Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kumar, P. Mohan
- A Multilayered Architecture for Hiding Executable Files in 3D Images
Abstract Views :463 |
PDF Views:108
Authors
Affiliations
1 CSE Dept., Jeppiaar Engg. College, Chennai-600119, IN
2 R.M.K. Engineering College, Chennai- 601206, IN
1 CSE Dept., Jeppiaar Engg. College, Chennai-600119, IN
2 R.M.K. Engineering College, Chennai- 601206, IN
Source
Indian Journal of Science and Technology, Vol 3, No 4 (2010), Pagination: 402-407Abstract
Steganography is a technique to hide secret messages in a host media called cover media. The advantage of steganography over cryptography is that messages do not attract attention to attackers and even receivers. Steganography and cryptography are often used together to ensure security of the secret messages. This paper introduces steganography work on 3D models. In this paper, we will exploit the geometric characteristics of 3D models to provide high-capacity data hiding. Capacity and invisibility are more important than robustness in the steganography system. Therefore, we aim at maximizing data hiding capacity while limiting distortion of cover models in a lower bounded value. A novel multilayered embedding scheme is proposed for enlarging the hiding capacity. In the extraction procedure, the embedding order can also be obtained using the secret key in the spatial analysis step. The payload can then be correctly extracted in this embedding order.Keywords
Steganography, Spatial Analysis, Polygon Models, Stego FileReferences
- Benedens O (1999) Geometry-based watermarking of 3D polygonal models. Proc. IEEE Computer Graphics & Applications. 19 (1), 45-46.
- Cayre F, Devillers O, Schmitt F and Maıtre H (2004) Watermarking 3D triangle meshes for authentication and integrity. INRIA Res.Report RR-5223.
- Chao MW, Lin CH, Yu CW and Lee TY (2009) A high capacity 3D steganography algorithm. IEEE Trans. on visualization and computer graphics. 15 (2), 274-284.
- Cox IJ, Miller ML and Bloom JA (2000) Digital watermarking.
- Fridrich J (1999) Applications of data hiding in digital images.Tutorial for the ISSPA, 22-25.
- Garcia F and Dugelay J (2003) Texture-based watermarking of 3D video objects. IEEE Trans. Circuits & Systems for Video Technol. 13 (8), 853-866.
- Yin K, Pan Z, Jiaoying S and Zhang D (2001) Robust mesh watermarking based on multiresolution processing. Computers & Graphics. 25, 409-420.
- Katzenbeisser S and Petitcolas FAP (2000) eds., Information hiding techniques for steganography and digital watermarking. Artech House. pp:156-172.
- Lin HY, Liao HYM, Lu CS and Lin JC (2005) Fragile watermarking for authenticating 3D polygonal meshes. IEEE Trans. Multimedia. 7 (6), 997-1006.
- Ohbuchi R, Masuda H and Aono M (1998) Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Selected Areas in Comm. 1, 551-560.
- Praun E (1999) Robust mesh watermarking. Proc. ACM SIGGRAPH ’99. IJTIC. pp:49-56,
- Venkat Narayana Rao T and Govardhan A (2009) Reversible watermarking mechanisms - a new paradigm in mage security. Indian J.Sci.Technol. 2 (5), 23-28. Domain site: http://www.indjst.org.
- Wu HT and Cheung YM (2005) A reversible data hiding approach to mesh authentication. Proc. IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI ’05), 1, 774-777.