Skip to main content

Steganography for Three-Dimensional Models

  • Conference paper
Advances in Computer Graphics (CGI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 4035))

Included in the following conference series:

Abstract

We present a data hiding algorithm for 3D models. It is based on a substitutive procedure in the spatial domain. We propose a Virtual Multi-Level Embed Procedure to embed information based on shifting the message point by its virtual geometrical property, the order of which is assigned by principal component analysis. We have defined and validated an effective metric of distortion anticipation, which can help us easily anticipate and control the distortion rate. Experimental results show that the proposed technique is efficient and secure, has high capacity and low distortion, and is robust against affine transformations. It provides a reversible method and has proven to be feasible in data hiding.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding - A Survey. Proc. IEEE Special Issue on Protection of Multimedia Content 87(7), 1062–1078 (1999)

    Google Scholar 

  2. Ohbuchi, R., Mukaiyama, A., Takahashi, S.: A Frequency-Domain Approach to Watermarking 3D Shapes. Computer Graphics Forum 21(3), 373–382 (2002)

    Article  Google Scholar 

  3. Cayre, F., Macq, B.: Data Hiding on 3-D Triangle Meshes. IEEE Trans. Signal Processing 51(4), 939–949 (2003)

    Article  MathSciNet  Google Scholar 

  4. Cayre, F., Devillers, O., Schmitt, F., Maitre, H.: Watermarking 3D Triangle Meshes for Authentication and Integrity. Rapport de recherche 5223, INRIA (2004)

    Google Scholar 

  5. Wang, C.M., Cheng, Y.M.: An Efficient Information Hiding Algorithm for Polygon Models. Computer Graphics Forum 24(3), 591–600 (2005)

    Article  Google Scholar 

  6. Wang, C.M., Wang, P.C.: Data Hiding Approach for Point-Sampled Geometry. IEICE Transactions on Communications E88-B, 1, 190–194 (2005)

    Article  Google Scholar 

  7. Cotting, D., Weyrich, T., Pauly, M., Gross, M.: Robust Watermarking of Point-Sampled Geometry. In: Proc. International Conference on Shape Modeling and Applications, pp. 233–242 (2004)

    Google Scholar 

  8. Ohbuchi, R., Mukaiyama, A., Takahashi, S.: Watermarking a 3D Shape Model Defined as a Point Set. In: Proc. of International Conference on Cyberwords, pp. 392–399 (2004)

    Google Scholar 

  9. Rencher, A.C.: Methods of Multivariate Analysis, 2nd edn. Wiley, New York (2002)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cheng, YM., Wang, CM., Tsai, YY., Chang, CH., Wang, PC. (2006). Steganography for Three-Dimensional Models. In: Nishita, T., Peng, Q., Seidel, HP. (eds) Advances in Computer Graphics. CGI 2006. Lecture Notes in Computer Science, vol 4035. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11784203_46

Download citation

  • DOI: https://doi.org/10.1007/11784203_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35638-7

  • Online ISBN: 978-3-540-35639-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics