Please use this identifier to cite or link to this item:
Title: Breaking permutation-based mesh steganography and security improvement
Authors: Wang, Yimin
Kong, Lingsheng
Qian, Zhenxing
Feng, Guorui
Zhang, Xinpeng
Zheng, Jianmin
Keywords: Engineering::Computer science and engineering
Issue Date: 2019
Source: Wang, Y., Kong, L., Qian, Z., Feng, G., Zhang, X., & Zheng, J. (2019). Breaking permutation-based mesh steganography and security improvement. IEEE Access, 7, 183300-183310. doi:10.1109/ACCESS.2019.2960455
Project: 2016-T2-2-065
Journal: IEEE Access
Abstract: Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers.
ISSN: 2169-3536
DOI: 10.1109/ACCESS.2019.2960455
Rights: © 2019 IEEE. This journal is 100% open access, which means that all content is freely available without charge to users or their institutions. All articles accepted after 12 June 2019 are published under a CC BY 4.0 license, and the author retains copyright. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles, or use them for any other lawful purpose, as long as proper attribution is given.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Journal Articles

Files in This Item:
File Description SizeFormat 
08935245.pdf1.31 MBAdobe PDFView/Open

Citations 50

Updated on Mar 8, 2021

Citations 50

Updated on Mar 5, 2021

Page view(s)

Updated on May 7, 2021


Updated on May 7, 2021

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.