A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map

被引:28
作者
Girdhar, Ashish [1 ]
Kumar, Vijay [1 ]
机构
[1] Thapar Inst Engn & Technol, Patiala, Punjab, India
关键词
Image steganography; 3D models; Chaotic logistic map; Reversible data hiding; CHAOTIC SYSTEM; ALGORITHM;
D O I
10.1007/s12652-019-01179-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image steganography has evolved as an active area of research because of its advantage to hide secret information inside an ingenuous image invisibly. In the recent years, improvements have been done in hardware to process 3D image models which laid down the path for 3D image steganography. The proposed work presents a novel approach of reversible data hiding in 3D mesh models. Difference between the vertices is shifted to hide secret bits inside the vertices. Chaotic logistic map is also used in the proposed work to decide the coordinate taken up for embedding. The proposed blind steganography system withstands rotation, scaling and translation attacks. Novel mesh traversal algorithm is proposed to visit the mesh vertices. This algorithm gives a unique mesh traversal algorithm for every 3D mesh model. The performance of proposed approach is compared with three well-known image steganography approaches over five cover models. The experimental results reveal that the difference between stego model and cover model cannot be observed by human eye. The proposed approach provides better embedding capacity than the previous approach in the field of reversible data hiding in 3D cover models.
引用
收藏
页码:4947 / 4961
页数:15
相关论文
共 27 条
[1]   Lossless 3D steganography based on MST and connectivity modification [J].
Amat, P. ;
Puech, W. ;
Druon, S. ;
Pedeboy, J. P. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2010, 25 (06) :400-412
[2]   Logistic map as a random number generator [J].
Andrecut, M .
INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 1998, 12 (09) :921-930
[3]   Intelligence System Security Based on 3-D Image [J].
Anish, K. ;
Arpita, N. ;
Nikhil, H. ;
Sumant, K. ;
Bhagya, S. ;
Desai, S. D. .
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 :159-167
[4]  
[Anonymous], 2018, COMP GRAPH STANF U
[5]   An image encryption algorithm based on chaotic system and compressive sensing [J].
Chai, Xiuli ;
Zheng, Xiaoyu ;
Gan, Zhihua ;
Han, Daojun ;
Chen, Yiran .
SIGNAL PROCESSING, 2018, 148 :124-144
[6]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[7]   A high-capacity steganographic approach for 3D polygonal meshes [J].
Cheng, Yu-Ming ;
Wang, Chung-Ming .
VISUAL COMPUTER, 2006, 22 (9-11) :845-855
[8]   Constitutive Law for Miniaturized Quantitative Microdialysis [J].
Chen, C-f. .
26TH SOUTHERN BIOMEDICAL ENGINEERING CONFERENCE: SBEC 2010, 2010, 32 :77-80
[9]   A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences [J].
Girdhar, Ashish ;
Kumar, Vijay .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) :27017-27039
[10]   Comprehensive survey of 3D image steganography techniques [J].
Girdhar, Ashish ;
Kumar, Vijay .
IET IMAGE PROCESSING, 2018, 12 (01) :1-10