Breaking Permutation-Based Mesh Steganography and Security Improvement

Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated...

Full description

Bibliographic Details
Main Authors: Yimin Wang, Lingsheng Kong, Zhenxing Qian, Guorui Feng, Xinpeng Zhang, Jianmin Zheng
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8935245/
id doaj-eb3b530a595b432999b74e2741f9e738
record_format Article
spelling doaj-eb3b530a595b432999b74e2741f9e7382021-03-30T00:40:20ZengIEEEIEEE Access2169-35362019-01-01718330018331010.1109/ACCESS.2019.29604558935245Breaking Permutation-Based Mesh Steganography and Security ImprovementYimin Wang0https://orcid.org/0000-0003-2515-6602Lingsheng Kong1https://orcid.org/0000-0003-0156-4353Zhenxing Qian2https://orcid.org/0000-0002-5224-6374Guorui Feng3https://orcid.org/0000-0001-8249-2608Xinpeng Zhang4https://orcid.org/0000-0002-0212-3501Jianmin Zheng5https://orcid.org/0000-0002-5062-6226School of Computer Engineering and Science, Shanghai University, Shanghai, ChinaSchool of Computer Engineering and Science, Shanghai University, Shanghai, ChinaSchool of Computer Science, Shanghai Institute of Intelligent Electronics and Systems, Fudan University, Shanghai, ChinaSchool of Communication and Information Engineering, Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai, ChinaSchool of Computer Science, Shanghai Institute of Intelligent Electronics and Systems, Fudan University, Shanghai, ChinaSchool of Computer Science and Engineering, Nanyang Technological University, SingaporePermutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers.https://ieeexplore.ieee.org/document/8935245/Permutation-based steganographysteganalysispolygonal meshes
collection DOAJ
language English
format Article
sources DOAJ
author Yimin Wang
Lingsheng Kong
Zhenxing Qian
Guorui Feng
Xinpeng Zhang
Jianmin Zheng
spellingShingle Yimin Wang
Lingsheng Kong
Zhenxing Qian
Guorui Feng
Xinpeng Zhang
Jianmin Zheng
Breaking Permutation-Based Mesh Steganography and Security Improvement
IEEE Access
Permutation-based steganography
steganalysis
polygonal meshes
author_facet Yimin Wang
Lingsheng Kong
Zhenxing Qian
Guorui Feng
Xinpeng Zhang
Jianmin Zheng
author_sort Yimin Wang
title Breaking Permutation-Based Mesh Steganography and Security Improvement
title_short Breaking Permutation-Based Mesh Steganography and Security Improvement
title_full Breaking Permutation-Based Mesh Steganography and Security Improvement
title_fullStr Breaking Permutation-Based Mesh Steganography and Security Improvement
title_full_unstemmed Breaking Permutation-Based Mesh Steganography and Security Improvement
title_sort breaking permutation-based mesh steganography and security improvement
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Permutation-based steganography in polygonal meshes can provide considerably large embedding capacities for hiding secret messages. However, corresponding steganalysis techniques against such methods have never been studied. This paper identifies the essential differences between naturally generated meshes and meshes produced by permutation-based steganography methods. It is found that the two types of meshes differ significantly in the distribution of topological distances between consecutive mesh elements. Therefore, by measuring the orderliness of the vertex list and the face list of meshes, we develop solutions for several mesh steganalysis problems. These solutions are effective, leading to high detection accuracy; and they are also universal, requiring no knowledge such as which steganography method is used and what data embedding rate is adopted for the detection mechanism to work. Moreover, this paper also presents a security-improved permutation-based mesh steganography approach, by taking advantage of the connectivity information of polygonal meshes and establishing a good trade-off between embedding capacity and undetectability. Without bringing global changes, our approach embeds secret messages into local neighborhoods on meshes. As a result, meshes generated by the proposed steganography approach tend to have natural structures that are unlikely to draw suspicions to steganalyzers.
topic Permutation-based steganography
steganalysis
polygonal meshes
url https://ieeexplore.ieee.org/document/8935245/
work_keys_str_mv AT yiminwang breakingpermutationbasedmeshsteganographyandsecurityimprovement
AT lingshengkong breakingpermutationbasedmeshsteganographyandsecurityimprovement
AT zhenxingqian breakingpermutationbasedmeshsteganographyandsecurityimprovement
AT guoruifeng breakingpermutationbasedmeshsteganographyandsecurityimprovement
AT xinpengzhang breakingpermutationbasedmeshsteganographyandsecurityimprovement
AT jianminzheng breakingpermutationbasedmeshsteganographyandsecurityimprovement
_version_ 1724188076159270912