Skip to main content
Log in

Secure 3D data hiding technique based on a mesh traversal algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to its powerful ability to conceal secret data inside an unsuspicious cover object, image steganography has emerged as an active field of research. Recently, a lot of advancements in relation to software and hardware have been carried out, allowing for faster processing of 3D image models. In turn, this has paved the way for 3D image steganography. This paper proposes a novel approach of secure and reversible data hiding in 3D mesh models. The proposed approach employs a mesh traversal algorithm that is based on the shortest distances between neighboring vertices of the mesh. The fourth and fifth decimal places of the Cartesian coordinate vertices after the decimal point are modified to hide the secret data. The proposed approach is evaluated in terms of a number of metrics and is shown to outperform its counterparts from the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Amat P, Puech W, Druon S, Pedeboy JP (2010) Lossless 3d steganography based on mst and connectivity modification. Signal Process Image Commun 25(6):400–412

    Article  Google Scholar 

  2. Anish K, Arpita N, Nikhil H, Sumant K, Bhagya S, Desai S (2017) Intelligence system security based on 3 d image. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications. Springer, pp 159–167

  3. Bogomjakov A, Gotsman C, Isenburg M (2008) Distortion free steganography for polygonal meshes. Comput Graph Forum 27(2):637–642. Wiley Online Library

    Article  Google Scholar 

  4. Cayre F, Macq B (2003) Data hiding on 3 d triangle meshes. IEEE Trans Signal Process 51(4):939–949

    Article  MathSciNet  MATH  Google Scholar 

  5. Cheng YM, Wang CM (2006) A high capacity steganographic approach for 3d polygonal meshes. Vis Comput 22(9 11):845–855

    Article  Google Scholar 

  6. Chuang CH, Cheng CW, Yen ZY (2010) Reversible data hiding with affine invariance for 3d models

  7. Egenfeldt-Nielsen S, Smith JH, Tosca SP (2013) Understanding video games: The essential introduction. Routledge, Evanston

    Book  Google Scholar 

  8. Elkandoz MT, Alexan W, Hussein HH (2019). In: 2019 international conference on advanced communication technologies and networking (CommNet), pp 1–7

  9. Elkandoz MT, Alexan W, Hussein HH (2019) Logistic sine map based image encryption. In: 2019 signal processing: algorithms, architectures, arrangements, and applications (SPA). IEEE, pp 290–295

  10. Elsherif S, Mostafa G, Farrag S, Alexan W (2019) Secure message embedding in 3d images. In: 2019 international conference on Innovative Trends in Computer Engineering (ITCE), pp 117–123

  11. Farrag S, Alexan W (2019) A high capacity geometrical domain based 3d image steganography scheme. In: 2019 international conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–7

  12. Farrag S, Alexan W, Hussein HH (2019) Triple layer image security using a zigzag embedding pattern. In: 2019 international conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–8

  13. Farragand S, Alexan W (2019) Secure 2d image steganography using recaman’s sequence. In: 2019 international conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–6

  14. Girdhar A, Kumar V (2018) Comprehensive survey of 3d image steganography techniques. IET Image Process 12(1):1–10

    Article  Google Scholar 

  15. Girdhar A, Kumar V (2019) A reversible and affine invariant 3d data hiding technique based on difference shifting and logistic map. J Ambient Intell Human Comput :1–15

  16. Hussein R, Alexan W (2019) Secure message embedding in audio. In: 2nd International Conference on Computer Applications Information Security(ICCAIS 2019) Saudi Arabia

  17. Ji H, Fu Z (2019) Coverless information hiding method based on the keyword. Int J High Perform Comput Netw 14(1):1–7

    Article  MathSciNet  Google Scholar 

  18. Ji H, Yang X, Zhang C, Gao X (2010) A new reversible watermarking of 3d models based on ratio expansion. In: 2010 3rd international congress on image and signal processing, vol 8. IEEE, pp 3899–3903

  19. Jiang N, Wang L (2015) A novel strategy for quantum image steganography based on moire pattern. Int J Theor Phys 54(3):1021–1032

    Article  MATH  Google Scholar 

  20. Li N, Hu J, Sun R, Wang S, Luo Z (2017) A high capacity 3d steganography algorithm with adjustable distortion. IEEE Access 5:24457–24466

    Article  Google Scholar 

  21. Mao X, Shiba M, Imamiya A (2001) Watermarking 3d geometric models through triangle subdivision. In: Security and watermarking of multimedia contents III. International Society for Optics and Photonics, vol 4314, pp 253–261

  22. Maret Y, Ebrahimi T (2004) Data hiding on 3d polygonal meshes. In: Proceedings of the 2004 workshop on multimedia and security. ACM, pp 68–74

  23. Niu K, Li J, Yang X, Zhang S, Wang B (2019) Hybrid adaptive video steganography scheme under game model. IEEE Access 7:61 523–61 533

    Article  Google Scholar 

  24. Ohbuchi R, Masuda H, Aono M (1998) Watermarking three dimensional polygonal models through geometric and topological modifications. IEEE J Sel Areas Commun 16(4):551–560

    Article  Google Scholar 

  25. Pan Z, Ma X, Deng X (2014) New reversible full–embeddable information hiding method for vector quantisation indices based on locally adaptive complete coding list. IET Image Process 9(1):22–30

    Article  Google Scholar 

  26. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  27. Rahmani P, Dastghaibyfard G (2018) Two reversible data hiding schemes for vq–compressed images based on index coding. IET Image Process 12 (7):1195–1203

    Article  Google Scholar 

  28. Sarreshtedari S, Akhaee MA (2013) One-third probability embedding: anew± 1 histogram compensating image least significant bit steganography scheme. IET Image Process 8(2):78–89

    Article  Google Scholar 

  29. Thiyagarajan P, Natarajan V, Aghila G, Venkatesan VP, Anitha R (2013) Pattern based 3d image steganography. 3D Res 4(1):1–8

    Article  Google Scholar 

  30. Tsai YY (2014) An adaptive steganographic algorithm for 3d polygonal models using vertex decimation. Multimed Tools Appl 69(3):859–876

    Article  Google Scholar 

  31. Tsai YY (2016) A distortion free data hiding scheme for triangular meshes based on recursive subdivision. Adv Multimed 2016

  32. Xu D (2019) Commutative encryption and data hiding in hevc video compression. IEEE Access 7:66 028–66 041

    Article  Google Scholar 

  33. Yi X, Yang K, Zhao X, Wang Y, Yu H (2019) Ahcm: Adaptive huffmancode mapping for audio steganography based on psychoacoustic model. IEEE Trans Inf Forensics Secur 14(8):2217–2231

    Article  Google Scholar 

  34. Zhang X, Goesele M, Sourin A (2016) Haptic interaction with a polygon mesh reconstructed from images. In: Cyber worlds (CW), 2016 international conference on IEEE, pp 49–56

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sara Farrag.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farrag, S., Alexan, W. Secure 3D data hiding technique based on a mesh traversal algorithm. Multimed Tools Appl 79, 29289–29303 (2020). https://doi.org/10.1007/s11042-020-09437-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09437-w

Keywords

Navigation