Filters








13 Hits in 1.7 sec

A 3D Steganalytic Algorithm and Steganalysis-Resistant Watermarking

Ying Yang, Ruggero Pintus, Holly Rushmeier, Ioannis Ivrissimtzis
2017 IEEE Transactions on Visualization and Computer Graphics  
Ioannis (2016) 'A 3D steganalytic algorithm and steganalysis-resistant watermarking.', IEEE transactions on visualization and computer graphics. .  ...  Abstract-We propose a simple yet efficient steganalytic algorithm for watermarks embedded by two state-of-the-art 3D watermarking algorithms by Cho et al.  ...  To compare the suitability of the continuous and the discrete statistics to carry steganalysis-resistant watermarks we run the steganalytic algorithm on the test set of clean models with the real values  ... 
doi:10.1109/tvcg.2016.2525771 pmid:26863664 fatcat:ite46t4uczftpivczhsoboon7q

Rethinking the high capacity 3D steganography: Increasing its resistance to steganalysis

Zhenyu Li, Sebastien Beugnon, William Puech, Adrian G. Bors
2017 2017 IEEE International Conference on Image Processing (ICIP)  
3D steganalysis aims to find the changes embedded through steganographic or information hiding algorithms into 3D models.  ...  We test the performance of the extended local feature set, and compare it to four other steganalytic features, when detecting the stego-objects watermarked by six information hiding algorithms.  ...  [16, 4] proposed a new steganalytic algorithm, specifically designed for the ro-bust 3D watermarking algorithm, MRS, proposed in [1] .  ... 
doi:10.1109/icip.2017.8296333 dblp:conf/icip/LiBPB17 fatcat:ikuzsemjzfaglii7ojjg7fpu5a

3D Steganalysis Using the Extended Local Feature Set

Zhenyu Li, Daofu Gong, Fenlin Liu, Adrian G. Bors
2018 2018 25th IEEE International Conference on Image Processing (ICIP)  
3D steganalysis aims to find the changes embedded through steganographic or information hiding algorithms into 3D models.  ...  We test the performance of the extended local feature set, and compare it to four other steganalytic features, when detecting the stego-objects watermarked by six information hiding algorithms.  ...  [16, 4] proposed a new steganalytic algorithm, specifically designed for the ro-bust 3D watermarking algorithm, MRS, proposed in [1] .  ... 
doi:10.1109/icip.2018.8451643 dblp:conf/icip/LiGLB18 fatcat:2kfh4kynube75fojozk4tjphba

3D Steganalysis Using Laplacian Smoothing at Various Levels [chapter]

Zhenyu Li, Fenlin Liu, Adrian G. Bors
2018 Lecture Notes in Computer Science  
3D objects are becoming ubiquitous while being used by many mobile and social network applications. Meanwhile, such objects are also becoming a channel being used for covert communication.  ...  This research study analyses the influence of the 3D object smoothing, which is an essential step before extracting the features used for 3D steganalysis.  ...  Acknowledgement This paper was partially supported by National Natural Science Foundation of China (No. 61772549, 61602508, U1736214, 61572052 and U1636219).  ... 
doi:10.1007/978-3-030-00021-9_21 fatcat:zgm64iwvwzckre2yttkw46m2wm

Mesh Discriminative Features for 3D Steganalysis

Ying Yang, Ioannis Ivrissimtzis
2014 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
For a given steganographic or watermarking algorithm, we create a training set containing unmarked meshes and meshes marked by that algorithm, and train a classifier using Quadratic Discriminant Analysis  ...  Ioannis (2014) 'Mesh discriminative features for 3D steganalysis.', ACM transactions on multimedia computing, communications and applications., 10 (3). p. 27.  ...  TRIANGLE MESH STEGANALYSIS Given a target watermarking/steganographic algorithm, the steganalytic algorithm extracts N -dimensional feature vectors F i from a training set of clean and watermarked models  ... 
doi:10.1145/2535555 fatcat:qbipunmmdnhefkdorlau472ajm

A steganalytic algorithm for 3D polygonal meshes

Ying Yang, Ruggero Pintus, Holly Rushmeier, Ioannis Ivrissimtzis
2014 2014 IEEE International Conference on Image Processing (ICIP)  
Ioannis (2014) 'A steganalytic algorithm for 3D polygonal meshes.  ...  The second contribution, described in Section 3, is a modification of Cho et al.'s algorithm which is more resistant against the steganalytic attack.  ...  Contribution: In Section 2, we propose a steganalytic algorithm for detecting the presence of a watermark hidden by Cho et al.'s mean-based algorithm [1] .  ... 
doi:10.1109/icip.2014.7025969 dblp:conf/icip/YangPRI14 fatcat:scscrfrcmng37bvac6mbyunlva

Steganalysis of 3D objects using statistics of local feature sets

Zhenyu Li, Adrian G. Bors
2017 Information Sciences  
3D steganalysis aims to identify subtle invisible changes produced in graphical objects through digital watermarking or steganography.  ...  Three different watermarking and steganographic methods are used for hiding information in the 3D objects used for testing the performance of the proposed steganalysis methodology.  ...  Acknowledgements The authors would like to thank the anonymous editor and reviewers for their constructive comments.  ... 
doi:10.1016/j.ins.2017.06.011 fatcat:cyawlygti5afvewlmqh4v3fzuq

Steganography with Least Histogram Abnormality [chapter]

Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
2003 Lecture Notes in Computer Science  
The proposed technique is capable of resisting the χ 2 test and RS analysis, as well as a new steganalytic method named GPC analysis as introduced in this paper.  ...  In the described steganographic technique, a pair of mutually complementary mappings, F1 and F − 1, is used, leading to a balanced behavior of several statistical parameters explored by several steganalytic  ...  Anti-steganalysis Performance Resistance Against χ 2 Test.  ... 
doi:10.1007/978-3-540-45215-7_34 fatcat:ekeq52cmujgtvpds6qadxkz4ba

Feature-Preserving Tensor Voting Model for Mesh Steganalysis

Hang Zhou, Kejiang Chen, Weiming Zhang, Chuan Qin, Nenghai Yu
2019 IEEE Transactions on Visualization and Computer Graphics  
We propose a neighborhood-level representation-guided tensor voting model for 3D mesh steganalysis.  ...  In the proposed steganalytic scheme, the normal voting tensor (NVT) operation is performed on original mesh faces and smoothed mesh faces separately.  ...  Whereas 3D watermarking focuses on protecting copyright ownership and reducing the counterfeiting of digital multimedia, 3D mesh steganography focuses on covert communication against steganalysis.  ... 
doi:10.1109/tvcg.2019.2929041 pmid:31331894 fatcat:6asyy3dvr5aqpi5wxqpbysf2oq

Robust video steganography for social media sharing based on principal component analysis

Pingan Fan, Hong Zhang, Xianfeng Zhao
2022 EURASIP Journal on Information Security  
Experimental results have shown that our proposed method provides stronger robustness against video transcoding than other methods and achieves satisfactory security performance against steganalysis.  ...  A new strategy based on principal component analysis is provided to select robust embedding regions. Besides, side information is generated to label these selected regions.  ...  [19] proposed a robust video watermarking algorithm based on dualtree complex wavelet transform. This algorithm is robust against video compression, scaling, and rotation attacks.  ... 
doi:10.1186/s13635-022-00130-z fatcat:dcimrieicfbchi2rmhudzvma5a

Information Security through Image Steganography

2019 International Journal of Engineering and Advanced Technology  
Further a discussion on the challenges and the future direction and trends of image steganography are also presented.  ...  Sending or receiving confidential information in an undetected form has been a major challenge. Steganography is the art or process of concealing information inside a text, audio or image file.  ...  These techniques are also more resistant to attacks as they use more significant areas of the cover image to hide the information and are thus also used in to watermark the images [20] .  ... 
doi:10.35940/ijeat.a2121.109119 fatcat:3xunudfgeva4zd2cw2pq6l5hba

Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map

Samer Atawneh, Putra Sumari
2013 Journal of Communications  
He is a member at ACM and IEEE and a reviewer of several journals and International Conferences. He has published more than hundred papers including journal and conferences.  ...  This paper proposes a new blind steganographic method for digital images that combines spatial and frequency domains and does not rely on the cover image in extracting the secret information.  ...  3D steganography [38] .  ... 
doi:10.12720/jcm.8.11.690-699 fatcat:uezosqkiazd25m6bbxxwahnj3a

A 3D Steganalytic Computation and Steganalysis Safe Watermarking

S Abirami¹, K Ajantha², G Archana³, R Thillaikarasi⁴
2018 International Journal of Global Engineering (IJGE) E-ISSN   unpublished
We propose a straightforward yet productive steganalytic calculation for watermarks implanted by two best in class 3D watermarking calculations by Cho et al.  ...  The proposed calculation assesses the quantity of containers through a comprehensive pursuit and after that the nearness of a watermark is chosen by a carefully fit typicality test or a t-test.  ...  By improving that method with watermarking technique we introduced an 3d steganalytic algorithm and digital watermarking.  ... 
fatcat:lk7qpmrwx5bndbsxb2aifztfuu