Abstract
Due to its powerful ability to conceal secret data inside an unsuspicious cover object, image steganography has emerged as an active field of research. Recently, a lot of advancements in relation to software and hardware have been carried out, allowing for faster processing of 3D image models. In turn, this has paved the way for 3D image steganography. This paper proposes a novel approach of secure and reversible data hiding in 3D mesh models. The proposed approach employs a mesh traversal algorithm that is based on the shortest distances between neighboring vertices of the mesh. The fourth and fifth decimal places of the Cartesian coordinate vertices after the decimal point are modified to hide the secret data. The proposed approach is evaluated in terms of a number of metrics and is shown to outperform its counterparts from the literature.
Similar content being viewed by others
References
Amat P, Puech W, Druon S, Pedeboy JP (2010) Lossless 3d steganography based on mst and connectivity modification. Signal Process Image Commun 25(6):400–412
Anish K, Arpita N, Nikhil H, Sumant K, Bhagya S, Desai S (2017) Intelligence system security based on 3 d image. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications. Springer, pp 159–167
Bogomjakov A, Gotsman C, Isenburg M (2008) Distortion free steganography for polygonal meshes. Comput Graph Forum 27(2):637–642. Wiley Online Library
Cayre F, Macq B (2003) Data hiding on 3 d triangle meshes. IEEE Trans Signal Process 51(4):939–949
Cheng YM, Wang CM (2006) A high capacity steganographic approach for 3d polygonal meshes. Vis Comput 22(9 11):845–855
Chuang CH, Cheng CW, Yen ZY (2010) Reversible data hiding with affine invariance for 3d models
Egenfeldt-Nielsen S, Smith JH, Tosca SP (2013) Understanding video games: The essential introduction. Routledge, Evanston
Elkandoz MT, Alexan W, Hussein HH (2019). In: 2019 international conference on advanced communication technologies and networking (CommNet), pp 1–7
Elkandoz MT, Alexan W, Hussein HH (2019) Logistic sine map based image encryption. In: 2019 signal processing: algorithms, architectures, arrangements, and applications (SPA). IEEE, pp 290–295
Elsherif S, Mostafa G, Farrag S, Alexan W (2019) Secure message embedding in 3d images. In: 2019 international conference on Innovative Trends in Computer Engineering (ITCE), pp 117–123
Farrag S, Alexan W (2019) A high capacity geometrical domain based 3d image steganography scheme. In: 2019 international conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–7
Farrag S, Alexan W, Hussein HH (2019) Triple layer image security using a zigzag embedding pattern. In: 2019 international conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–8
Farragand S, Alexan W (2019) Secure 2d image steganography using recaman’s sequence. In: 2019 international conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–6
Girdhar A, Kumar V (2018) Comprehensive survey of 3d image steganography techniques. IET Image Process 12(1):1–10
Girdhar A, Kumar V (2019) A reversible and affine invariant 3d data hiding technique based on difference shifting and logistic map. J Ambient Intell Human Comput :1–15
Hussein R, Alexan W (2019) Secure message embedding in audio. In: 2nd International Conference on Computer Applications Information Security(ICCAIS 2019) Saudi Arabia
Ji H, Fu Z (2019) Coverless information hiding method based on the keyword. Int J High Perform Comput Netw 14(1):1–7
Ji H, Yang X, Zhang C, Gao X (2010) A new reversible watermarking of 3d models based on ratio expansion. In: 2010 3rd international congress on image and signal processing, vol 8. IEEE, pp 3899–3903
Jiang N, Wang L (2015) A novel strategy for quantum image steganography based on moire pattern. Int J Theor Phys 54(3):1021–1032
Li N, Hu J, Sun R, Wang S, Luo Z (2017) A high capacity 3d steganography algorithm with adjustable distortion. IEEE Access 5:24457–24466
Mao X, Shiba M, Imamiya A (2001) Watermarking 3d geometric models through triangle subdivision. In: Security and watermarking of multimedia contents III. International Society for Optics and Photonics, vol 4314, pp 253–261
Maret Y, Ebrahimi T (2004) Data hiding on 3d polygonal meshes. In: Proceedings of the 2004 workshop on multimedia and security. ACM, pp 68–74
Niu K, Li J, Yang X, Zhang S, Wang B (2019) Hybrid adaptive video steganography scheme under game model. IEEE Access 7:61 523–61 533
Ohbuchi R, Masuda H, Aono M (1998) Watermarking three dimensional polygonal models through geometric and topological modifications. IEEE J Sel Areas Commun 16(4):551–560
Pan Z, Ma X, Deng X (2014) New reversible full–embeddable information hiding method for vector quantisation indices based on locally adaptive complete coding list. IET Image Process 9(1):22–30
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding a survey. Proc IEEE 87(7):1062–1078
Rahmani P, Dastghaibyfard G (2018) Two reversible data hiding schemes for vq–compressed images based on index coding. IET Image Process 12 (7):1195–1203
Sarreshtedari S, Akhaee MA (2013) One-third probability embedding: anew± 1 histogram compensating image least significant bit steganography scheme. IET Image Process 8(2):78–89
Thiyagarajan P, Natarajan V, Aghila G, Venkatesan VP, Anitha R (2013) Pattern based 3d image steganography. 3D Res 4(1):1–8
Tsai YY (2014) An adaptive steganographic algorithm for 3d polygonal models using vertex decimation. Multimed Tools Appl 69(3):859–876
Tsai YY (2016) A distortion free data hiding scheme for triangular meshes based on recursive subdivision. Adv Multimed 2016
Xu D (2019) Commutative encryption and data hiding in hevc video compression. IEEE Access 7:66 028–66 041
Yi X, Yang K, Zhao X, Wang Y, Yu H (2019) Ahcm: Adaptive huffmancode mapping for audio steganography based on psychoacoustic model. IEEE Trans Inf Forensics Secur 14(8):2217–2231
Zhang X, Goesele M, Sourin A (2016) Haptic interaction with a polygon mesh reconstructed from images. In: Cyber worlds (CW), 2016 international conference on IEEE, pp 49–56
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Farrag, S., Alexan, W. Secure 3D data hiding technique based on a mesh traversal algorithm. Multimed Tools Appl 79, 29289–29303 (2020). https://doi.org/10.1007/s11042-020-09437-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09437-w