{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:57:03Z","timestamp":1774418223770,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T00:00:00Z","timestamp":1550102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Despite greater attention being paid to sensitive-information leakage in the cyberdomain, the sensitive-information problem of the physical domain remains neglected. Anonymous users can easily access the sensitive information of other users, such as transaction information, health status, and addresses, without any advanced technologies. Ideally, secret messages should be protected not only in the cyberdomain but also in the complex physical domain. However, popular steganography schemes only work in the traditional cyberdomain and are useless when physical distortions of messages are unavoidable. This paper first defines the concept of cross-domain steganography, and then proposes EasyStego, a novel cross-domain steganography scheme. EasyStego is based on the use of QR barcodes as carriers; therefore, it is robust to physical distortions in the complex physical domain. Moreover, EasyStego has a large capacity for embeddable secrets and strong scalability in various scenarios. EasyStego uses an AES encryption algorithm to control the permissions of secret messages, which is more effective in reducing the possibility of sensitive-information leakage. Experiments show that EasyStego has perfect robustness and good efficiency. Compared with the best current steganography scheme based on barcodes, EasyStego has greater steganographic capacity and less impact on barcode data. In robustness tests, EasyStego successfully extracts secret messages at different angles and distances. In the case of adding natural textures and importing quantitative error bits, other related steganography techniques fail, whereas EasyStego can extract secret messages with a success rate of nearly 100%.<\/jats:p>","DOI":"10.3390\/sym11020222","type":"journal-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T11:54:13Z","timestamp":1550145253000},"page":"222","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["EasyStego: Robust Steganography Based on Quick-Response Barcodes for Crossing Domains"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2266-1064","authenticated-orcid":false,"given":"Zhenhao","family":"Luo","sequence":"first","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Wei","family":"Xie","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Baosheng","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Yong","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Qianqian","family":"Xing","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,2,14]]},"reference":[{"key":"ref_1","unstructured":"BBC (2018, December 21). Quora Says 100 Million Users Hacked. Available online: https:\/\/www.bbc.com\/news\/technology-46438239."},{"key":"ref_2","unstructured":"Guardian, T. (2018, December 21). Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach. Available online: https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election."},{"key":"ref_3","unstructured":"CNET (2018, December 21). 150 Million MyFitnessPal Accounts Were Hacked. Here\u2019s What to Do. Available online: http:\/\/t.cn\/EGmveVP."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","article-title":"Medical JPEG image steganography based on preserving inter-block dependencies","volume":"67","author":"Liao","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_5","unstructured":"Srinivasan, Y., Nutter, B., Mitra, S., Phillips, B., and Ferris, D. (2004, January 24\u201325). Secure transmission of medical records using high capacity steganography. Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, 2004 (CBMS 2004), Bethesda, MD, USA."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Castiglione, A., De Santis, A., Pizzolante, R., Castiglione, A., Loia, V., and Palmieri, F. (2015, January 24\u201327). On the protection of fMRI images in multi-domain environments. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA), Gwangiu, South Korea.","DOI":"10.1109\/AINA.2015.224"},{"key":"ref_7","unstructured":"Xinhua (2018, December 24). China Gets Tough with Personal Information Leaking. Available online: http:\/\/www.chinadaily.com.cn\/china\/2017-05\/12\/content_29322173.htm."},{"key":"ref_8","unstructured":"Wave, D. (2018, December 12). Qrcode. com. QrCode. com [Online]. Available online: http:\/\/www.qrcode.com\/en\/about."},{"key":"ref_9","first-page":"146","article-title":"A reversible high capacity data hiding scheme using combinatorial strategy","volume":"3","author":"Kumar","year":"2018","journal-title":"Int. J. Multimed. Intell. Secur."},{"key":"ref_10","first-page":"1","article-title":"Natural Steganography in JPEG Compressed Images","volume":"2018","author":"Denemark","year":"2018","journal-title":"Electron. Imaging"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ding, W., Liu, K., Yan, X., Wang, H., Liu, L., and Gong, Q. (2018). An Image Secret Sharing Method Based on Matrix Theory. Symmetry, 10.","DOI":"10.3390\/sym10100530"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhou, X., Lu, Y., Yan, X., Wang, Y., and Liu, L. (2018). Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size. Symmetry, 10.","DOI":"10.3390\/sym10070249"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Lin, P.Y., Chen, Y.H., Lu, E.J.L., and Chen, P.J. (2013, January 2\u20135). Secret hiding mechanism using QR barcode. Proceedings of the 2013 International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan.","DOI":"10.1109\/SITIS.2013.15"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1109\/TIFS.2015.2506546","article-title":"Two-level QR code for private message sharing and document authentication","volume":"11","author":"Tkachenko","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1186\/s13640-016-0155-0","article-title":"High payload secret hiding technology for QR codes","volume":"2017","author":"Lin","year":"2017","journal-title":"EURASIP J. Image Video Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information hiding-a survey","volume":"87","author":"Petitcolas","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_17","first-page":"5354","article-title":"A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ecc","volume":"5","author":"Mstafa","year":"2017","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Asad, M., Gilani, J., and Khalid, A. (2011, January 11\u201313). An enhanced least significant bit modification technique for audio steganography. Proceedings of the 2011 International Conference on Computer Networks and Information Technology (ICCNIT), Abbottabad, Pakistan.","DOI":"10.1109\/ICCNIT.2011.6020921"},{"key":"ref_19","unstructured":"Yang, Z., Du, X., Tan, Y., Huang, Y., and Zhang, Y.J. (arXiv, 2018). AAG-Stega: Automatic Audio Generation-based Steganography, arXiv."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Mehboob, B., and Faruqui, R.A. (2008, January 23\u201324). A stegnography implementation. Proceedings of the International Symposium on Biometrics and Security Technologies (ISBAST 2008), Islamabad, Pakistan.","DOI":"10.1109\/ISBAST.2008.4547669"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.sigpro.2014.08.022","article-title":"Dual imaging-based reversible hiding technique using LSB matching","volume":"108","author":"Lu","year":"2015","journal-title":"Signal Process."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Bansod, S.P., Mane, V.M., and Ragha, R. (2012, January 19\u201320). Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity. Proceedings of the 2012 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, India.","DOI":"10.1109\/ICCICT.2012.6398199"},{"key":"ref_23","first-page":"9","article-title":"QR-DWT code image steganography","volume":"3","author":"Ramesh","year":"2013","journal-title":"Int. J. Comput. Intell. Inform."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Islam, M.W., and alZahir, S. (2013, January 11\u201314). A novel QR code guided image stenographic technique. Proceedings of the 2013 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2013.6487028"},{"key":"ref_25","unstructured":"BR, R.S., Rohith, J., Mukund, V., Honwade, R., and Rangaswamy, S. (2009, January 27\u201328). Steganography using sudoku puzzle. Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, Kerala, India."},{"key":"ref_26","unstructured":"Wave, D. (2015). Information Technology Automatic Identification and Data Capture Techniques QR Code Bar Code Symbology Specification, International Organization for Standardization. Available online: https:\/\/www.iso.org\/standard\/62021.html."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","article-title":"A method for the construction of minimum-redundancy codes","volume":"40","author":"Huffman","year":"1952","journal-title":"Proc. IRE"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","article-title":"Polynomial codes over certain finite fields","volume":"8","author":"Reed","year":"1960","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"ref_29","unstructured":"Wakin, M. (2018, December 16). Standard Test Images-Lena. Standard Test Images. Available online: https:\/\/www.ece.rice.edu\/~wakin\/images."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/2\/222\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:32:00Z","timestamp":1760185920000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/2\/222"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,14]]},"references-count":29,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["sym11020222"],"URL":"https:\/\/doi.org\/10.3390\/sym11020222","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,14]]}}}