A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A 3D Steganalytic Algorithm and Steganalysis-Resistant Watermarking
2017
IEEE Transactions on Visualization and Computer Graphics
Ioannis (2016) 'A 3D steganalytic algorithm and steganalysis-resistant watermarking.', IEEE transactions on visualization and computer graphics. . ...
Abstract-We propose a simple yet efficient steganalytic algorithm for watermarks embedded by two state-of-the-art 3D watermarking algorithms by Cho et al. ...
To compare the suitability of the continuous and the discrete statistics to carry steganalysis-resistant watermarks we run the steganalytic algorithm on the test set of clean models with the real values ...
doi:10.1109/tvcg.2016.2525771
pmid:26863664
fatcat:ite46t4uczftpivczhsoboon7q
Rethinking the high capacity 3D steganography: Increasing its resistance to steganalysis
2017
2017 IEEE International Conference on Image Processing (ICIP)
3D steganalysis aims to find the changes embedded through steganographic or information hiding algorithms into 3D models. ...
We test the performance of the extended local feature set, and compare it to four other steganalytic features, when detecting the stego-objects watermarked by six information hiding algorithms. ...
[16, 4] proposed a new steganalytic algorithm, specifically designed for the ro-bust 3D watermarking algorithm, MRS, proposed in [1] . ...
doi:10.1109/icip.2017.8296333
dblp:conf/icip/LiBPB17
fatcat:ikuzsemjzfaglii7ojjg7fpu5a
3D Steganalysis Using the Extended Local Feature Set
2018
2018 25th IEEE International Conference on Image Processing (ICIP)
3D steganalysis aims to find the changes embedded through steganographic or information hiding algorithms into 3D models. ...
We test the performance of the extended local feature set, and compare it to four other steganalytic features, when detecting the stego-objects watermarked by six information hiding algorithms. ...
[16, 4] proposed a new steganalytic algorithm, specifically designed for the ro-bust 3D watermarking algorithm, MRS, proposed in [1] . ...
doi:10.1109/icip.2018.8451643
dblp:conf/icip/LiGLB18
fatcat:2kfh4kynube75fojozk4tjphba
3D Steganalysis Using Laplacian Smoothing at Various Levels
[chapter]
2018
Lecture Notes in Computer Science
3D objects are becoming ubiquitous while being used by many mobile and social network applications. Meanwhile, such objects are also becoming a channel being used for covert communication. ...
This research study analyses the influence of the 3D object smoothing, which is an essential step before extracting the features used for 3D steganalysis. ...
Acknowledgement This paper was partially supported by National Natural Science Foundation of China (No. 61772549, 61602508, U1736214, 61572052 and U1636219). ...
doi:10.1007/978-3-030-00021-9_21
fatcat:zgm64iwvwzckre2yttkw46m2wm
Mesh Discriminative Features for 3D Steganalysis
2014
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
For a given steganographic or watermarking algorithm, we create a training set containing unmarked meshes and meshes marked by that algorithm, and train a classifier using Quadratic Discriminant Analysis ...
Ioannis (2014) 'Mesh discriminative features for 3D steganalysis.', ACM transactions on multimedia computing, communications and applications., 10 (3). p. 27. ...
TRIANGLE MESH STEGANALYSIS Given a target watermarking/steganographic algorithm, the steganalytic algorithm extracts N -dimensional feature vectors F i from a training set of clean and watermarked models ...
doi:10.1145/2535555
fatcat:qbipunmmdnhefkdorlau472ajm
A steganalytic algorithm for 3D polygonal meshes
2014
2014 IEEE International Conference on Image Processing (ICIP)
Ioannis (2014) 'A steganalytic algorithm for 3D polygonal meshes. ...
The second contribution, described in Section 3, is a modification of Cho et al.'s algorithm which is more resistant against the steganalytic attack. ...
Contribution: In Section 2, we propose a steganalytic algorithm for detecting the presence of a watermark hidden by Cho et al.'s mean-based algorithm [1] . ...
doi:10.1109/icip.2014.7025969
dblp:conf/icip/YangPRI14
fatcat:scscrfrcmng37bvac6mbyunlva
Steganalysis of 3D objects using statistics of local feature sets
2017
Information Sciences
3D steganalysis aims to identify subtle invisible changes produced in graphical objects through digital watermarking or steganography. ...
Three different watermarking and steganographic methods are used for hiding information in the 3D objects used for testing the performance of the proposed steganalysis methodology. ...
Acknowledgements The authors would like to thank the anonymous editor and reviewers for their constructive comments. ...
doi:10.1016/j.ins.2017.06.011
fatcat:cyawlygti5afvewlmqh4v3fzuq
Steganography with Least Histogram Abnormality
[chapter]
2003
Lecture Notes in Computer Science
The proposed technique is capable of resisting the χ 2 test and RS analysis, as well as a new steganalytic method named GPC analysis as introduced in this paper. ...
In the described steganographic technique, a pair of mutually complementary mappings, F1 and F − 1, is used, leading to a balanced behavior of several statistical parameters explored by several steganalytic ...
Anti-steganalysis Performance Resistance Against χ 2 Test. ...
doi:10.1007/978-3-540-45215-7_34
fatcat:ekeq52cmujgtvpds6qadxkz4ba
Feature-Preserving Tensor Voting Model for Mesh Steganalysis
2019
IEEE Transactions on Visualization and Computer Graphics
We propose a neighborhood-level representation-guided tensor voting model for 3D mesh steganalysis. ...
In the proposed steganalytic scheme, the normal voting tensor (NVT) operation is performed on original mesh faces and smoothed mesh faces separately. ...
Whereas 3D watermarking focuses on protecting copyright ownership and reducing the counterfeiting of digital multimedia, 3D mesh steganography focuses on covert communication against steganalysis. ...
doi:10.1109/tvcg.2019.2929041
pmid:31331894
fatcat:6asyy3dvr5aqpi5wxqpbysf2oq
Robust video steganography for social media sharing based on principal component analysis
2022
EURASIP Journal on Information Security
Experimental results have shown that our proposed method provides stronger robustness against video transcoding than other methods and achieves satisfactory security performance against steganalysis. ...
A new strategy based on principal component analysis is provided to select robust embedding regions. Besides, side information is generated to label these selected regions. ...
[19] proposed a robust video watermarking algorithm based on dualtree complex wavelet transform. This algorithm is robust against video compression, scaling, and rotation attacks. ...
doi:10.1186/s13635-022-00130-z
fatcat:dcimrieicfbchi2rmhudzvma5a
Information Security through Image Steganography
2019
International Journal of Engineering and Advanced Technology
Further a discussion on the challenges and the future direction and trends of image steganography are also presented. ...
Sending or receiving confidential information in an undetected form has been a major challenge. Steganography is the art or process of concealing information inside a text, audio or image file. ...
These techniques are also more resistant to attacks as they use more significant areas of the cover image to hide the information and are thus also used in to watermark the images [20] . ...
doi:10.35940/ijeat.a2121.109119
fatcat:3xunudfgeva4zd2cw2pq6l5hba
Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map
2013
Journal of Communications
He is a member at ACM and IEEE and a reviewer of several journals and International Conferences. He has published more than hundred papers including journal and conferences. ...
This paper proposes a new blind steganographic method for digital images that combines spatial and frequency domains and does not rely on the cover image in extracting the secret information. ...
3D steganography [38] . ...
doi:10.12720/jcm.8.11.690-699
fatcat:uezosqkiazd25m6bbxxwahnj3a
A 3D Steganalytic Computation and Steganalysis Safe Watermarking
2018
International Journal of Global Engineering (IJGE) E-ISSN
unpublished
We propose a straightforward yet productive steganalytic calculation for watermarks implanted by two best in class 3D watermarking calculations by Cho et al. ...
The proposed calculation assesses the quantity of containers through a comprehensive pursuit and after that the nearness of a watermark is chosen by a carefully fit typicality test or a t-test. ...
By improving that method with watermarking technique we introduced an 3d steganalytic algorithm and digital watermarking. ...
fatcat:lk7qpmrwx5bndbsxb2aifztfuu