Combining and Steganography of 3-D Face Textures

Authors

  • Mohammad-Reza Sadeghi Department of Mathematics and Computer Science, Amirkabir University of Technology – Tehran Polytechnic, Tehran, Iran
  • Mohsen Moradi Department of Mathematics and Computer Science, Amirkabir University of Technology – Tehran Polytechnic, Tehran, Iran
Abstract:

One of the serious issues in communication between people is hiding information from the others, and the best way for this, is to deceive them. Since nowadays face images are mostly used in three dimensional format, in this paper we are going to steganography 3-D face images and detecting which by curious people will be impossible. As in detecting face only, its texture is important, we separate texture from shape matrices, for eliminating half of the extra information. Steganography is done only for face texture, and for reconstructing a 3-D face, we can use any other shape. Moreover, we will indicate that, by using two textures, how two 3-D faces can be combined. For a complete description of the process, first, 2-D faces are used as an input for building 3-D faces, and then 3-D face and texture matrices are extracted separately from the constructed 3-D face. Finally, 3-D textures are hidden within the other images.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Combining and Steganography of 3D Face Textures

One of the serious issues in communication between people is hiding information from others, and the best way for this is deceiving them. Since nowadays face images are mostly used in a three-dimensional format, in this paper we are going to steganography 3-D face images, detecting which by curious people will be impossible. As in detecting the face, only its texture is important, we separate t...

full text

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

full text

Dry Friction and Wear Performance of Micro Surface Textures Generated by Ultrasonic Assisted Face Turning

Nowadays the surface texturing has been widely recognized as a usable capability to improve the tribological systems. In this paper, ultrasonic assisted turning (UAT) isperformed to create the micro textures on the flat faces. Micro surface texturing ismade on the Al7075-T6 by the UAT in the face turning process. Then, the influences of cutting speed feed, vibration direction and vibration ampl...

full text

Combining 3 D printing and printable electronics

A platform that enables the integration of conductive traces and printed three dimensional mechanical structures has been developed. We discuss the development of the platform and address issues that arise when combining 3D printing and printable electronics. We demonstrate a rapid prototyped three dimensional conductive trace and propose future applications for the platform.

full text

Face Modeling and Recognition in 3-D

We demonstrate a complete and automatic system to perform face authentication by analysis of 3-D facial shape. In this live demonstration of the system, the subject is first enrolled, and given a unique identifier. Subsequently, the user’s identity is verified by providing the reference identifier. Our approach is to be contrasted with traditional face recognition methods, which compare picture...

full text

Flexible and Robust 3 D Face Recognition

by Timothy C. Faltemier Face recognition is one of the least intrusive modalities in biometrics. Our research shows that using 3D face data for recognition provides a promising route to improved performance. In this dissertation, we introduce a new system for 3D face recognition that addresses many of the current challenges preventing this technology from becoming viable. The first challenge is...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 5  issue 2

pages  93- 100

publication date 2017-10-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023