通信学报 ›› 2019, Vol. 40 ›› Issue (5): 211-222.doi: 10.11959/j.issn.1000-436x.2019108
• 学术通信 • 上一篇
修回日期:
2019-03-28
出版日期:
2019-05-25
发布日期:
2019-05-30
作者简介:
任帅(1982- ),男,山西太原人,博士,长安大学副教授,主要研究方向为信息隐藏技术。|王震(1993- ),男,山西运城人,长安大学硕士生,主要研究方向为信息隐藏技术。|苏东旭(1995- ),男,河南许昌人,长安大学硕士生,主要研究方向为多媒体数据检索及认证。|张弢(1984- ),女,山西吕梁人,博士,长安大学副教授,主要研究方向为多载体信息隐藏技术。|慕德俊(1963- ),男,山东荣成人,博士,西北工业大学教授,主要研究方向为网络与信息安全。
基金资助:
Shuai REN1,Zhen WANG1(),Dongxu SU1,Tao ZHANG2,Dejun MU3
Revised:
2019-03-28
Online:
2019-05-25
Published:
2019-05-30
Supported by:
摘要:
针对三维模型信息隐藏无法有效抵抗联合攻击,秘密信息极易被破坏而无法正确提取的问题,提出一种基于三维模型贴图与结构数据的信息隐藏算法。首先,在标准图片库中选取多幅原始 stl 三维模型载体的纹理贴图,利用db1函数经过2次二维离散Daubechies变换将备份的隐秘消息以水印嵌入的思想隐藏其中;其次,以stl类型的三维模型为原始结构载体,利用帧化采样的小波域三维模型信息隐藏算法,将要隐藏的隐秘信息嵌入相应变换空间;最后,利用正交投影的纹理映射算法将二维贴图数据与三维stl数据矩阵相乘,生成含密obj模型文件进行传输。算法利用三维模型的贴图与拓扑坐标空间双重嵌入隐秘信息,有效增强了算法的顽健性。实验分析表明,含密三维模型的不可见性、顽健性以及抗分析性均有提升,可以实现不同类型载体冗余空间的备份隐藏嵌入,为复杂环境下的信息安全传输提供一种可靠的技术手段。
中图分类号:
任帅,王震,苏东旭,张弢,慕德俊. 基于三维模型贴图与结构数据的信息隐藏算法[J]. 通信学报, 2019, 40(5): 211-222.
Shuai REN,Zhen WANG,Dongxu SU,Tao ZHANG,Dejun MU. Information hiding algorithm based on mapping and structure data of 3D model[J]. Journal on Communications, 2019, 40(5): 211-222.
[35] | YAO X H . Image-based information masking technology[D]. Xi’an:Northwestern Polytechnical University, 2004: 16-22. |
[36] | 熊秋波 . 不规则区域纹理提取与3D模型贴图[D]. 长沙:中南林业科技大学, 2010: 20-29. |
XIONG Q B . The irregular regional texture extraction and 3d model mapping[D]. Changsha:Central South University of Forestry and Technology, 2010: 20-29. | |
[37] | 王新宇, 詹永照 . 构造顶点分布特征的三维模型数字水印算法[J]. 计算机辅助设计与图形学学报, 2014,26(2): 272-279. |
[1] | 王静, 郁梅, 蒋刚毅 ,等. 基于单深度帧内模式的3D-HEVC深度视频信息隐藏算法[J]. 光电子:激光, 2017(8): 893-901. |
WANG J , YU M , JIANG G Y ,et al. An information hiding algorithm of depth video in 3D-HEVC based on single depth intra mode[J]. Journal of Optoelectronics?Laser, 2017(8): 893-901. | |
[37] | WANG X Y , ZHAN Y Z . A watermarking scheme for three-dimensional models by constructing vertex distribution on characteristics[J]. Journal of Computer-Aided Design & Computer Graphics, 2014,26(2): 272-279. |
[38] | CARLSON N A , PORTER J R . On the cardinality of hausdorff spaces and h-closed spaces[J]. Topology & Its Applications, 2013,160(1): 137-142. |
[2] | YUAN Z Q , GUAN Z J , FENG H . An improved information hiding algorithm based on image[C]// IEEE International Conference on Software Engineering Research. IEEE, 2017. |
[3] | ZHOU X , GONG W , FU W L ,et al. An improved method for LSB based color image steganography combined with cryptography[C]// IEEE/ACIS International Conference on Computer & Information Science. IEEE/ACIS, 2016. |
[4] | LIU X S , ZHANG J X . Large-capacity LSB information hiding scheme based on two-dimensional code[C]// The 7th International Conference on Electronics Information and Emergency Communication. IEEE , 2017. |
[5] | TSAI Y Y , HUANG Y H , LIN R J ,et al. An adjustable interpolation-based data hiding algorithm based on LSB substitution and histogram shifting[J]. International Journal of Digital Crime & Forensics, 2016,8(2): 48-61. |
[6] | KER A D , . Improved detection of LSB steganography in grayscale images[C]// International Conference on Information Hiding. 2004: 97-115. |
[7] | DUMITRESCU S , WU X , WANG Z . Detection of LSB steganography via sample pair analysis[C]// Revised Papers From the International Workshop on Information Hiding. 2002: 355-372. |
[8] | FARID H , . Detecting hidden messages using higher-order statistical models[C]// International Conference on Image Processing. IEEE, 2002. |
[9] | SINGH V P , MALHOTRA S , SRIVASTAVA R . Combining hybrid information descriptors and DCT for improved CBIR performance[C]// International Conference on Control. IEEE, 2017. |
[39] | 张弢, 柳雨农, 邢亚林 ,等. 基于直方图移位的AMBTC域无损信息隐藏[J]. 计算机应用研究, 2019(6): 1-8. |
ZHANG T , LIU Y N , XING Y L , REN S ,et al. Lossless information hiding in ambtc domain based on histogram shift[J]. Application Research of Computers, 2019(6): 1-8. | |
[10] | PATEL P , PATEL Y . Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption[C]// The 15th International Conference on Communication Systems & Network Technologies. IEEE, 2015. |
[11] | 邵菲, 花俊 . 基于 Walsh序列扩频的图像信息隐藏[J]. 国外电子测量技术, 2009,28(8): 32-34. |
[40] | 姜艳梅 . 抗RS检测的无损信息隐藏算法研究[D]. 天津:天津大学, 2007: 38-51. |
JIANG Y M . Research on lossless information hiding resisting rs detection[D]. Tianjin:Tianjin University, 2007: 38-51. | |
[11] | SHAO F , HUA J . Image information hiding based on Walsh sequence spread spectrum[J]. Foreign Electronic Measurement Technology, 2009,28(8): 32-34. |
[12] | 陈胜, 王兴众 . 基于离散余弦变换和置乱融合模型的图像信息隐藏方法研究[J]. 舰船电子工程, 2017(12): 64-67. |
CHEN S , WANG X Z . Research on image information hiding method based on DCT and scrambling fusion model[J]. Ship Electronic Engineering, 2017(12): 64-67. | |
[13] | TIJHUIS A G . Stability analysis of the marching-on-in-time method for one-and two-dimensional transient electromagnetic scattering problems[J]. Colloquium topics in applied numerical analysis, 1984(2): 363-386. |
[14] | SWELDENS W . The lifting scheme:a custom-design construction of biorthogonal wavelets[J]. Applied & Computational Harmonic Analysis, 1996,3(2): 186-200. |
[15] | SANGWINE S J . Fourier transforms of colour images using quaternion or hypercomplex,numbers[J]. Electronics Letters, 1996,32(21): 1979-1980. |
[16] | SANGWINE S J . Colour image edge detector based on quaternion convolution[J]. Electronics Letters, 2002,34(10): 969-971. |
[17] | MOXEY C E , ELL T A , SANGWINE S J . Hypercomplex operators and vector correlation[C]// Signal Processing Conference,IEEE, 2002: 1-4. |
[18] | 綦科, 张大方, 谢冬青 . 基于帧化采样和小波 HMM 的三维模型信息隐藏[J]. 计算机辅助设计与图形学学报, 2010,22(8): 1406-1411. |
QI K , ZHANG D F , XIE D Q . Steganography for three-dimensional model based on frame transform and hmm model in wavelet domain[J]. Journal of Computer-Aided Design & Computer Graphics, 2010,22(8): 1406-1411. | |
[19] | 任帅, 张弢, 杨涛 ,等. 基于三维模型球型分割的信息隐藏算法[J]. 计算机应用, 2017,37(9): 2576-2580. |
REN S , ZHANG T , YANG T ,et al. Information hiding algorithm based on spherical segmentation of three-dimensional model[J]. Journal of computer application, 2017,37(9): 2576-2580. | |
[20] | 张弢, 慕德俊, 任帅 ,等. 利用内切球解析的三维模型信息隐藏算法[J]. 西安电子科技大学学报, 2014,41(2): 185-190. |
ZHANG T , MU D J , REN S ,et al. Information hiding scheme for 3D models based on skeleton and inscribed sphere analysis[J]. Journal of Xidian University, 2014,41(2): 185-190. | |
[21] | 任帅, 张弢, 徐振超 ,等. 特征点标注与聚类的三维模型信息隐藏算法[J]. 计算机应用, 2018,38(4): 1017-1022. |
REN S , ZHANG T , XU Z C ,et al. Information hiding algorithm for 3D models based on feature point labeling and clustering[J]. Journal of Computer Applications, 2018,38(4): 1017-1022. | |
[22] | PUTEAUX P , PUECH W . Reversible data hiding in encrypted images based on adaptive local entropy analysis[C]// The 17th International Conference on Image Processing Theory. IEEE, 2018. |
[23] | ZHOU W , ZHANG W , YU N . A new rule for cost reassignment in adaptive steganography[J]. IEEE Transactions on Information Forensics and Security, 2017: 1-1. |
[24] | CHANDRAMOULI R , MEMON N D . Steganography capacity:a steganalysis perspective[J].,2003,5020. Security & Watermarking of Multimedia Contents V, 2003,5020. |
[25] | JOSEPH P , VISHNUKUMAR S . A study on steganographic techniques[C]// Global Conference on Communication Technologies (GCCT). IEEE, 2015: 206-210. |
[26] | COGRANNE R , SEDIGHI V , FRIDRICH J . Practical strategies for content-adaptive batch steganography and pooled steganalysis[C]// IEEE International Conference on Acoustics. 2017. |
[27] | GAO Z Z , TANG G M , DAI J M . Research on payload adaptive batch steganography[J]. Application Research of Computers, 2013,30(9): 2780-2783. |
[28] | 杨烨, 孙容海, 施林甫 ,等. 面向大文件的多载体图像信息隐藏方法[J]. 信息技术, 2018(5): 60-62. |
YANG Y , SUN R H , SHI L F ,et al. Multiple cover images based information hiding method for large file[J]. Information Technology, 2018(5): 60-62. | |
[29] | 黄福鸿 . 数字图像多算法协同隐写方案研究与设计[D]. 北京:北京邮电大学, 2018. |
HUANG H F . Research on scheme of multlple digital image a lgorithms cooperate for steganography[D]. Beijing:Beijing University of Posts and Telecommunications, 2018. | |
[30] | 林代茂, 胡岚, 郭云彪 ,等. 广义信息隐藏技术的机理与模型[J]. 北京邮电大学学报, 2005,28(1): 1-5. |
LIN D M , HU L , GUO Y B ,et al. The mechanism and model of generalized information hiding technology[J]. Journal of Beijing University of Posts and Telecommunications, 2005,28(1): 1-5. | |
[31] | KER A D , . The square root law requires a linear key[C]// The 11th ACM Workshop on Multimedia and Security. 2009: 85-92. |
[32] | PEVNY T , FRIDRICH J . Merging Markov and DCT features for multi-class jpeg steganalysis[C]// Security,Steganography and Watermarking of Multimedia Contents IX. International Society for Optics and Photonics, 2007:650503. |
[33] | 梁小萍, 何军辉, 李健乾 ,等. 隐写分析——原理、现状与展望[J]. 中山大学学报(自然科学版), 2004,43(6): 93-96. |
LIANG X P , HE J H , LI J K ,et al. Steganalysis——principle,actuality and prospect[J]. ACTA Scientiarum Naturalium Universitatis Sunyatseni, 2004,43(6): 93-96. | |
[34] | 胡自权 . 博弈论在信息隐藏中的生存能力研究[D]. 成都:电子科技大学, 2013. 6-8. |
HU Z Q . Research on survivability of hidden information using game theory[D]. Chengdu:University of Electronic Science and Technology of China, 2013. 6-8. | |
[35] | 姚辉灿 . 基于图像的信息掩密技术[D]. 西安:西北工业大学, 2004: 16-22. |
[1] | 黄冬艳, 李琨. 多地址的时间型区块链隐蔽通信方法研究[J]. 通信学报, 2023, 44(2): 148-159. |
[2] | 夏超, 刘亚奇, 关晴骁, 金鑫, 张艳硕, 许盛伟. 基于非线性残差的JPEG图像隐写分析[J]. 通信学报, 2023, 44(1): 142-152. |
[3] | 李晖, 金家立, 金纾羽, 马卫娇. 基于自动选择编码及动态选词策略的文本隐写方法[J]. 通信学报, 2022, 43(9): 240-253. |
[4] | 吴友情, 马文静, 殷赵霞, 彭银银, 张新鹏. 基于预测误差位平面压缩的密文图像可逆信息隐藏[J]. 通信学报, 2022, 43(8): 219-230. |
[5] | 周志立, 王美民, 杨高波, 朱剑宇, 孙星明. 基于轮廓自动生成的构造式图像隐写方法[J]. 通信学报, 2021, 42(9): 144-154. |
[6] | 张祯, 倪嘉铭, 姚晔, 龚礼春, 王玉娟, 吴国华. 基于同义词扩展和标签传递机制的文本无载体信息隐藏方法[J]. 通信学报, 2021, 42(9): 173-183. |
[7] | 吴国华,龚礼春,袁理锋,姚晔. 中文文本信息隐藏研究进展[J]. 通信学报, 2019, 40(9): 145-156. |
[8] | 姚远志,王锋,严文博,俞能海. 基于二维码和可逆可视水印的图像隐私保护方案[J]. 通信学报, 2019, 40(11): 65-75. |
[9] | 徐锋,李佳楠,孙建国. 复合的海图安全防护技术研究[J]. 通信学报, 2016, 37(2): 174-179. |
[10] | 赖明珠,张立国,冯维淼,王媛媛,王勇,李守政. 基于语义特征的电子海图权限水印研究[J]. 通信学报, 2016, 37(11): 137-145. |
[11] | 花广路,李芝棠,冯兵. 基于H.264/AVC视频的低频隐写算法[J]. 通信学报, 2013, 34(Z2): 47-50. |
[12] | 花广路1,2,李芝棠1,2,3,冯兵1,2. 基于H.264/AVC视频的低频隐写算法[J]. 通信学报, 2013, 34(Z2): 10-50. |
[13] | 陈立全,卢苗,胡爱群,孙晓燕. 基于二级定位的编码信道信息隐藏算法[J]. 通信学报, 2013, 34(12): 120-130. |
[14] | 陈嘉勇,刘九芬,祝跃飞,张卫明. 隐写术中矩阵编码的保密安全性[J]. 通信学报, 2012, 33(6): 174-179. |
[15] | 孙建国,张国印,武俊鹏,姚爱红. 基于集对分析的数字矢量地图水印性能验证技术[J]. 通信学报, 2010, 31(9A): 239-244. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|