Abstract
Image steganography has evolved as an active area of research because of its advantage to hide secret information inside an ingenuous image invisibly. In the recent years, improvements have been done in hardware to process 3D image models which laid down the path for 3D image steganography. The proposed work presents a novel approach of reversible data hiding in 3D mesh models. Difference between the vertices is shifted to hide secret bits inside the vertices. Chaotic logistic map is also used in the proposed work to decide the coordinate taken up for embedding. The proposed blind steganography system withstands rotation, scaling and translation attacks. Novel mesh traversal algorithm is proposed to visit the mesh vertices. This algorithm gives a unique mesh traversal algorithm for every 3D mesh model. The performance of proposed approach is compared with three well-known image steganography approaches over five cover models. The experimental results reveal that the difference between stego model and cover model cannot be observed by human eye. The proposed approach provides better embedding capacity than the previous approach in the field of reversible data hiding in 3D cover models.












Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Amat P, Puech W, Druon S, Pedeboy J (2010) Lossless 3D steganography based on MST and connectivity modification signal processing. Image commun 25(6):400–412. https://doi.org/10.1016/j.image.2010.05.002
Andrecut M (1998) Logistic map as a random number generator. Int J Mod Phys B 12(9):921–930. https://doi.org/10.1142/S021797929800051X
Anish K, Arpita N, Nikhil H, Sumant K, Bhagya S, Desai S (2017) Intelligence system security based on 3-D image. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications, advances in intelligent systems and computing, pp 159–167. https://doi.org/10.1007/978-981-10-3153-3_16
Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144. https://doi.org/10.1016/j.sigpro.2018.02.007
Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010
Cheng Y, Wang C (2006) A high-capacity steganographic approach for 3D polygonal meshes. Vis Comput 22(9–11):845–855. https://doi.org/10.1007/s00371-006-0069-4
Chuang H, Cheng C, Yen Z (2010) Reversible data hiding with affine invariance for 3D model. In: Proceedings of IET international conference on frontier computing, theory, technologies and applications, pp 77–81. https://doi.org/10.1049/cp.2010.0541
Computer graphics (2018) Computer graphics at Stanford University. http://graphics.stanford.edu/data/3Dscanrep/. Accessed 19 June 2018
Girdhar A, Kumar V (2017) Comprehensive survey of 3D image steganography techniques. IET Image Proc 12(1):1–10. https://doi.org/10.1049/iet-ipr.2017.0162
Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-5902-z
Gruen A, Akca D (2005) Least squares 3D surface and curve matching. ISPRS J Photogramm Remote Sens 59(3):151–174. https://doi.org/10.1016/j.isprsjprs.2005.02.006
Huang Y, Tsai Y (2015) A reversible data hiding scheme for 3D polygonal models based on histogram shifting with high embedding capacity. 3D Res. https://doi.org/10.1007/s13319-015-0051-x
Jhou C, Pan J, Chou D (2007) Reversible data hiding base on histogram shift for 3D vertex. In: Proceedings of third international conference on international information hiding and multimedia signal processing, vol 1, pp 365–370. https://doi.org/10.1109/IIH-MSP.2007.268
Ji H, Yang X, Zhang C, Gao X (2010) A new reversible watermarking of 3D models based on ratio expansion. In: 3rd international congress on image and signal processing, Yantai, China. https://doi.org/10.1109/CISP.2010.564762
Kumar M, Powduri P, Redd (2015) A RGB image encryption using diffusion process associated with chaotic map. J Inf Secur Appl 21:20–30
Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026
Li N, Hu J, Sun R, Wang S, Luo Z (2017) A high-capacity 3D steganography algorithm with adjustable distortion. IEEE Access 5:24457–24466. https://doi.org/10.1109/access.2017.2767072
Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42. https://doi.org/10.1080/0161-118991863745
MeshLab (2018) MeshLab, http://www.meshlab.net/. Accessed 1 June 2018
Ni Z, Su W, Shi Y, Ansari N (2006) Reversible data hiding. IEEE Transa Circuits Syst Video Technol 16(3):354–362. https://doi.org/10.1109/tcsvt.2006.869964
Safi H, Maghari A (2017) Image encryption using double chaotic logistic map. In: International conference on promising electronic technologies (ICPET), Deir El-Balah, pp 66–70. https://doi.org/10.1109/ICPET.2017.18
Shi Y, Li X, Zhang X, Wu H, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237. https://doi.org/10.1109/access.2016.2573308
Sun J, Liao X, Chen X, Guo S (2017) Privacy-aware image encryption based on logistic map and data hiding. Int J Bifurc Chaos. https://doi.org/10.1142/S0218127417500730
Thiyagarajan P, Natarajan V, Venkatesan V, Anitha R, Aghila G (2013) Pattern based 3D image steganography. 3D Res 4(1):1–8. https://doi.org/10.1007/3DRes.01(2013)1
Tian J (2003) Reversible watermarking using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896. https://doi.org/10.1109/TCSVT.2003.815962
Tsai Y (2012) An adaptive steganographic algorithm for 3D polygonal models using vertex decimation. Multimed Tools Appl, 69(3):859–876. https://doi.org/10.1007/s11042-012-1135-8
Tsai Y (2016) A distortion-free data hiding scheme for triangular meshes based on recursive subdivision. Adv Multimed 2016:1–10. https://doi.org/10.1155/2016/4267419
Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79–86
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Girdhar, A., Kumar, V. A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map. J Ambient Intell Human Comput 10, 4947–4961 (2019). https://doi.org/10.1007/s12652-019-01179-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-019-01179-4