Advertisement

A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map

  • Ashish GirdharEmail author
  • Vijay Kumar
Original Research
  • 55 Downloads

Abstract

Image steganography has evolved as an active area of research because of its advantage to hide secret information inside an ingenuous image invisibly. In the recent years, improvements have been done in hardware to process 3D image models which laid down the path for 3D image steganography. The proposed work presents a novel approach of reversible data hiding in 3D mesh models. Difference between the vertices is shifted to hide secret bits inside the vertices. Chaotic logistic map is also used in the proposed work to decide the coordinate taken up for embedding. The proposed blind steganography system withstands rotation, scaling and translation attacks. Novel mesh traversal algorithm is proposed to visit the mesh vertices. This algorithm gives a unique mesh traversal algorithm for every 3D mesh model. The performance of proposed approach is compared with three well-known image steganography approaches over five cover models. The experimental results reveal that the difference between stego model and cover model cannot be observed by human eye. The proposed approach provides better embedding capacity than the previous approach in the field of reversible data hiding in 3D cover models.

Keywords

Image steganography 3D models Chaotic logistic map Reversible data hiding 

Notes

References

  1. Amat P, Puech W, Druon S, Pedeboy J (2010) Lossless 3D steganography based on MST and connectivity modification signal processing. Image commun 25(6):400–412.  https://doi.org/10.1016/j.image.2010.05.002 Google Scholar
  2. Andrecut M (1998) Logistic map as a random number generator. Int J Mod Phys B 12(9):921–930.  https://doi.org/10.1142/S021797929800051X MathSciNetCrossRefzbMATHGoogle Scholar
  3. Anish K, Arpita N, Nikhil H, Sumant K, Bhagya S, Desai S (2017) Intelligence system security based on 3-D image. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications, advances in intelligent systems and computing, pp 159–167.  https://doi.org/10.1007/978-981-10-3153-3_16
  4. Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144.  https://doi.org/10.1016/j.sigpro.2018.02.007 CrossRefGoogle Scholar
  5. Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752.  https://doi.org/10.1016/j.sigpro.2009.08.010 CrossRefzbMATHGoogle Scholar
  6. Cheng Y, Wang C (2006) A high-capacity steganographic approach for 3D polygonal meshes. Vis Comput 22(9–11):845–855.  https://doi.org/10.1007/s00371-006-0069-4 CrossRefGoogle Scholar
  7. Chuang H, Cheng C, Yen Z (2010) Reversible data hiding with affine invariance for 3D model. In: Proceedings of IET international conference on frontier computing, theory, technologies and applications, pp 77–81.  https://doi.org/10.1049/cp.2010.0541
  8. Computer graphics (2018) Computer graphics at Stanford University. http://graphics.stanford.edu/data/3Dscanrep/. Accessed 19 June 2018
  9. Girdhar A, Kumar V (2017) Comprehensive survey of 3D image steganography techniques. IET Image Proc 12(1):1–10.  https://doi.org/10.1049/iet-ipr.2017.0162 CrossRefGoogle Scholar
  10. Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed Tools Appl.  https://doi.org/10.1007/s11042-018-5902-z Google Scholar
  11. Gruen A, Akca D (2005) Least squares 3D surface and curve matching. ISPRS J Photogramm Remote Sens 59(3):151–174.  https://doi.org/10.1016/j.isprsjprs.2005.02.006 CrossRefGoogle Scholar
  12. Huang Y, Tsai Y (2015) A reversible data hiding scheme for 3D polygonal models based on histogram shifting with high embedding capacity. 3D Res.  https://doi.org/10.1007/s13319-015-0051-x Google Scholar
  13. Jhou C, Pan J, Chou D (2007) Reversible data hiding base on histogram shift for 3D vertex. In: Proceedings of third international conference on international information hiding and multimedia signal processing, vol 1, pp 365–370.  https://doi.org/10.1109/IIH-MSP.2007.268
  14. Ji H, Yang X, Zhang C, Gao X (2010) A new reversible watermarking of 3D models based on ratio expansion. In: 3rd international congress on image and signal processing, Yantai, China.  https://doi.org/10.1109/CISP.2010.564762
  15. Kumar M, Powduri P, Redd (2015) A RGB image encryption using diffusion process associated with chaotic map. J Inf Secur Appl 21:20–30Google Scholar
  16. Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145.  https://doi.org/10.1016/j.sigpro.2018.01.026 CrossRefGoogle Scholar
  17. Li N, Hu J, Sun R, Wang S, Luo Z (2017) A high-capacity 3D steganography algorithm with adjustable distortion. IEEE Access 5:24457–24466.  https://doi.org/10.1109/access.2017.2767072 CrossRefGoogle Scholar
  18. Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42.  https://doi.org/10.1080/0161-118991863745 MathSciNetCrossRefGoogle Scholar
  19. MeshLab (2018) MeshLab, http://www.meshlab.net/. Accessed 1 June 2018
  20. Ni Z, Su W, Shi Y, Ansari N (2006) Reversible data hiding. IEEE Transa Circuits Syst Video Technol 16(3):354–362.  https://doi.org/10.1109/tcsvt.2006.869964 CrossRefGoogle Scholar
  21. Safi H, Maghari A (2017) Image encryption using double chaotic logistic map. In: International conference on promising electronic technologies (ICPET), Deir El-Balah, pp 66–70.  https://doi.org/10.1109/ICPET.2017.18
  22. Shi Y, Li X, Zhang X, Wu H, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237.  https://doi.org/10.1109/access.2016.2573308 CrossRefGoogle Scholar
  23. Sun J, Liao X, Chen X, Guo S (2017) Privacy-aware image encryption based on logistic map and data hiding. Int J Bifurc Chaos.  https://doi.org/10.1142/S0218127417500730 zbMATHGoogle Scholar
  24. Thiyagarajan P, Natarajan V, Venkatesan V, Anitha R, Aghila G (2013) Pattern based 3D image steganography. 3D Res 4(1):1–8.  https://doi.org/10.1007/3DRes.01(2013)1 CrossRefGoogle Scholar
  25. Tian J (2003) Reversible watermarking using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896.  https://doi.org/10.1109/TCSVT.2003.815962 CrossRefGoogle Scholar
  26. Tsai Y (2012) An adaptive steganographic algorithm for 3D polygonal models using vertex decimation. Multimed Tools Appl, 69(3):859–876.  https://doi.org/10.1007/s11042-012-1135-8 CrossRefGoogle Scholar
  27. Tsai Y (2016) A distortion-free data hiding scheme for triangular meshes based on recursive subdivision. Adv Multimed 2016:1–10.  https://doi.org/10.1155/2016/4267419 CrossRefGoogle Scholar
  28. Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79–86CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Thapar Institute of Engineering and TechnologyPatialaIndia

Personalised recommendations