Breaking permutation-based mesh steganography and security improvement

Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated...

Full description

Saved in:
Bibliographic Details
Main Authors: Wang, Yimin, Kong, Lingsheng, Qian, Zhenxing, Feng, Guorui, Zhang, Xinpeng, Zheng, Jianmin
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/145909
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-145909
record_format dspace
spelling sg-ntu-dr.10356-1459092021-01-14T04:02:52Z Breaking permutation-based mesh steganography and security improvement Wang, Yimin Kong, Lingsheng Qian, Zhenxing Feng, Guorui Zhang, Xinpeng Zheng, Jianmin School of Computer Science and Engineering Engineering::Computer science and engineering Permutation-based Steganography Steganalysis Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers. Ministry of Education (MOE) Published version The work was supported by the National Natural Science Foundation of China under Grant 61402279, Grant U1736213, and Grant 61572308, and by the Singapore MOE Tier-2 Grants under 2016-T2-2-065 and 2017-T2-1-076. 2021-01-14T04:02:51Z 2021-01-14T04:02:51Z 2019 Journal Article Wang, Y., Kong, L., Qian, Z., Feng, G., Zhang, X., & Zheng, J. (2019). Breaking permutation-based mesh steganography and security improvement. IEEE Access, 7, 183300-183310. doi:10.1109/ACCESS.2019.2960455 2169-3536 0000-0003-2515-6602 0000-0003-0156-4353 0000-0002-5224-6374 0000-0001-8249-2608 0000-0002-0212-3501 0000-0002-5062-6226 https://hdl.handle.net/10356/145909 10.1109/ACCESS.2019.2960455 2-s2.0-85078044023 7 183300 183310 en 2016-T2-2-065 2017-T2-1-076 IEEE Access © 2019 IEEE. This journal is 100% open access, which means that all content is freely available without charge to users or their institutions. All articles accepted after 12 June 2019 are published under a CC BY 4.0 license, and the author retains copyright. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles, or use them for any other lawful purpose, as long as proper attribution is given. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
Permutation-based Steganography
Steganalysis
spellingShingle Engineering::Computer science and engineering
Permutation-based Steganography
Steganalysis
Wang, Yimin
Kong, Lingsheng
Qian, Zhenxing
Feng, Guorui
Zhang, Xinpeng
Zheng, Jianmin
Breaking permutation-based mesh steganography and security improvement
description Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Wang, Yimin
Kong, Lingsheng
Qian, Zhenxing
Feng, Guorui
Zhang, Xinpeng
Zheng, Jianmin
format Article
author Wang, Yimin
Kong, Lingsheng
Qian, Zhenxing
Feng, Guorui
Zhang, Xinpeng
Zheng, Jianmin
author_sort Wang, Yimin
title Breaking permutation-based mesh steganography and security improvement
title_short Breaking permutation-based mesh steganography and security improvement
title_full Breaking permutation-based mesh steganography and security improvement
title_fullStr Breaking permutation-based mesh steganography and security improvement
title_full_unstemmed Breaking permutation-based mesh steganography and security improvement
title_sort breaking permutation-based mesh steganography and security improvement
publishDate 2021
url https://hdl.handle.net/10356/145909
_version_ 1690658500766597120