this post was submitted on 07 May 2022
16 points (100.0% liked)
Asklemmy
43855 readers
1818 users here now
A loosely moderated place to ask open-ended questions
Search asklemmy ๐
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- !lemmy411@lemmy.ca: a community for finding communities
~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
you're looking for steganography; I'm not aware of any steganographic constructions involving qrcodes, but there could be some. generally speaking, stego becomes practical in settings where there is unimportant high-entropy data which can be replaced with an encoding of the (typically encrypted) hidden message without altering the "cover" message in a detectable way. it might seem like this is the case with qrcodes due to the error correction; if you change a few random parts of the qrcode, due to the error correction it might still decode properly. However, this is probably easily detectable if the adversary has a high-resolution image of a candidate "maybe stego" qrcode: if decoding and re-encoding it produces a different qrcode, that would indicate that there had been extra data hidden in the error correction. (or, using a more advanced decoder than the typical ones, they could also simply see what the error rate is.)