Highly Secured 3D Object Steganography Technique for Hiding Compressed Data

Document Type : Original Article

Authors

1 Faculty of Engineering, Portsaid Univeristy

2 Port Said University, Faculty of Engineering, Physics and Engineering Mathematics Department, Egypt

3 Port said University, Faculty of Science, Department of Mathematics, Egypt.

4 faculty of computers and information, Damietta university , Egypt

Abstract

Steganography is a technique that involves hiding secret information within some objects such as image, audio, video, or 3D object, without leaving any noticeable or machine-detectable alterations. To ensure, more security and higher capacity, the steganographic techniques might include a data compression step for the secret information. In this paper, we propose a novel 3D steganographic technique, that enhances both the security and the capacity of the 3D object used to hide the compressed secret information. For that purpose, we use the Gray code sequence to indicate the vertices of the 3D object used for concealing the compressed information; hence, we apply the LSB to embed the compressed information. The proposed 3D steganographic technique has been evaluated through multiple metrics to assess its performance. These metrics include Embedding Capacity value, Mean Square Error Ratio, Peak Signal-to-Noise Ratio, and Normalized Correlation value. Experimental results illustrate that the proposed technique exhibits a high level of security when compared to several existing techniques. The proposed technique provides minimal distortion, as shown by the Mean Square Error Ratio, which is less than 2 × . The Peak Signal-to-Noise Ratio for all the objects under consideration is more than 150 dB, which indicates high-quality stego-objects compared to the original objects. Furthermore, the results obtained when computing the Normalized Correlation against various attacks; as the obtained values are approximately equal to one; which indicate that the proposed technique provides robustness against noise, filtering, and vertex reordering attacks.

Keywords

Main Subjects