Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our appro...Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain,allowing us to greatly expand the size of the watermark.After that,our method does two rounds of insertion,each applying a different type of Clifford-wavelet transform.Before being placed into the Clifford-multiwavelet coefficients,the watermark,which is a mixture of the mesh description,source mesh signature(produced using SHA512),and a logo encrypted using the RSA(Ronald Shamir Adleman)technique,is encoded using Turbo-code.Using the Least Significant Bit method steps,data embedding involves modulation and insertion processes.Finally,the watermarked mesh is reconstructed using the inverse Cliffordmultiwavelet transform.Due to the utilization of a hybrid insertion domain,our technique has demonstrated a very high insertion rate while retaining mesh quality.The mesh is watermarked,and the extracted data is acquired in real-time.Our approach is also resistant to the most common types of attacks.Our findings reveal that the current approach improves on previous efforts.展开更多
A new steganographic approach for 24 bit color images that can resist the RQP(raw quick pairs) steganalysis is described. The technique is based on modification of color triplets such that the existing color palett...A new steganographic approach for 24 bit color images that can resist the RQP(raw quick pairs) steganalysis is described. The technique is based on modification of color triplets such that the existing color palette is not excessively expanded or even reduced. In this way, numbers of unique colors and pairs of close colors in the image do not rise significantly. This invalidates the RQP analysis. Experimental results are presented to support the argument.展开更多
The weakness of Human Auditory System (HAS) led the audio steganography process to be used in hiding data in the digital sound. Audio steganography is implemented here by using Least Significant Bit (LSB) algorithm to...The weakness of Human Auditory System (HAS) led the audio steganography process to be used in hiding data in the digital sound. Audio steganography is implemented here by using Least Significant Bit (LSB) algorithm to hide message into multiple audio files. This is achieved by 1st, 2nd, 3rd, and 4th bits hiding ratios. In comparison to other used bits, hiding results show that the use of 1st bit in LSB method for embedding data is much better than those used bits as expected. In addition to that and according to the results, file’s size affects strongly upon the effectiveness of the embedding process while hiding starting position doesn’t affect upon the variation of the adopted statistical estimators regardless to which bit is used. Among the statistical estimators that have been adopted here, the Mean Absolute Error (MAE) seems to be the best one in testing hiding process.展开更多
基金This research work was funded by the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia through the project number(IF-PSAU-2021/01/17567)。
文摘Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain,allowing us to greatly expand the size of the watermark.After that,our method does two rounds of insertion,each applying a different type of Clifford-wavelet transform.Before being placed into the Clifford-multiwavelet coefficients,the watermark,which is a mixture of the mesh description,source mesh signature(produced using SHA512),and a logo encrypted using the RSA(Ronald Shamir Adleman)technique,is encoded using Turbo-code.Using the Least Significant Bit method steps,data embedding involves modulation and insertion processes.Finally,the watermarked mesh is reconstructed using the inverse Cliffordmultiwavelet transform.Due to the utilization of a hybrid insertion domain,our technique has demonstrated a very high insertion rate while retaining mesh quality.The mesh is watermarked,and the extracted data is acquired in real-time.Our approach is also resistant to the most common types of attacks.Our findings reveal that the current approach improves on previous efforts.
文摘A new steganographic approach for 24 bit color images that can resist the RQP(raw quick pairs) steganalysis is described. The technique is based on modification of color triplets such that the existing color palette is not excessively expanded or even reduced. In this way, numbers of unique colors and pairs of close colors in the image do not rise significantly. This invalidates the RQP analysis. Experimental results are presented to support the argument.
文摘The weakness of Human Auditory System (HAS) led the audio steganography process to be used in hiding data in the digital sound. Audio steganography is implemented here by using Least Significant Bit (LSB) algorithm to hide message into multiple audio files. This is achieved by 1st, 2nd, 3rd, and 4th bits hiding ratios. In comparison to other used bits, hiding results show that the use of 1st bit in LSB method for embedding data is much better than those used bits as expected. In addition to that and according to the results, file’s size affects strongly upon the effectiveness of the embedding process while hiding starting position doesn’t affect upon the variation of the adopted statistical estimators regardless to which bit is used. Among the statistical estimators that have been adopted here, the Mean Absolute Error (MAE) seems to be the best one in testing hiding process.