2019 International Conference on Advanced Communication Technologies and Networking (CommNet) 2019
DOI: 10.1109/commnet.2019.8742346
|View full text |Cite
|
Sign up to set email alerts
|

A High Capacity Geometrical Domain Based 3D Image Steganography Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Consequently, these models can be utilized in steganography, acting as secure and innocent host media for sheltering covert data. In this paper, the Blowfish encryption algorithm is performed on confidential data for higher security [28,[35][36][37][38]. The work described in the related works fails to include the benefits of LSB and AES advantage.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, these models can be utilized in steganography, acting as secure and innocent host media for sheltering covert data. In this paper, the Blowfish encryption algorithm is performed on confidential data for higher security [28,[35][36][37][38]. The work described in the related works fails to include the benefits of LSB and AES advantage.…”
Section: Related Workmentioning
confidence: 99%
“…Triangle Mesh and Quad Mesh [13] 3D-object steganography can be utilized within one of three different domains, namely geometry, topology, and representation. 1) Geometry-based Steganography Domain: The geometrical components of 3D objects in this domain are utilized to conceal the messages.…”
Section: Figurementioning
confidence: 99%
“…Along this path, alterations are applied to the vertices by adjusting three coordinates within the Spherical Coordinate System (SCS). Also, in [23], a 3D-object steganography technique was proposed. This technique conceals the encrypted message in the polygons of the object.…”
Section: Related Workmentioning
confidence: 99%
“…In a steganographic scenario, the secret information is hidden in another object called the cover object to form the stego object, which can be saved and transmitted [2]. There are many types of steganography where different cover objects can be used including text [3], audio [4,5,6,7], video [8,9], 2D images [10,11], 3D images [12,13,14,15], as well as information matrices [16]. In audio steganography, the secret information is hidden in digital audio signals which results in a slight change in the cover audio, however this change is unrecognizable since audio steganography makes use of the psycho-acoustical masking phenomenon of the human auditory system (HAS) [17].…”
Section: Introductionmentioning
confidence: 99%