Breaking permutation-based mesh steganography and security improvement
Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/145909 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-145909 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1459092021-01-14T04:02:52Z Breaking permutation-based mesh steganography and security improvement Wang, Yimin Kong, Lingsheng Qian, Zhenxing Feng, Guorui Zhang, Xinpeng Zheng, Jianmin School of Computer Science and Engineering Engineering::Computer science and engineering Permutation-based Steganography Steganalysis Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers. Ministry of Education (MOE) Published version The work was supported by the National Natural Science Foundation of China under Grant 61402279, Grant U1736213, and Grant 61572308, and by the Singapore MOE Tier-2 Grants under 2016-T2-2-065 and 2017-T2-1-076. 2021-01-14T04:02:51Z 2021-01-14T04:02:51Z 2019 Journal Article Wang, Y., Kong, L., Qian, Z., Feng, G., Zhang, X., & Zheng, J. (2019). Breaking permutation-based mesh steganography and security improvement. IEEE Access, 7, 183300-183310. doi:10.1109/ACCESS.2019.2960455 2169-3536 0000-0003-2515-6602 0000-0003-0156-4353 0000-0002-5224-6374 0000-0001-8249-2608 0000-0002-0212-3501 0000-0002-5062-6226 https://hdl.handle.net/10356/145909 10.1109/ACCESS.2019.2960455 2-s2.0-85078044023 7 183300 183310 en 2016-T2-2-065 2017-T2-1-076 IEEE Access © 2019 IEEE. This journal is 100% open access, which means that all content is freely available without charge to users or their institutions. All articles accepted after 12 June 2019 are published under a CC BY 4.0 license, and the author retains copyright. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles, or use them for any other lawful purpose, as long as proper attribution is given. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering Permutation-based Steganography Steganalysis |
spellingShingle |
Engineering::Computer science and engineering Permutation-based Steganography Steganalysis Wang, Yimin Kong, Lingsheng Qian, Zhenxing Feng, Guorui Zhang, Xinpeng Zheng, Jianmin Breaking permutation-based mesh steganography and security improvement |
description |
Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers. |
author2 |
School of Computer Science and Engineering |
author_facet |
School of Computer Science and Engineering Wang, Yimin Kong, Lingsheng Qian, Zhenxing Feng, Guorui Zhang, Xinpeng Zheng, Jianmin |
format |
Article |
author |
Wang, Yimin Kong, Lingsheng Qian, Zhenxing Feng, Guorui Zhang, Xinpeng Zheng, Jianmin |
author_sort |
Wang, Yimin |
title |
Breaking permutation-based mesh steganography and security improvement |
title_short |
Breaking permutation-based mesh steganography and security improvement |
title_full |
Breaking permutation-based mesh steganography and security improvement |
title_fullStr |
Breaking permutation-based mesh steganography and security improvement |
title_full_unstemmed |
Breaking permutation-based mesh steganography and security improvement |
title_sort |
breaking permutation-based mesh steganography and security improvement |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/145909 |
_version_ |
1690658500766597120 |