80 Hits in 4.5 sec

Three-Dimensional Mesh Steganography and Steganalysis: A Review [article]

Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu
2021 arXiv   pre-print
Over the past decade, 3-D meshes have emerged in industrial, medical, and entertainment applications, being of large practical significance for 3-D mesh steganography and steganalysis.  ...  In this article, we provide a systematic survey of the literature on 3-D mesh steganography and steganalysis.  ...  3-D meshes as the cover meshes for steganography.  ... 
arXiv:2104.10203v1 fatcat:55z2mdrgtvhy3pb63c4ai6gbdy


Babangida Zachariah
2016 International Journal of Information Systems and Engineering  
The need for improved security in data communications has been the driving force behind the several types of research that describes various techniques for implementing security policies and systems.  ...  The use of Steganography and Cryptography has made a high impact in advancing the security desired of data communications.  ...  The designed algorithm embeds a secret message in a dynamic and adaptive way so as to reduce distortion of the image against statistical analysis approach to steganalysis.  ... 
doi:10.24924/ijise/2016.11/v4.iss2/01.08 fatcat:jsmmwbidojerdhni3b7fmha62y

A Study of Various Steganographic Techniques Used for Information Hiding

Sumathi C.P, Santanam T, Umamaheswari G
2013 International Journal of Computer Science & Engineering Survey  
Steganography is a technology where modern data compression, information theory, spread spectrum, and cryptography technologies are brought together to satisfy the need for privacy on the Internet.  ...  The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era.  ...  M.B.Ould MEDENI[35] 2010 Use of error- correcting codes in steganography Improved embedding efficiency Security Performance evaluation by using D, average distortion, E embedding  ... 
doi:10.5121/ijcses.2013.4602 fatcat:2jkkcpp6rjaalgqait5maanglu

Feature-Preserving Tensor Voting Model for Mesh Steganalysis

Hang Zhou, Kejiang Chen, Weiming Zhang, Chuan Qin, Nenghai Yu
2019 IEEE Transactions on Visualization and Computer Graphics  
We propose a neighborhood-level representation-guided tensor voting model for 3D mesh steganalysis.  ...  In the proposed steganalytic scheme, the normal voting tensor (NVT) operation is performed on original mesh faces and smoothed mesh faces separately.  ...  [12] put forward adaptive steganography together with coding techniques to enhance the security performance.  ... 
doi:10.1109/tvcg.2019.2929041 pmid:31331894 fatcat:6asyy3dvr5aqpi5wxqpbysf2oq

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models [article]

Kejiang Chen, Hang Zhou, Hanqing Zhao, Dongdong Chen, Weiming Zhang, Nenghai Yu
2020 arXiv   pre-print
Steganography is the art and science of hiding secret messages in public communication so that the presence of the secret messages cannot be detected.  ...  Take text-to-speech generation task as an example, we propose distribution-preserving steganography based on WaveGlow and WaveNet, which corresponds to the former two categories.  ...  Cachin [1] firstly formalized an information-theoretic model for steganography in where a relative entropy function is employed as a basic measure of steganographic security for the concealment system  ... 
arXiv:1811.03732v3 fatcat:sr3t6ysxrza4xhtsln67txc6fm

LSB Data Hiding in Digital Media: A Survey

Dang Tran, Hans-Jürgen Zepernick, Thi Chu
2022 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
of attacks, and is well suited for real-time applications.  ...  Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel.  ...  Similarly detailed classifications are provided for transform domain image steganography and adaptive steganography.  ... 
doi:10.4108/eai.5-4-2022.173783 fatcat:iupulvy6lrbwtglrvukb6gzrue

Digital image steganography: Survey and analysis of current methods

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt
2010 Signal Processing  
Steganography has various useful applications. However, like any other science it can be used for ill intentions.  ...  It has been propelled to the forefront of current security techniques by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government  ...  [41] state clearly that "there is currently no steganography system which can resist all steganalysis attacks". "Ultimately, image understanding is important for secure adaptive steganography.  ... 
doi:10.1016/j.sigpro.2009.08.010 fatcat:4kn2rpavfrdgrdgtfi7uv7f5ji

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography

Jinghui Peng, YiJing Jiang, Shanyu Tang, Farid Meziane
2019 IEEE Transactions on Dependable and Secure Computing  
This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.  ...  quality and negligible signal distortion.  ...  More recently, Jiang et al. designed a reversible data hiding in encrypted domain scheme with low computational complexity for three-dimensional meshes [20] .  ... 
doi:10.1109/tdsc.2019.2946138 fatcat:3k2uiecvxbd3raphyitydp7jh4

CIS-Net: A Novel CNN Model for Spatial Image Steganalysis via Cover Image Suppression [article]

Songtao Wu, Sheng-hua Zhong, Yan Liu, Mengyuan Liu
2019 arXiv   pre-print
Several deep CNN models have been proposed via incorporating domain knowledge of image steganography/steganalysis into the design of the network and achieve state of the art performance on standard database  ...  For SPL, it utilizes sub-linear power function to suppress large valued elements introduced by cover image contents and aggregates weak embedded signals via average pooling.  ...  Denemark, “Universal distortion function for steganalysis with adaptive content suppression,” IEEE International Con- steganography in an arbitrary domain,” EURASIP Journal on Information  ... 
arXiv:1912.06540v1 fatcat:wiinc6uyo5hdldjicpmfwl6p6a

An adaptive scheme for compressed video steganography using temporal and spatial features of the video signal

Jafar Mansouri, Morteza Khademi
2009 International journal of imaging systems and technology (Print)  
Steganography is the art and science of data hiding.  ...  Embedded-data are extracted without using the original video and there is no need for full decompression.  ...  Steganography is not secure against the known-cover case. However, if the difference contains random signals, then, it is difficult for the warden to break the system.  ... 
doi:10.1002/ima.20207 fatcat:6l3fui5qy5akjc7v44igngh2le

Highcapacity data-hiding for 3D meshes based on static arithmetic coding

V. Itier, W. Puech, J.-P. Pedeboy
2015 2015 IEEE International Conference on Image Processing (ICIP)  
3D meshes are widely used today in very different domains for example; game, medical diagnostic, CAD (computed aided design) or more recently 3-D printing.  ...  We analyzed the proposed method by inserting RGB images in 3D meshes.  ...  Fig. 2 : 2 Fig. 2: a) Original mesh with 34834 vertices, c) Hamiltonian path on the vertex cloud, d) Watermarked mesh, e) Distortion comparison.  ... 
doi:10.1109/icip.2015.7351673 dblp:conf/icip/ItierPP15 fatcat:5uof4b5w6zcm7amilt7ero3yki

Survey on Reversible Texture Synthesis Techniques

Ruth Ramya.K, Karthik. M, Yamini Priyanka.M, Vinutna BH
2018 International Journal of Engineering & Technology  
We propose a novel approach for steganography using a reversible surface union.  ...  At that point we have shrouded that picture inside another picture by steganography approach. By this two level concealing we can guarantee more grounded security.  ...  Key surface may be used to disguise the 3-3-2LSB (3 odds for Red, 3 odds for Green, 2 odds for blue channels) methodology.  ... 
doi:10.14419/ijet.v7i2.32.15698 fatcat:j3oi6ntspfdh5ederlnklp5zhi

Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform

Kai Wang, Guillaume Lavoue, Florence Denis, Atilla Baskurt
2008 IEEE Transactions on Information Forensics and Security  
This paper presents a hierarchical watermarking framework for semiregular meshes.  ...  Three blind watermarks are inserted in a semiregular mesh with different purposes: a geometrically robust watermark for copyright protection, a high-capacity watermark for carrying a large amount of auxiliary  ...  Roudet for her help on the wavelet analysis and synthesis of 3-D semiregular meshes.  ... 
doi:10.1109/tifs.2008.2007229 fatcat:4gcivo5f4zfvrnorkowvnwuapa

Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack

Chun-Shien Lu, Shih-Wei Sun, Pao-Chi Chang, Edward J. Delp III, Ping W. Wong
2005 Security, Steganography, and Watermarking of Multimedia Contents VII  
Extensive experimental results obtained from standard benchmark confirm the ability of our method in improving robustness. , Telephone: +886 3 422 7151 X 4466 Security, Steganography, and Watermarking  ...  for robust mesh generation.  ...  For example, for a 512 × 512 image, σ d = 5 − 2 = 3 is adopted.  ... 
doi:10.1117/12.586637 dblp:conf/sswmc/LuSC05 fatcat:sauzn2gvljfevpjmnrjalcsoba

Multimedia watermarking techniques

F. Hartung, M. Kutter
1999 Proceedings of the IEEE  
Robustness and security aspects are discussed in detail. Finally, a few remarks are made about the state of the art and possible future developments in watermarking technology.  ...  In this tutorial paper, the requirements and applications for watermarking are reviewed. Applications include copyright protection, data monitoring, and data tracking.  ...  Fig. 10 . 10 Example for the structure of I, P, and B frames in a GOP. Fig. 11 . 11 Embedding of visible watermarks into 3-D meshes by local variation of the mesh density.  ... 
doi:10.1109/5.771066 fatcat:e3hxw7y2s5hrdmvjrzjabognpi
« Previous Showing results 1 — 15 out of 80 results