Open Access Open Access  Restricted Access Subscription Access

A Multilayered Architecture for Hiding Executable Files in 3D Images


Affiliations
1 CSE Dept., Jeppiaar Engg. College, Chennai-600119, India
2 R.M.K. Engineering College, Chennai- 601206, India
 

Steganography is a technique to hide secret messages in a host media called cover media. The advantage of steganography over cryptography is that messages do not attract attention to attackers and even receivers. Steganography and cryptography are often used together to ensure security of the secret messages. This paper introduces steganography work on 3D models. In this paper, we will exploit the geometric characteristics of 3D models to provide high-capacity data hiding. Capacity and invisibility are more important than robustness in the steganography system. Therefore, we aim at maximizing data hiding capacity while limiting distortion of cover models in a lower bounded value. A novel multilayered embedding scheme is proposed for enlarging the hiding capacity. In the extraction procedure, the embedding order can also be obtained using the secret key in the spatial analysis step. The payload can then be correctly extracted in this embedding order.

Keywords

Steganography, Spatial Analysis, Polygon Models, Stego File
User

  • Benedens O (1999) Geometry-based watermarking of 3D polygonal models. Proc. IEEE Computer Graphics & Applications. 19 (1), 45-46.
  • Cayre F, Devillers O, Schmitt F and Maıtre H (2004) Watermarking 3D triangle meshes for authentication and integrity. INRIA Res.Report RR-5223.
  • Chao MW, Lin CH, Yu CW and Lee TY (2009) A high capacity 3D steganography algorithm. IEEE Trans. on visualization and computer graphics. 15 (2), 274-284.
  • Cox IJ, Miller ML and Bloom JA (2000) Digital watermarking.
  • Fridrich J (1999) Applications of data hiding in digital images.Tutorial for the ISSPA, 22-25.
  • Garcia F and Dugelay J (2003) Texture-based watermarking of 3D video objects. IEEE Trans. Circuits & Systems for Video Technol. 13 (8), 853-866.
  • Yin K, Pan Z, Jiaoying S and Zhang D (2001) Robust mesh watermarking based on multiresolution processing. Computers & Graphics. 25, 409-420.
  • Katzenbeisser S and Petitcolas FAP (2000) eds., Information hiding techniques for steganography and digital watermarking. Artech House. pp:156-172.
  • Lin HY, Liao HYM, Lu CS and Lin JC (2005) Fragile watermarking for authenticating 3D polygonal meshes. IEEE Trans. Multimedia. 7 (6), 997-1006.
  • Ohbuchi R, Masuda H and Aono M (1998) Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Selected Areas in Comm. 1, 551-560.
  • Praun E (1999) Robust mesh watermarking. Proc. ACM SIGGRAPH ’99. IJTIC. pp:49-56,
  • Venkat Narayana Rao T and Govardhan A (2009) Reversible watermarking mechanisms - a new paradigm in mage security. Indian J.Sci.Technol. 2 (5), 23-28. Domain site: http://www.indjst.org.
  • Wu HT and Cheung YM (2005) A reversible data hiding approach to mesh authentication. Proc. IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI ’05), 1, 774-777.

Abstract Views: 488

PDF Views: 108




  • A Multilayered Architecture for Hiding Executable Files in 3D Images

Abstract Views: 488  |  PDF Views: 108

Authors

P. Mohan Kumar
CSE Dept., Jeppiaar Engg. College, Chennai-600119, India
K. L. Shunmuganathan
R.M.K. Engineering College, Chennai- 601206, India

Abstract


Steganography is a technique to hide secret messages in a host media called cover media. The advantage of steganography over cryptography is that messages do not attract attention to attackers and even receivers. Steganography and cryptography are often used together to ensure security of the secret messages. This paper introduces steganography work on 3D models. In this paper, we will exploit the geometric characteristics of 3D models to provide high-capacity data hiding. Capacity and invisibility are more important than robustness in the steganography system. Therefore, we aim at maximizing data hiding capacity while limiting distortion of cover models in a lower bounded value. A novel multilayered embedding scheme is proposed for enlarging the hiding capacity. In the extraction procedure, the embedding order can also be obtained using the secret key in the spatial analysis step. The payload can then be correctly extracted in this embedding order.

Keywords


Steganography, Spatial Analysis, Polygon Models, Stego File

References





DOI: https://doi.org/10.17485/ijst%2F2010%2Fv3i4%2F29726