Skip to main content
Erschienen in: 3D Research 2/2015

01.06.2015 | 3DR Express

A Reversible Data Hiding Scheme for 3D Polygonal Models Based on Histogram Shifting with High Embedding Capacity

verfasst von: Yao-Hsien Huang, Yuan-Yu Tsai

Erschienen in: 3D Research | Ausgabe 2/2015

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Reversibility is the ability to recover the stego media back to the cover media without any error after correctly extracting the secret message. This study proposes a reversible data hiding scheme for 3D polygonal models based on histogram shifting. Specifically, the histogram construction is based on the geometric similarity between neighboring vertices. The distances between the neighboring vertices in a 3D model with some point in the 3D space are usually similar, especially for a high-resolution 3D model. Therefore, the difference between the above distances of the neighboring vertices has a small value for a high probability. This study uses the modified breadth-first search to traverse each vertex once in a sequential order and determine the unique referencing neighbor for each vertex. The histogram is then constructed based on the normalized distance difference of neighboring vertices. This approach significantly increases embedding capacity. Experimental results show that the proposed algorithm can achieve higher embedding capacity than existing algorithms while still maintaining acceptable model distortion. This algorithm also provides greater robustness against similarity transformation attacks and vertex reordering attacks. The proposed technique is feasible for 3D reversible data hiding.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cox, J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. (2008). Digital watermarking and steganography (2nd ed.). Burlington: Morgan Kaufmann. Cox, J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. (2008). Digital watermarking and steganography (2nd ed.). Burlington: Morgan Kaufmann.
2.
Zurück zum Zitat Chao, M. W., Lin, C. H., Yu, C. W., & Lee, T. Y. (2009). A high capacity 3D steganography algorithm. IEEE Transactions on Visualization and Computer Graphics, 15(2), 274–284.CrossRef Chao, M. W., Lin, C. H., Yu, C. W., & Lee, T. Y. (2009). A high capacity 3D steganography algorithm. IEEE Transactions on Visualization and Computer Graphics, 15(2), 274–284.CrossRef
3.
Zurück zum Zitat Li, M. T., Huang, N. C., & Wang, C. M. (2011). A novel high capacity 3D steganographic algorithm. International Journal of Innovative Computing, Information and Control, 7(3), 1055–1074.MathSciNet Li, M. T., Huang, N. C., & Wang, C. M. (2011). A novel high capacity 3D steganographic algorithm. International Journal of Innovative Computing, Information and Control, 7(3), 1055–1074.MathSciNet
4.
Zurück zum Zitat Molaei, A. M., Ebrahimnezhad, H., & Sedaaghi, M. H. (2013). A blind fragile watermarking method for 3D models based on geometric properties of triangles. 3D Research, 4(4), 1–9.CrossRef Molaei, A. M., Ebrahimnezhad, H., & Sedaaghi, M. H. (2013). A blind fragile watermarking method for 3D models based on geometric properties of triangles. 3D Research, 4(4), 1–9.CrossRef
5.
Zurück zum Zitat Thiyagarajan, P., Natarajan, V., Aghila, G., Prasanna Venkatesan, V., & Anitha, R. (2013). Pattern based 3D image steganography. 3D Research, 4(1), 1–8.CrossRef Thiyagarajan, P., Natarajan, V., Aghila, G., Prasanna Venkatesan, V., & Anitha, R. (2013). Pattern based 3D image steganography. 3D Research, 4(1), 1–8.CrossRef
6.
Zurück zum Zitat Tsai, Y. Y. (2014). An adaptive steganographic algorithm for 3D polygonal models using vertex decimation. Multimedia Tools and Applications, 69(3), 859–876.CrossRef Tsai, Y. Y. (2014). An adaptive steganographic algorithm for 3D polygonal models using vertex decimation. Multimedia Tools and Applications, 69(3), 859–876.CrossRef
7.
Zurück zum Zitat Feng, X., Zhang, W., & Liu, Y. (2014). Double watermarks of 3D mesh model based on feature segmentation and redundancy information. Multimedia Tools and Applications, 68(3), 497–515.CrossRef Feng, X., Zhang, W., & Liu, Y. (2014). Double watermarks of 3D mesh model based on feature segmentation and redundancy information. Multimedia Tools and Applications, 68(3), 497–515.CrossRef
8.
Zurück zum Zitat Wang, K., Lavoué, G., Denis, F., & Baskurt, A. (2008). Hierarchical watermarking of semiregular meshes based on wavelet transform. IEEE Transactions on Information Forensics and Security, 3(4), 620–634.CrossRef Wang, K., Lavoué, G., Denis, F., & Baskurt, A. (2008). Hierarchical watermarking of semiregular meshes based on wavelet transform. IEEE Transactions on Information Forensics and Security, 3(4), 620–634.CrossRef
9.
Zurück zum Zitat Bogomjakov, A., Gotsman, C., & Isenburg, M. (2008). Distortion-free steganography for polygonal meshes. Computer Graphics Forum, 27(2), 637–642.CrossRef Bogomjakov, A., Gotsman, C., & Isenburg, M. (2008). Distortion-free steganography for polygonal meshes. Computer Graphics Forum, 27(2), 637–642.CrossRef
10.
Zurück zum Zitat Huang, N. C., Li, M. T., & Wang, C. M. (2009). Toward optimal embedding capacity for permutation steganography. IEEE Signal Processing Letters, 16(9), 802–805.CrossRef Huang, N. C., Li, M. T., & Wang, C. M. (2009). Toward optimal embedding capacity for permutation steganography. IEEE Signal Processing Letters, 16(9), 802–805.CrossRef
11.
Zurück zum Zitat Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354–362.CrossRef Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354–362.CrossRef
12.
Zurück zum Zitat Li, Y. C., Yeh, C. M., & Chang, C. C. (2010). Data hiding based on the similarity between neighboring pixels with reversibility. Digital Signal Processing, 20(4), 1116–1128.CrossRef Li, Y. C., Yeh, C. M., & Chang, C. C. (2010). Data hiding based on the similarity between neighboring pixels with reversibility. Digital Signal Processing, 20(4), 1116–1128.CrossRef
13.
Zurück zum Zitat Luo, L., Chen, Z., Chen, M., Zeng, X., & Xiong, Z. (2010). Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security, 5(1), 187–193.CrossRef Luo, L., Chen, Z., Chen, M., Zeng, X., & Xiong, Z. (2010). Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security, 5(1), 187–193.CrossRef
14.
Zurück zum Zitat Tsai, Y. Y., Tsai, D. S., & Liu, C. L. (2013). Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing, 23(3), 919–927.MathSciNetCrossRef Tsai, Y. Y., Tsai, D. S., & Liu, C. L. (2013). Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing, 23(3), 919–927.MathSciNetCrossRef
15.
Zurück zum Zitat Jhou, C. Y., Pan, J. S., & Chou, D. (2007) Reversible data hiding base on histogram shift for 3D vertex. Proceedings of Third International Conference on International Information Hiding and Multimedia Signal Processing, Vol. 1, pp. 365–370. Jhou, C. Y., Pan, J. S., & Chou, D. (2007) Reversible data hiding base on histogram shift for 3D vertex. Proceedings of Third International Conference on International Information Hiding and Multimedia Signal Processing, Vol. 1, pp. 365–370.
16.
Zurück zum Zitat Chuang, C. H., Cheng, C. W., & Yen, Z. Y. (2010) Reversible data hiding with affine invariance for 3D models. Proceedings of IET International Conference on Frontier Computing. Theory, Technologies and Applications, pp. 77–81. Chuang, C. H., Cheng, C. W., & Yen, Z. Y. (2010) Reversible data hiding with affine invariance for 3D models. Proceedings of IET International Conference on Frontier Computing. Theory, Technologies and Applications, pp. 77–81.
17.
18.
Zurück zum Zitat Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890–896.CrossRef Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890–896.CrossRef
Metadaten
Titel
A Reversible Data Hiding Scheme for 3D Polygonal Models Based on Histogram Shifting with High Embedding Capacity
verfasst von
Yao-Hsien Huang
Yuan-Yu Tsai
Publikationsdatum
01.06.2015
Verlag
3D Display Research Center
Erschienen in
3D Research / Ausgabe 2/2015
Elektronische ISSN: 2092-6731
DOI
https://doi.org/10.1007/s13319-015-0051-x

Weitere Artikel der Ausgabe 2/2015

3D Research 2/2015 Zur Ausgabe