A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis

被引:0
作者
Ren, Shuai [1 ]
Ma, Liming [1 ]
Feng, Qiuyu [1 ]
机构
[1] Changan Univ, Sch Informat Engn, Xian, Peoples R China
来源
DIGITAL FORENSICS AND CYBER CRIME, PT 1, ICDF2C 2023 | 2024年 / 570卷
基金
中国国家自然科学基金;
关键词
Information hiding; Multi carrier; Carrier classification; Dual 3D model; Spectrum analysis;
D O I
10.1007/978-3-031-56580-9_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to avoid multiple degradation of 3D models in Cartesian coordinate system, this paper converts cartesian coordinate system to spherical coordinates, and proposes a multi carrier information hiding algorithm based on dual 3D model spectrum analysis. Firstly, the 3D model carrier set is standardized and preprocessed, and the carrier set is classified by calculating the Euler characteristic of each model. Secondly, construct the spectral standard orthogonal basis function of the dual model, and project the attribute values of each vertex onto a fixed standard orthogonal basis to obtain the corresponding spectral coefficients. Finally, the double information hiding is completed by modifying the polar diameter under the spherical coordinate system of each vertex and the geometric attributes under the Cartesian coordinate system. The experimental results show that in terms of robustness indicators, the algorithm improves its BCR values by 17.78%, 12.46%, 10.19%, 7.00%, 14.44%, 10.79%, 14.05%, 10.54%, 19.53%, 13.70%, 14.17%, and 10.26%, respectively, when compared with the two comparison algorithms in the face of 12.5 degrees rotation, 0.7% noise addition, 50% simplification, 40% cutting, 70% remeshing, and 30 smoothing attacks. This algorithm has improved its performance in terms of invisibility, robustness, and anti-analysis, making it suitable for the field of information security transmission.
引用
收藏
页码:117 / 131
页数:15
相关论文
共 9 条
[1]   High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes [J].
Elhamzi, Wajdi ;
Jallouli, Malika ;
Bouteraa, Yassine .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02) :4329-4347
[2]   q-Extension of the Euler formula and trigonometric functions [J].
Kim, T. .
RUSSIAN JOURNAL OF MATHEMATICAL PHYSICS, 2007, 14 (03) :275-278
[3]   Optical image encryption technique based on compressed sensing and Arnold transformation [J].
Liu, Xiaoyong ;
Cao, Yiping ;
Lu, Pei ;
Lu, Xi ;
Li, Yang .
OPTIK, 2013, 124 (24) :6590-6593
[4]   Information-theoretic analysis of information hiding [J].
Moulin, P ;
O'Sullivan, JA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (03) :563-593
[5]   High embedding capacity in 3D model using intelligent Fuzzy based clustering [J].
Narendra, Modigari ;
Valarmathi, M. L. ;
Anbarasi, L. Jani ;
Sarobin, M. Vergin Raja ;
Al-Turjman, Fadi .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (20) :17783-17792
[6]   A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models [J].
Peng, Fei ;
Long, Bo ;
Long, Min .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (11) :4538-4553
[7]  
Ren S., 2018, Comput. Appl., V38, P1017
[8]  
Wang Xinyu, 2011, Journal of Jiangsu University Natural Science Edition, V32, P695, DOI 10.3969/j.issn.1671-7775.2011.06.015
[9]   Wavelet-based high-capacity watermarking of 3-D irregular meshes [J].
Zaid, A. Ouled ;
Hachani, M. ;
Puech, W. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (15) :5897-5915