Skip to main content

2017 | OriginalPaper | Buchkapitel

Intelligence System Security Based on 3-D Image

verfasst von : K. Anish, N. Arpita, H. Nikhil, K. Sumant, S. Bhagya, S. D. Desai

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s world, digital communication plays a vital role. The art of communicating secret information has also evolved. For years, encryption has played a vital role in secure transmission of secret data. But due to lack of covertness, an eavesdropper can identify encrypted data and subject it to cryptanalysis. Here we present a method of hiding information such that its very existence is masked. This study aims to develop an enhanced technique for hiding data in 3-D images ensuring high invisibility. The data will be embedded in 3-D images with .pcd format and the coordinates of the 3-D image are used for data hiding.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat M. Ghebleh and A. Kanso. A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation 19, 6:1898{1907, 2014. M. Ghebleh and A. Kanso. A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation 19, 6:1898{1907, 2014.
2.
Zurück zum Zitat T. Santanam Sumathi, C. P. and G. Umamaheswari. A study of various steganographic techniques used for information hiding. arXiv preprint, 2014. T. Santanam Sumathi, C. P. and G. Umamaheswari. A study of various steganographic techniques used for information hiding. arXiv preprint, 2014.
3.
Zurück zum Zitat Der-Chyuan Lou and Chen-Hao Hu. Lsb steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Information Sciences 188, pages 346{358, 2012. Der-Chyuan Lou and Chen-Hao Hu. Lsb steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Information Sciences 188, pages 346{358, 2012.
4.
Zurück zum Zitat H. T. Sencar M. Kharrazi and N. Memon. Cover selection for steganographic embedding. In Proc. IEEE International Conference on Image Processing, pages 110{120, 2006. H. T. Sencar M. Kharrazi and N. Memon. Cover selection for steganographic embedding. In Proc. IEEE International Conference on Image Processing, pages 110{120, 2006.
5.
Zurück zum Zitat Haz Malik. Steganalysis of qim steganography using irregularity measure. Proc. of the 10th ACM workshop on Multimedia and security, ACM, pages 149{158, 2008. Haz Malik. Steganalysis of qim steganography using irregularity measure. Proc. of the 10th ACM workshop on Multimedia and security, ACM, pages 149{158, 2008.
6.
Zurück zum Zitat V. Natarajan G. Aghila V. Prasanna Venkatesan Thiyagarajan, P. and R. Anitha. Pattern based 3d image steganography. 3D Research 4, pages 1{8, 2013. V. Natarajan G. Aghila V. Prasanna Venkatesan Thiyagarajan, P. and R. Anitha. Pattern based 3d image steganography. 3D Research 4, pages 1{8, 2013.
7.
Zurück zum Zitat Ekta Walia. Performance improvement of jpeg2000 steganography using qim. Communication and Computer, ISSN. 6:1548{1779, 2009. Ekta Walia. Performance improvement of jpeg2000 steganography using qim. Communication and Computer, ISSN. 6:1548{1779, 2009.
8.
Zurück zum Zitat Sunny Bansal K Rama, Sukhpreet and Rakesh K. Bansal. Steganography and classiffication of image steganography techniques. In Computing for Sustainable Global Development (INDIACom), pages 870{875, 2011. Sunny Bansal K Rama, Sukhpreet and Rakesh K. Bansal. Steganography and classiffication of image steganography techniques. In Computing for Sustainable Global Development (INDIACom), pages 870{875, 2011.
9.
Zurück zum Zitat V. Natarajan G. Aghila V. Prasanna Venkatesan Thiyagarajan, P. and R. Anitha. Pattern based 3d image steganography. 3D Research 4, pages 1{8, 2013. V. Natarajan G. Aghila V. Prasanna Venkatesan Thiyagarajan, P. and R. Anitha. Pattern based 3d image steganography. 3D Research 4, pages 1{8, 2013.
10.
Zurück zum Zitat Sharifullah Khan Akhtar, Naheed and Prashant Johri. An improved inverted lsb image steganography. In Issues and Challenges in Intelligent Computing Techniques (ICICT)t, pages 74{755, 2014. Sharifullah Khan Akhtar, Naheed and Prashant Johri. An improved inverted lsb image steganography. In Issues and Challenges in Intelligent Computing Techniques (ICICT)t, pages 74{755, 2014.
11.
Zurück zum Zitat U. Dinesh Acharya A. Renuka Hemalatha, S. and Priya R. Kamath. A secure and high capacity image steganography technique. Signal Image Processing, page 83, 2013. U. Dinesh Acharya A. Renuka Hemalatha, S. and Priya R. Kamath. A secure and high capacity image steganography technique. Signal Image Processing, page 83, 2013.
Metadaten
Titel
Intelligence System Security Based on 3-D Image
verfasst von
K. Anish
N. Arpita
H. Nikhil
K. Sumant
S. Bhagya
S. D. Desai
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_16

Premium Partner