The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2017 IEEE International Conference on Image Processing (ICIP) 2017
DOI: 10.1109/icip.2017.8296333
|View full text |Cite
|
Sign up to set email alerts
|

Rethinking the high capacity 3D steganography: Increasing its resistance to steganalysis

Abstract: ABSTRACT3D steganography is used in order to embed or hide information into 3D objects without causing visible or machine detectable modifications. In this paper we rethink about a high capacity 3D steganography based on the Hamiltonian path quantization, and increase its resistance to steganalysis. We analyze the parameters that may influence the distortion of a 3D shape as well as the resistance of the steganography to 3D steganalysis. According to the experimental results, the proposed high capacity 3D steg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 17 publications
(18 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…In addition, the image is just one of the types of cover which may be maliciously used, while text, voice, protocol packets, and other types of data may also be utilized to transit secret confidential information. [32][33][34] Therefore, how to reliably detect the hidden secret information of various multimedia data transmitted in the Internet of Things should be solved for ensuring the security of the Internet of Things.…”
Section: Resultsmentioning
confidence: 99%
“…In addition, the image is just one of the types of cover which may be maliciously used, while text, voice, protocol packets, and other types of data may also be utilized to transit secret confidential information. [32][33][34] Therefore, how to reliably detect the hidden secret information of various multimedia data transmitted in the Internet of Things should be solved for ensuring the security of the Internet of Things.…”
Section: Resultsmentioning
confidence: 99%
“…High-capacity based 3D mesh steganography can be classified into two categories: distortionless steganography based on order permutation [18,19,20], and distorted steganography based on vertex shifting [7,8,9,10,11,12]. For distortionless steganography, Bogomjakov et al [18] propose to hide messages in the indexed representation of a mesh by permuting the order in which faces and vertices are stored.…”
Section: D Mesh Steganographymentioning
confidence: 99%
“…Recently, 3D mesh steganography technologies have been actively investigated due to the rapid expansion of 3D techniques, and they can be mainly classified into two categories: low-capacity [2,3,4,5,6] and high-capacity steganography [7,7,8,9,10,11,12]. Correspondingly, to detect whether a mesh contains hidden data, 3D mesh steganalysis algorithms [13,14,15,16,17] are being developed.…”
Section: Introductionmentioning
confidence: 99%
“…3D objects are becoming increasingly used in many application areas, such as computer aided design, 3D printing, virtual reality, augmented reality, medical imaging and so on. A number of watermarking and steganographic methods have been proposed for embedding information into the 3D objects for various applications [1,2,3,4,5,6]. The embedding changes produced to the 3D objects are supposed not to be noticeable by the naked eye.…”
Section: Introductionmentioning
confidence: 99%