Breaking Permutation-Based Mesh Steganography and Security Improvement
Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8935245/ |
id |
doaj-eb3b530a595b432999b74e2741f9e738 |
---|---|
record_format |
Article |
spelling |
doaj-eb3b530a595b432999b74e2741f9e7382021-03-30T00:40:20ZengIEEEIEEE Access2169-35362019-01-01718330018331010.1109/ACCESS.2019.29604558935245Breaking Permutation-Based Mesh Steganography and Security ImprovementYimin Wang0https://orcid.org/0000-0003-2515-6602Lingsheng Kong1https://orcid.org/0000-0003-0156-4353Zhenxing Qian2https://orcid.org/0000-0002-5224-6374Guorui Feng3https://orcid.org/0000-0001-8249-2608Xinpeng Zhang4https://orcid.org/0000-0002-0212-3501Jianmin Zheng5https://orcid.org/0000-0002-5062-6226School of Computer Engineering and Science, Shanghai University, Shanghai, ChinaSchool of Computer Engineering and Science, Shanghai University, Shanghai, ChinaSchool of Computer Science, Shanghai Institute of Intelligent Electronics and Systems, Fudan University, Shanghai, ChinaSchool of Communication and Information Engineering, Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai, ChinaSchool of Computer Science, Shanghai Institute of Intelligent Electronics and Systems, Fudan University, Shanghai, ChinaSchool of Computer Science and Engineering, Nanyang Technological University, SingaporePermutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers.https://ieeexplore.ieee.org/document/8935245/Permutation-based steganographysteganalysispolygonal meshes |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yimin Wang Lingsheng Kong Zhenxing Qian Guorui Feng Xinpeng Zhang Jianmin Zheng |
spellingShingle |
Yimin Wang Lingsheng Kong Zhenxing Qian Guorui Feng Xinpeng Zhang Jianmin Zheng Breaking Permutation-Based Mesh Steganography and Security Improvement IEEE Access Permutation-based steganography steganalysis polygonal meshes |
author_facet |
Yimin Wang Lingsheng Kong Zhenxing Qian Guorui Feng Xinpeng Zhang Jianmin Zheng |
author_sort |
Yimin Wang |
title |
Breaking Permutation-Based Mesh Steganography and Security Improvement |
title_short |
Breaking Permutation-Based Mesh Steganography and Security Improvement |
title_full |
Breaking Permutation-Based Mesh Steganography and Security Improvement |
title_fullStr |
Breaking Permutation-Based Mesh Steganography and Security Improvement |
title_full_unstemmed |
Breaking Permutation-Based Mesh Steganography and Security Improvement |
title_sort |
breaking permutation-based mesh steganography and security improvement |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers. |
topic |
Permutation-based steganography steganalysis polygonal meshes |
url |
https://ieeexplore.ieee.org/document/8935245/ |
work_keys_str_mv |
AT yiminwang breakingpermutationbasedmeshsteganographyandsecurityimprovement AT lingshengkong breakingpermutationbasedmeshsteganographyandsecurityimprovement AT zhenxingqian breakingpermutationbasedmeshsteganographyandsecurityimprovement AT guoruifeng breakingpermutationbasedmeshsteganographyandsecurityimprovement AT xinpengzhang breakingpermutationbasedmeshsteganographyandsecurityimprovement AT jianminzheng breakingpermutationbasedmeshsteganographyandsecurityimprovement |
_version_ |
1724188076159270912 |