Steganography in 3D Geometries and Images by Adjacent Bin Mapping
نویسندگان
چکیده
A steganographic method called adjacent bin mapping (ABM) is presented. Firstly, it is applied to 3D geometries by mapping the coordinates within two adjacent bins for data embedding. When applied to digital images, it becomes a kind of LSB hiding, namely the LSB algorithm. In order to prevent the detection using a metric named histogram tail, the hiding is performed in a pseudorandom order. Then we show that the steganalytic algorithms based on histogram characteristic function (HCF) can be prevented by implementing the LSB algorithm on subsets of pixels having the same neighbor values. The experimental results show that important high-order statistics of the cover image are preserved in this way while little distortion is introduced to 3D geometric models with an appropriate bin size.
منابع مشابه
Steganography in 3 D Geometries and Images by Adjacent BinMapping Hao - TianWu and Jean - Luc Dugelay ( EURASIPMember )
A steganographic method called adjacent bin mapping (ABM) is presented. Firstly, it is applied to 3D geometries by mapping the coordinates within two adjacent bins for data embedding. When applied to digital images, it becomes a kind of LSB hiding, namely the LSB algorithm. In order to prevent the detection using a metric named histogram tail, the hiding is performed in a pseudorandom order. Th...
متن کاملSecure Steganography in Multimedia Content
Steganography, known as the art of covert communication, entered digital world about ten years ago. After gaining special interest of research groups around the world, steganography and steganalysis are slowly reaching maturity. Images produced by digital cameras are typical multimedia carriers where hiding secrets has been studied deeply. They contain a large amount of randomness that is hard ...
متن کاملMultiple Texture Stitching and Blending on 3D Objects
In this paper we propose a new approach for mapping and blending textures on 3D geometries. The system starts from a 3D mesh which represents a real object and improves this model with pictorial detail. Texture detail is acquired via a common photographic process directly from the real object. These images are then registered and stitched on the 3D mesh, by integrating them into a single standa...
متن کاملCombining and Steganography of 3-D Face Textures
One of the serious issues in communication between people is hiding information from the others, and the best way for this, is to deceive them. Since nowadays face images are mostly used in three dimensional format, in this paper we are going to steganography 3-D face images and detecting which by curious people will be impossible. As in detecting face only, its texture is important, we separat...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Information Security
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009