance ofeach
individual channel using formula:
+(
Step 4: choose some threshold value. For d <100
Generate the mask of the cover image.
Step5: Hide data into the least significant bits of the mask.
Step6: Finally combine all the segments to generate the
stego image.
Where origimg is the original image and distimg is
the recover image. These are steps that are to be used to
create a 3D barcode to hide the data to give privacy and
security to the data. The systematic representation of
generation phase is shown below.
Fig 4: 3D Barcode Generation
3D Barcode Extraction Phase:
At receiver side, following steps are used to extract the
embedded secret message and source image from the stego
image. The steps for the extraction phase are as follows
Step 1.Take stego Image as an input. The stego image is
the image generated after concealing secret message in
the cover image.
Step 2: In this step, the image is segmented into a number of
segments.
Step 3: Then we have to recognize the segment in which the
sensitive information or secret message is hidden.
Step4: After recognizing the segment in which the data is
hidden, we have to identify the least significant bits in which
data is embedded.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 253
Step 5: In this step, by using the same key as used in the
embedding phase we can decrypt the secret message.
Step 6: All the segments are then assembled.
Fig 5: Extraction Phase of data
The two methods are to be explained that how the data will
be hidden in the container where the 3D barcode will be
used as the cover image. The generation phase will explain
about how the data will be hidden using LSB and secret key.
In this method XOR encryption method will be used. In the
data extraction phase, it will explain about how the data will
be extracted from the system to get the secret message. The
3D barcode will be high temperature resistant and it will be
very much secured because the data cannot be changed or
altered by any third person while transmission.
3D Colored Barcode Generation We proposed a procedure
for creating 3D Barcode. The procedure includes the
generation of colored barcode from three red, green, blue
color barcodes with some encrypted information in them
Equations
Fig 6: 3D barcode Generation
4. CONCLUSIONS
This paper gives about the idea about how the data can be
hidden using 3D steganography where 3D barcode is taken
as the cover image. This paper gives about the brief
introduction about how the how the data can be encoded its
phases and the use of secret key in order to get hidden
message in the system. Here the data will be hidden in the
last significant of binary representation. The 3D barcode is
high temperature resistant so the main benefit is using 3D
barcode as the cover image.
In this paper only one hidden message will be used to hide.
We can also take more hidden messages to hide. In future
this approach can be improved by using several optimizing
algorithms for enhancing the embedding capacity and
quality of stego image with less distortion in the image.
Several secret messages can also be concealed in a single
cover image.
REFERENCES
[1] Rama Rani, Gavrav Deep “Digital 3D Barcode Image as a
Container for Data Hiding Using Steganography” 4th
IEEE international conference on signal processing,
computing and control,solan,2017.
[2] I. Szentandrási, , A. Herout and M. etaDubsk´, "Fast
Detection and Recognition of QR codes in High-
Resolution Images," in Proceedings of the 28th Spring
Conference on Computer Graphics, 2013.
[3] G. . J. Garateguy, G. R. Arce, D. . L. Lau and O. . P.
Villarreal, "QR images: Optimized image embedding in
QR codes," IEEE Transactions on Image Processing, vol.
23, no. 7, pp. 2842-2853, 2014.
[4] A. . P. Patil and C. . J. Awati, "A Survey on PiCode:Picture-
Embedding 2 D Barcode," International Journal on
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 254
Recent and Innovation Trends in Computing and
Communication, vol. 4, no. 12, pp. 186-189, 2014.
[5] P. Gaur and S. Tiwari , "Recognition of 2D Barcode
Images Using Edge Detection and Morphological
Operation," International Journal of Computer Science
and Mobile Computing, vol. 3, no. 4, p. 1277 – 1282 ,
2014.
[6] Advances in Computing, Communications and
Informatics (ICACCI), pp. 973-979, IEEE 2015.
[7] R. Hou, R. Weizheng and Y. Zhang, “A wireless sensor
network clustering algorithm based on energy and
distance”, in 2009 Second International Workshop on
Computer Science and Engineering, pp. 439442 , IEEE
2009.
[8] A. P. Singh, N. Sharma and N. R. Roy, “Residual Energy
and Distance based Energy-Efficient Communication
Protocol for Wireless Sensor Network”, in International
Journal of Computer Applications, vol. 74, issue 12, pp.
11-16, July 2013.
[9] X. L. Long and Z. J. Jun, “Improved LEACH Cluster Head
Multi-hops Algorithm in Wireless Sensor Networks”, in
2010 Ninth International Symposium on Distributed
Computing and Applications to Business, Engineering
and Science, pp. 263-267, IEEE 2010.
[10] T. S. Singh, A. K. Khan and R. Soram, “Distance based
Multi Single Hop Low Energy Adaptive Clustering
Hierarchy (MS LEACH) Routing Protocol in Wireless
Sensor Network”, in 2016 IEEE 6th International
Conference on Advance Computing, pp. 613-617, IEEE
2016.
[11] M. Y. Tsai and Y. C. Chen, “A Virtual Cluster Head
Election Scheme for Energy-Efficient Routing in
Wireless Sensor Networks”, in 2015 3 rd International
Conference on Future Internet of Things and Cloud, pp.
341348 , IEEE 2015

More Related Content

What's hot

IRJET- An Overview of Steganography : Data Hiding Technique
IRJET-  	  An Overview of Steganography : Data Hiding TechniqueIRJET-  	  An Overview of Steganography : Data Hiding Technique
IRJET- An Overview of Steganography : Data Hiding Technique
IRJET Journal
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image Processing
IRJET Journal
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
AM Publications
 
Sign verification
Sign verificationSign verification
Sign verification
projectseven1222
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
IJCIRAS Journal
 
Published pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajalPublished pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajal
MOHAMED RIYAZUDEEN
 
Identification of Persons by Fingerprint using Huffman Coding Algorithm
Identification of Persons by Fingerprint using Huffman Coding AlgorithmIdentification of Persons by Fingerprint using Huffman Coding Algorithm
Identification of Persons by Fingerprint using Huffman Coding Algorithm
ijtsrd
 
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHINGTHE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 
QR code optimization
QR code optimizationQR code optimization
QR code optimization
Kishor Datta Gupta
 
akashreport
akashreportakashreport
akashreport
Akash Goel
 
Card reader
Card readerCard reader
Card reader
Manoj Kumar
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
International Journal of Science and Research (IJSR)
 
Seminar achu
Seminar achuSeminar achu
Seminar achu
Achu Anna
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
 
Product Label Reading System for visually challenged people
Product Label Reading System for visually challenged peopleProduct Label Reading System for visually challenged people
Product Label Reading System for visually challenged people
IRJET Journal
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Editor IJMTER
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
IJMIT JOURNAL
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
IJSRED
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
ijiert bestjournal
 

What's hot (20)

IRJET- An Overview of Steganography : Data Hiding Technique
IRJET-  	  An Overview of Steganography : Data Hiding TechniqueIRJET-  	  An Overview of Steganography : Data Hiding Technique
IRJET- An Overview of Steganography : Data Hiding Technique
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image Processing
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
 
Sign verification
Sign verificationSign verification
Sign verification
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
Published pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajalPublished pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajal
 
Identification of Persons by Fingerprint using Huffman Coding Algorithm
Identification of Persons by Fingerprint using Huffman Coding AlgorithmIdentification of Persons by Fingerprint using Huffman Coding Algorithm
Identification of Persons by Fingerprint using Huffman Coding Algorithm
 
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHINGTHE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
QR code optimization
QR code optimizationQR code optimization
QR code optimization
 
akashreport
akashreportakashreport
akashreport
 
Card reader
Card readerCard reader
Card reader
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Seminar achu
Seminar achuSeminar achu
Seminar achu
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Product Label Reading System for visually challenged people
Product Label Reading System for visually challenged peopleProduct Label Reading System for visually challenged people
Product Label Reading System for visually challenged people
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
 

Similar to IRJET- Study of 3D Barcode with Steganography for Data Hiding

IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
IRJET Journal
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
 
Workshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KITWorkshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KIT
Edwin Rojas
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
Editor IJCATR
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET Journal
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
IRJET Journal
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
ShouaQureshi
 
SCANNERS /BARCODE
SCANNERS /BARCODE SCANNERS /BARCODE
Qr codes web
Qr codes webQr codes web
Qr codes web
Simran Gupta
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
aissmsblogs
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
IAEME Publication
 
Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology ppt
VyakhayaYadav
 
barcodes [Recovered]
barcodes [Recovered]barcodes [Recovered]
barcodes [Recovered]
dherendra dev
 
Workshop 2016 Genebank IT - Print Barcode
Workshop 2016 Genebank IT - Print BarcodeWorkshop 2016 Genebank IT - Print Barcode
Workshop 2016 Genebank IT - Print Barcode
Edwin Rojas
 
A blind steganography approach for hiding privacy details in images of digit...
A blind steganography approach for hiding privacy details in  images of digit...A blind steganography approach for hiding privacy details in  images of digit...
A blind steganography approach for hiding privacy details in images of digit...
IJECEIAES
 

Similar to IRJET- Study of 3D Barcode with Steganography for Data Hiding (20)

IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
Workshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KITWorkshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KIT
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
 
SCANNERS /BARCODE
SCANNERS /BARCODE SCANNERS /BARCODE
SCANNERS /BARCODE
 
Qr codes web
Qr codes webQr codes web
Qr codes web
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
 
Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology ppt
 
barcodes [Recovered]
barcodes [Recovered]barcodes [Recovered]
barcodes [Recovered]
 
Workshop 2016 Genebank IT - Print Barcode
Workshop 2016 Genebank IT - Print BarcodeWorkshop 2016 Genebank IT - Print Barcode
Workshop 2016 Genebank IT - Print Barcode
 
A blind steganography approach for hiding privacy details in images of digit...
A blind steganography approach for hiding privacy details in  images of digit...A blind steganography approach for hiding privacy details in  images of digit...
A blind steganography approach for hiding privacy details in images of digit...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
Kuvempu University
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
foxlyon
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
GOKULKANNANMMECLECTC
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 

Recently uploaded (20)

Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 

IRJET- Study of 3D Barcode with Steganography for Data Hiding

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 250 Study of 3D Barcode with Steganography for Data Hiding Megha S M1, Chethana C2 1Student of Master of Technology, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64, 2 Assistant Professor, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -3D barcode is the one where third dimensional will be added as a color. In the 2D barcode bars and squares are the main features. Steganography is a practice of concealing messages or information within other non-secret text or data in order to give protection to the data from the third person. Steganographytakes cryptographyastepfarther by hiding an encrypted message so that no one suspects it exists. 3D will be used mostly in the process of transmission of data it is very difficult to decode because it is uses the high data encrypted messages that cannot be decoded by third person. This paper gives the brief introduction about how the 3D barcodes are to be used in the data hiding using steganography in order to secure from others. KeyWords: stegochannel,steganography,Coverchannel. 1. INTRODUCTION TO STEGANOGRAPHY Steganography is method of hiding the data in a message in order to give security to the data. It is the practice of concealing a file, message, image or video within another file. The word steganography combines the Greek word steganos meaning “covered, concealed or protected” and graphein meaning “writing”. The first steganography was done in the year 1499 by Johannes Trithemius. The advantage of steganography overcryptography alone is that the intended secret message does not attract attention to itself as an object of security. It includes the concealment of information within computer files. In digital steganography, electronic communications may include stenographic coding inside of a transport layer, such as document file, image file, program or protocol. Media files are ideal for steganograhic transmission because of their large size. Steganography has been widely used for centuries. Here are some examples:  Hidden messages within a wax tablet:Intheancient days the people used to write on the wood and cover them with the wax in order to protect that from the other middle mans and these will be in the form of pictorial representation.  The messages on the body of a person will also be used in the method of hiding the data.  The hidden or the important data will be written with the secret inks and those will be corrupted when they use other chemicals.  Post messages will also be used in the days where those are to be covered by some stamp and those data are not to be disclosed to others in the middle of transmission.  The signs are to be used to communicate in orderto give privacy and those can be decode d by authorized person only. 2. LITERATURE SURVEY A. 3D Barcodes. The barcodes are the one where we can hide the data and those data will be reached safely to the authorized person without disclosed to others in the middle. The barcodes are mainly made up of bars and squares in the black and white color format. In 3D barcodes the third dimensional will be added as the color. The main reasonforintroductionofthese 3D barcodes are high temperature resistant. The 3D barcodes are embossed on the product and the scanner recognizes new character in the string by the lower regions of the code. This work in much the same way as the white lines or spaces in linear barcodes. The 3D barcodes also make it nearly impossible to alter or obstruct the barcodes information and results in fewer inventory mistakes and in turn lowers operating costs of a manufacturing process or applied after with a press. 3D barcodeareto bescannedfromdifferentscanner where we will use the laser light to scan the barcode. That red height as a function of time the laser light takes to travel to the code section and project back. Fig 1: 3 D Barcode .
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 251 Advantages of 3D barcode are: 1. It is very difficult to modify the encoded information because is no error correction level in the system. 2. This one will have large amount of data hiding capacity. 3. This will help in encoding image, video and voice message in the barcode. 4. These are high temperature resistant. 5. This will provide high level of security to the expensive products like gold, diamond and some pharmaceutical products. Disadvantages of 3D barcode are: 1. These are costly to generate. 2. The generation requires perfect knowledge of coding and color coding information. 3. These require special type of scanner to scan the barcode. B) Classifications of 3D barcode: The 3d barcode will be classified into mainly 3 types they are: 1. Paper Memory Barcodes 2. Nano Barcodes 3. High Capacity color Barcodes. Paper Memory Barcodes: This type of barcode will be introduced by a Japanese company named “content color of Asia” in year 2006. This code is similar to that of 2D barcode where third dimensional is added as color. In his directly we can add image directly. The data capacity of the paper memory code is 0.6mb to 1.8mb. Nano Barcodes: These are also similar like QR code. This type of barcode was introduced by National Physical Laboratory. The length of the barcode is length of a single skin cell of a person. This will help in making about 90,000 squares. The information will be stored in the system between black and white lines. High Capacity Color Barcode: This type of barcode was introduced by the Microsoft Company in 2007. These type of barcode help in storing large amount of data than traditional 2Dbarcode.Increating the barcode they will use eight different colors. C. Specification Of QR code: The QR code are made up of modules which contains small black and white color squares. There are some specifications in the barcode they are: 1. Alignment Pattern: It is used when there is a deformation due to displacement of modules. 2. Position Pattern: The three corners of QR codes are used for detecting position. The ratio of black and white modules is used to specify the edge and displacement of code. 3. Error Correction Information: It is used when part of QR code is absent. 4. Margin: The black area around the QR code is called Margin. 5. Timing Pattern: Modules are used to determine the coordinates which are arranged alternatively. 6. Format Information: Itincludesthe errorcorrection code rate and mask pattern. D) 3B Barcode Scanner: A barcode reader is an electronic device that can read and output printed barcodes to a computer. Like a flatbed scanner, it consists of a light source, a lens and a light sensor translating optical impulses into electronic ones. Additionally, nearly all barcode readers contain decoder circuitry analyzing the bar codes image data provided bythe sensor and sending the barcode content to the scanner output port. Fig 2: 3D barcode Scanner Laser scanners work the same way as pen type readers except that they use a laser beam as the light source and typically employ either a reciprocating mirror or a rotating prism to scan the laser beam back and forth across the bar code. As with the pen type reader, a photo-diode is used to measure the intensity of the lightreflectedback from the bar code. In both pen readers and laser scanners, the light emitted by the reader is rapidly varied in brightness with a data pattern and the photo-diode receive circuitry is designed to detect only signals with the same modulated pattern.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 252 E) Decoding Process of Barcode: barcodes Fig 3: Decoding process of the barcodes. The fig3 explains about how the barcodes will be decoded using the scanners. In this the image will be converted into binary format. After converting into binary format the pattern matching will separate into alignment finder and versions of the barcode. Then those data will be used to extract for perspective transformationandthesedata will be used to extract information. If any errors are present in the extraction those will be debugged and then the decoded information will be used. 3. PROPOSED SYSTEM There are mainly two phase they are 1. 3D barcode generation and embedding phase. 2. 3D barcode extraction phase. 3D barcode generation and embedding phase: In order to generate the 3D barcode there are some steps they are as follows: Step1: Generate a colored barcode by using three colors barcodes images Red, green, blue with each image individually encoded with information. Step2: Take the generated barcode image as the cover image. Based on some random key Extract red, green, blue component. Step3: Calculate the Euclidean distance ofeach individual channel using formula: +( Step 4: choose some threshold value. For d <100 Generate the mask of the cover image. Step5: Hide data into the least significant bits of the mask. Step6: Finally combine all the segments to generate the stego image. Where origimg is the original image and distimg is the recover image. These are steps that are to be used to create a 3D barcode to hide the data to give privacy and security to the data. The systematic representation of generation phase is shown below. Fig 4: 3D Barcode Generation 3D Barcode Extraction Phase: At receiver side, following steps are used to extract the embedded secret message and source image from the stego image. The steps for the extraction phase are as follows Step 1.Take stego Image as an input. The stego image is the image generated after concealing secret message in the cover image. Step 2: In this step, the image is segmented into a number of segments. Step 3: Then we have to recognize the segment in which the sensitive information or secret message is hidden. Step4: After recognizing the segment in which the data is hidden, we have to identify the least significant bits in which data is embedded.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 253 Step 5: In this step, by using the same key as used in the embedding phase we can decrypt the secret message. Step 6: All the segments are then assembled. Fig 5: Extraction Phase of data The two methods are to be explained that how the data will be hidden in the container where the 3D barcode will be used as the cover image. The generation phase will explain about how the data will be hidden using LSB and secret key. In this method XOR encryption method will be used. In the data extraction phase, it will explain about how the data will be extracted from the system to get the secret message. The 3D barcode will be high temperature resistant and it will be very much secured because the data cannot be changed or altered by any third person while transmission. 3D Colored Barcode Generation We proposed a procedure for creating 3D Barcode. The procedure includes the generation of colored barcode from three red, green, blue color barcodes with some encrypted information in them Equations Fig 6: 3D barcode Generation 4. CONCLUSIONS This paper gives about the idea about how the data can be hidden using 3D steganography where 3D barcode is taken as the cover image. This paper gives about the brief introduction about how the how the data can be encoded its phases and the use of secret key in order to get hidden message in the system. Here the data will be hidden in the last significant of binary representation. The 3D barcode is high temperature resistant so the main benefit is using 3D barcode as the cover image. In this paper only one hidden message will be used to hide. We can also take more hidden messages to hide. In future this approach can be improved by using several optimizing algorithms for enhancing the embedding capacity and quality of stego image with less distortion in the image. Several secret messages can also be concealed in a single cover image. REFERENCES [1] Rama Rani, Gavrav Deep “Digital 3D Barcode Image as a Container for Data Hiding Using Steganography” 4th IEEE international conference on signal processing, computing and control,solan,2017. [2] I. Szentandrási, , A. Herout and M. etaDubsk´, "Fast Detection and Recognition of QR codes in High- Resolution Images," in Proceedings of the 28th Spring Conference on Computer Graphics, 2013. [3] G. . J. Garateguy, G. R. Arce, D. . L. Lau and O. . P. Villarreal, "QR images: Optimized image embedding in QR codes," IEEE Transactions on Image Processing, vol. 23, no. 7, pp. 2842-2853, 2014. [4] A. . P. Patil and C. . J. Awati, "A Survey on PiCode:Picture- Embedding 2 D Barcode," International Journal on
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 254 Recent and Innovation Trends in Computing and Communication, vol. 4, no. 12, pp. 186-189, 2014. [5] P. Gaur and S. Tiwari , "Recognition of 2D Barcode Images Using Edge Detection and Morphological Operation," International Journal of Computer Science and Mobile Computing, vol. 3, no. 4, p. 1277 – 1282 , 2014. [6] Advances in Computing, Communications and Informatics (ICACCI), pp. 973-979, IEEE 2015. [7] R. Hou, R. Weizheng and Y. Zhang, “A wireless sensor network clustering algorithm based on energy and distance”, in 2009 Second International Workshop on Computer Science and Engineering, pp. 439442 , IEEE 2009. [8] A. P. Singh, N. Sharma and N. R. Roy, “Residual Energy and Distance based Energy-Efficient Communication Protocol for Wireless Sensor Network”, in International Journal of Computer Applications, vol. 74, issue 12, pp. 11-16, July 2013. [9] X. L. Long and Z. J. Jun, “Improved LEACH Cluster Head Multi-hops Algorithm in Wireless Sensor Networks”, in 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, pp. 263-267, IEEE 2010. [10] T. S. Singh, A. K. Khan and R. Soram, “Distance based Multi Single Hop Low Energy Adaptive Clustering Hierarchy (MS LEACH) Routing Protocol in Wireless Sensor Network”, in 2016 IEEE 6th International Conference on Advance Computing, pp. 613-617, IEEE 2016. [11] M. Y. Tsai and Y. C. Chen, “A Virtual Cluster Head Election Scheme for Energy-Efficient Routing in Wireless Sensor Networks”, in 2015 3 rd International Conference on Future Internet of Things and Cloud, pp. 341348 , IEEE 2015