A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map

Image steganography has evolved as an active area of research because of its advantage to hide secret information inside an ingenuous image invisibly. In the recent years, improvements have been done in hardware to process 3D image models which laid down the path for 3D image steganography. The proposed work presents a novel approach of reversible data hiding in 3D mesh models. Difference between the vertices is shifted to hide secret bits inside the vertices. Chaotic logistic map is also used in the proposed work to decide the coordinate taken up for embedding. The proposed blind steganography system withstands rotation, scaling and translation attacks. Novel mesh traversal algorithm is proposed to visit the mesh vertices. This algorithm gives a unique mesh traversal algorithm for every 3D mesh model. The performance of proposed approach is compared with three well-known image steganography approaches over five cover models. The experimental results reveal that the difference between stego model and cover model cannot be observed by human eye. The proposed approach provides better embedding capacity than the previous approach in the field of reversible data hiding in 3D cover models.

[1]  Cheng-Hung Chuang,et al.  Reversible data hiding with affine invariance for 3D models , 2010 .

[2]  Yu-Ming Cheng,et al.  A high-capacity steganographic approach for 3D polygonal meshes , 2006, The Visual Computer.

[3]  Yuan-Yu Tsai An adaptive steganographic algorithm for 3D polygonal models using vertex decimation , 2012, Multimedia Tools and Applications.

[4]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Nannan Li,et al.  A High-Capacity 3D Steganography Algorithm With Adjustable Distortion , 2017, IEEE Access.

[6]  Yuan-Yu Tsai,et al.  A Reversible Data Hiding Scheme for 3D Polygonal Models Based on Histogram Shifting with High Embedding Capacity , 2015 .

[7]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[8]  Yiran Chen,et al.  An image encryption algorithm based on chaotic system and compressive sensing , 2018, Signal Process..

[9]  Vijay Kumar,et al.  Comprehensive survey of 3D image steganography techniques , 2018, IET Image Process..

[10]  M. Andrecut,et al.  Logistic Map as a Random Number Generator , 1998 .

[11]  Xin Chen,et al.  Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding , 2017, Int. J. Bifurc. Chaos.

[12]  William Puech,et al.  Lossless 3D steganography based on MST and connectivity modification , 2010, Signal Process. Image Commun..

[13]  V. Prasanna Venkatesan,et al.  Pattern based 3D image Steganography , 2013 .

[14]  K. Anish,et al.  Intelligence System Security Based on 3-D Image , 2016, FICTA.

[15]  Xiaonan Luo,et al.  Integrated chaotic systems for image encryption , 2018, Signal Process..

[16]  Vijay Kumar,et al.  A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences , 2018, Multimedia Tools and Applications.

[17]  Haifaa W. Safi,et al.  Image Encryption Using Double Chaotic Logistic Map , 2017, 2017 International Conference on Promising Electronic Technologies (ICPET).

[18]  Manish Kumar,et al.  An RGB image encryption using diffusion process associated with chaotic map , 2015, J. Inf. Secur. Appl..

[19]  Xingyuan Wang,et al.  A novel color image encryption scheme using alternate chaotic mapping structure , 2016 .

[20]  Yuan-Yu Tsai A Distortion-Free Data Hiding Scheme for Triangular Meshes Based on Recursive Subdivision , 2016, Adv. Multim..

[21]  A. Gruen,et al.  Least squares 3D surface and curve matching , 2005 .

[22]  Jeng-Shyang Pan,et al.  Reversible Data Hiding Base on Histogram Shift for 3D Vertex , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[23]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[24]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[25]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..