Abstract
In today’s world, digital communication plays a vital role. The art of communicating secret information has also evolved. For years, encryption has played a vital role in secure transmission of secret data. But due to lack of covertness, an eavesdropper can identify encrypted data and subject it to cryptanalysis. Here we present a method of hiding information such that its very existence is masked. This study aims to develop an enhanced technique for hiding data in 3-D images ensuring high invisibility. The data will be embedded in 3-D images with .pcd format and the coordinates of the 3-D image are used for data hiding.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Ghebleh and A. Kanso. A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation 19, 6:1898{1907, 2014.
T. Santanam Sumathi, C. P. and G. Umamaheswari. A study of various steganographic techniques used for information hiding. arXiv preprint, 2014.
Der-Chyuan Lou and Chen-Hao Hu. Lsb steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Information Sciences 188, pages 346{358, 2012.
H. T. Sencar M. Kharrazi and N. Memon. Cover selection for steganographic embedding. In Proc. IEEE International Conference on Image Processing, pages 110{120, 2006.
Haz Malik. Steganalysis of qim steganography using irregularity measure. Proc. of the 10th ACM workshop on Multimedia and security, ACM, pages 149{158, 2008.
V. Natarajan G. Aghila V. Prasanna Venkatesan Thiyagarajan, P. and R. Anitha. Pattern based 3d image steganography. 3D Research 4, pages 1{8, 2013.
Ekta Walia. Performance improvement of jpeg2000 steganography using qim. Communication and Computer, ISSN. 6:1548{1779, 2009.
Sunny Bansal K Rama, Sukhpreet and Rakesh K. Bansal. Steganography and classiffication of image steganography techniques. In Computing for Sustainable Global Development (INDIACom), pages 870{875, 2011.
V. Natarajan G. Aghila V. Prasanna Venkatesan Thiyagarajan, P. and R. Anitha. Pattern based 3d image steganography. 3D Research 4, pages 1{8, 2013.
Sharifullah Khan Akhtar, Naheed and Prashant Johri. An improved inverted lsb image steganography. In Issues and Challenges in Intelligent Computing Techniques (ICICT)t, pages 74{755, 2014.
U. Dinesh Acharya A. Renuka Hemalatha, S. and Priya R. Kamath. A secure and high capacity image steganography technique. Signal Image Processing, page 83, 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Anish, K., Arpita, N., Nikhil, H., Sumant, K., Bhagya, S., Desai, S.D. (2017). Intelligence System Security Based on 3-D Image. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_16
Download citation
DOI: https://doi.org/10.1007/978-981-10-3153-3_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3152-6
Online ISBN: 978-981-10-3153-3
eBook Packages: EngineeringEngineering (R0)