The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2009 vol.15)
pp: 274-284
Min-Wen Chao , National Cheng-Kung University, Tainan
Chao-hung Lin , National Cheng-Kung University, Tainan
Cheng-Wei Yu , National Cheng-Kung University, Tainan
Tong-Yee Lee , National Cheng-Kung University, Tainan
In this paper, we present a very high-capacity and low-distortion 3D steganography scheme. Our steganography approach is based on a novel multi-layered embedding scheme to hide secret messages in the vertices of 3D polygon models. Experimental results show that the cover model distortion is very small as the number of hiding layers ranges from 7 to 13 layers. To the best of our knowledge, this novel approach can provide much higher hiding capacity than other state-of-the-art approaches, while obeying the low distortion and security basic requirements for steganography on 3D models.
Three-Dimensional Graphics and Realism, Computer Graphics
Min-Wen Chao, Chao-hung Lin, Cheng-Wei Yu, Tong-Yee Lee, "A High Capacity 3D Steganography Algorithm", IEEE Transactions on Visualization & Computer Graphics, vol.15, no. 2, pp. 274-284, March/April 2009, doi:10.1109/TVCG.2008.94
[1] I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking. Morgan Kaufmann, 2002.
[2] S. Katzenbeisser and F.A.P. Petitcolas, eds., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 2000.
[3] J. Fridrich, “Applications of Data Hiding in Digital Images,” Tutorial for the ISSPA, pp. 22-25, Aug. 1999.
[4] O. Benedens and C. Busch, “Towards Blind Detection of Robust Watermarks in Polygonal Models,” Proc. EUROGRAPHICS '00, pp. 199-209, Aug. 2000.
[5] O. Benedens, “Geometry-Based Watermarking of 3-D Polygonal Models,” Proc. IEEE Computer Graphics and Applications, special issue on image security, vol. 19, no. 1, pp. 45-46, Jan./Feb. 1999.
[6] Y. Boon-Lock and M. Minerva, “Watermarking 3D Objects for Verification,” Proc. IEEE Computer Graphics and Applications, special issue on image security, vol. 19, no. 1, pp. 36-45, Jan./Feb. 1999.
[7] F. Cayre, O. Devillers, F. Schmitt, and H. Maître, “Watermarking 3D Triangle Meshes for Authentication and Integrity,” INRIA Research Report RR-5223, June 2004.
[8] F. Garcia and J. Dugelay, “Texture-Based Watermarking of 3-D Video Objects,” IEEE Trans. Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 853-866, Aug. 2003.
[9] H.-Y. Lin, H.-Y. Liao, C.-S. Lu, and J.-C. Lin, “Fragile Watermarking for Authenticating 3D Polygonal Meshes,” IEEE Trans. Multimedia, vol. 7, no. 6, pp. 997-1006, Dec. 2005.
[10] R. Ohbuchi, H. Mazuda, and M. Aono, “Watermarking Three-Dimensional Polygonal Models,” Proc. Fifth ACM Int'l Conf. Multimedia (ACM Multimedia '97), pp. 261-272, 1997.
[11] R. Ohbuchi, H. Mazuda, and M. Aono, “Watermarking Three-Dimensional Polygonal Models through Geometric and Topological Modifications,” IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 551-560, 1998.
[12] R. Ohbuchi, A. Mukaiyama, and S. Takahashi, “A Frequency-Domain Approach to Watermarking 3D Shapes,” Computer Graphics Forum, vol. 21, no. 3, pp. 373-382, 2002.
[13] E. Praun, H. Hoppe, and A. Finkelstein, “Robust Mesh Watermarking,” Proc. ACM SIGGRAPH '99, pp. 49-56, 1999.
[14] K. Yin, Z. Pan, S. Jiaoying, and D. Zhang, “Robust Mesh Watermarking Based on Multiresolution Processing,” Computers and Graphics, vol. 25, pp. 409-420, 2001.
[15] H.-T. Wu and Y.-M. Cheung, “A Reversible Data Hiding Approach to Mesh Authentication,” Proc. IEEE/WIC/ACM Int'l Conf. Web Intelligence (WI '05), pp. 774-777, Sept. 2005.
[16] S. Zafeiriou, T. Anastasios, and I. Pitas, “Blind Robust Watermarking Schemes for Copyright Protection of 3D Mesh Objects,” IEEE Trans. Visualization and Computer Graphics, vol. 11, no. 5, pp. 596-607, Sept./Oct. 2005.
[17] V.R. Doncel, N. Nikolaidis, and I. Pitas, “An Optimal Detector Structure for the Fourier Descriptors Domain Watermarking of 2D Vector Graphics,” IEEE Trans. Visualization and Computer Graphics, vol. 13, no. 5, Sept./Oct. 2007.
[18] Y.-Q. Ni, B. Liu, and H.-B. Zhang, “A Blind Watermarking of 3D Triangular Meshes Using Geometry Image,” Proc. Fourth Int'l Conf. Computer Graphics, Imaging and Visualization (CGIV '07), pp.335-340, 2007.
[19] O. Benedens, “Affine Invariant Watermarks for 3D Polygonal and Nurbs Based Models,” Proc. Third Int'l Workshop Information Security (ISW '00), pp. 329-340, Dec. 2000.
[20] T. Harte and A.G. Bors, “Watermarking 3-D Models,” Proc. IEEE Int'l Conf. Image Processing (ICIP '02), vol. III, pp. 661-664, Sept. 2002.
[21] O. Benedens, “Robust Watermarking and Affine Registration of 3D Meshes,” Proc. Fifth Int'l Workshop Information Hiding (Information Hiding '03), pp. 177-195, 2003.
[22] H. Date, S. Kanai, and T. Kishinami, “Digital Watermarking for 3D Polygons Model Using Multiresolutional Wavelet Decomposition,” Proc. Sixth IFIP WG 5.2 Int'l Workshop Geometric Modeling: Fundamentals and Applications (GEO-6 '98), pp. 296-307, Dec. 1998.
[23] R. Ohbuchi, S. Takahashi, T. Miyasawa, and A. Mukaiyama, “Watermarking 3-D Polygonal Meshes in the Mesh Spectral Domain,” Proc. Computer Graphics Interface, pp. 9-17, June 2001.
[24] H. Song, N. Cho, and J. Kim, “Robust Watermarking of 3D Mesh Models,” Proc. IEEE Int'l Workshop Multimedia Signal Processing (MMSP '02), pp. 332-335, Dec. 2002.
[25] A. Kalivas, A. Tefas, and I. Pitas, “Watermarking of 3D Models Using Principal Component Analysis,” Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal Processing (ICASSP '03), vol. 5, pp.676-679, Apr. 2003.
[26] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, special issue on protection of multimedia content, vol. 87, no. 7, pp. 1062-1078, 1999.
[27] F. Cayre and B. Macq, “Data Hiding on 3-D Triangle Meshes,” IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 939-949, 2003.
[28] C.-M. Wang and Y.-M. Cheng, “An Efficient Information Hiding Algorithm for Polygon Models,” Proc. Eurographics'05, vol. 24, no. 3, pp. 591-600, 2005.
[29] Y.-M. Cheng and C.-M. Wang, “A High-Capacity Steganographic Approach for 3D Polygonal Meshes,” The Visual Computer, vol. 22, no. 9, pp. 845-855, 2006.
[30] B. Chen and G.W. Wornell, “Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding,” IEEE Trans. Information Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
[31] F. Perez-Gonzalez and F. Balado, “Quantized Projection Data Hiding,” Proc. IEEE Int'l Conf. Image Processing (ICIP '02), vol. 2, pp. 889-892, Sept. 2002.
[32] M. Garland and P.S. Heckbert, “Surface Simplification Using Quadric Error Metrics,” Proc. ACM SIGGRAPH '97, pp. 209-216, 1997.
[33] The Wiki www Site, , 2008.
[34] L. Marvel, C. Boncelet, and J. Retter, “Spread Spectrum Image Steganography,” IEEE Trans. Image Processing, pp. 1075-1083, Aug. 1999.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool