Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 515))

Abstract

In today’s world, digital communication plays a vital role. The art of communicating secret information has also evolved. For years, encryption has played a vital role in secure transmission of secret data. But due to lack of covertness, an eavesdropper can identify encrypted data and subject it to cryptanalysis. Here we present a method of hiding information such that its very existence is masked. This study aims to develop an enhanced technique for hiding data in 3-D images ensuring high invisibility. The data will be embedded in 3-D images with .pcd format and the coordinates of the 3-D image are used for data hiding.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Ghebleh and A. Kanso. A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation 19, 6:1898{1907, 2014.

    Google Scholar 

  2. T. Santanam Sumathi, C. P. and G. Umamaheswari. A study of various steganographic techniques used for information hiding. arXiv preprint, 2014.

    Google Scholar 

  3. Der-Chyuan Lou and Chen-Hao Hu. Lsb steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Information Sciences 188, pages 346{358, 2012.

    Google Scholar 

  4. H. T. Sencar M. Kharrazi and N. Memon. Cover selection for steganographic embedding. In Proc. IEEE International Conference on Image Processing, pages 110{120, 2006.

    Google Scholar 

  5. Haz Malik. Steganalysis of qim steganography using irregularity measure. Proc. of the 10th ACM workshop on Multimedia and security, ACM, pages 149{158, 2008.

    Google Scholar 

  6. V. Natarajan G. Aghila V. Prasanna Venkatesan Thiyagarajan, P. and R. Anitha. Pattern based 3d image steganography. 3D Research 4, pages 1{8, 2013.

    Google Scholar 

  7. Ekta Walia. Performance improvement of jpeg2000 steganography using qim. Communication and Computer, ISSN. 6:1548{1779, 2009.

    Google Scholar 

  8. Sunny Bansal K Rama, Sukhpreet and Rakesh K. Bansal. Steganography and classiffication of image steganography techniques. In Computing for Sustainable Global Development (INDIACom), pages 870{875, 2011.

    Google Scholar 

  9. V. Natarajan G. Aghila V. Prasanna Venkatesan Thiyagarajan, P. and R. Anitha. Pattern based 3d image steganography. 3D Research 4, pages 1{8, 2013.

    Google Scholar 

  10. Sharifullah Khan Akhtar, Naheed and Prashant Johri. An improved inverted lsb image steganography. In Issues and Challenges in Intelligent Computing Techniques (ICICT)t, pages 74{755, 2014.

    Google Scholar 

  11. U. Dinesh Acharya A. Renuka Hemalatha, S. and Priya R. Kamath. A secure and high capacity image steganography technique. Signal Image Processing, page 83, 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. D. Desai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Anish, K., Arpita, N., Nikhil, H., Sumant, K., Bhagya, S., Desai, S.D. (2017). Intelligence System Security Based on 3-D Image. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics