An Algorithm Based on Skeleton Extraction and Inscribed Sphere Analysis for 3D Model Information Hiding

نویسندگان

  • Tao Zhang
  • Dejun Mu
  • Shuai Ren
چکیده

Abstract Invisibility, robustness and blindness are three difficult points for 3D model information hiding. In this paper, a new robust and blind information hiding algorithm for 3D models is proposed. Skeleton of 3D models is extracted, and skeleton points are obtained inside the objects at the same time. Taking skeleton points as centers, EMIS are obtained according to Euclidean Maximum Inscribed Sphere (EMIS) in skeleton definition to ensure invisibility and robustness. Setting threshold, get Minimum Inscribed Sphere (MIS) based on EMIS. Keep the radius of MIS be no less than the threshold. Take the parity of MIS earned times as the modification space for information hiding. The Rate of Barycenter and Cross-point (RBC) is used as an auxiliary method to improve robustness and blindness. Experiments prove that this algorithm is of good feasibility, invisibility and robustness against common attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Curve-Skeleton Extraction Algorithm Based On Vector Fields for 3D Model Retrieval

Feature extraction is a key issue for 3d model retrieval. A novel architecture to extract the curve-skeleton of 3d model is introduced. The algorithm firstly calculates the 3D vector fields of models represented by discrete unit, and then extracts the hierarchical curve-skeleton based on topological features of the critical curve and critical points of the vector fields. The similarity among 3D...

متن کامل

Accurate Fruits Fault Detection in Agricultural Goods using an Efficient Algorithm

The main purpose of this paper was to introduce an efficient algorithm for fault identification in fruits images. First, input image was de-noised using the combination of Block Matching and 3D filtering (BM3D) and Principle Component Analysis (PCA) model. Afterward, in order to reduce the size of images and increase the execution speed, refined Discrete Cosine Transform (DCT) algorithm was uti...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

Detection of perturbed quantization (PQ) steganography based on empirical matrix

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...

متن کامل

Curve skeleton extraction by coupled graph contraction and surface clustering

In this paper, we present a practical algorithm to extract a curve skeleton of a 3D shape. The core of our algorithm comprises coupled processes of graph contraction and surface clustering. Given a 3D shape represented by a triangular mesh, we first construct an initial skeleton graph by directly copying the connectivity and geometry information from the input mesh. Graph contraction and surfac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012