
Research Article
A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis
@INPROCEEDINGS{10.1007/978-3-031-56580-9_7, author={Shuai Ren and Liming Ma and Qiuyu Feng}, title={A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis}, proceedings={Digital Forensics and Cyber Crime. 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I}, proceedings_a={ICDF2C}, year={2024}, month={4}, keywords={Information hiding Multi carrier Carrier classification Dual 3D model Spectrum analysis}, doi={10.1007/978-3-031-56580-9_7} }
- Shuai Ren
Liming Ma
Qiuyu Feng
Year: 2024
A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis
ICDF2C
Springer
DOI: 10.1007/978-3-031-56580-9_7
Abstract
In order to avoid multiple degradation of 3D models in Cartesian coordinate system, this paper converts cartesian coordinate system to spherical coordinates, and proposes a multi carrier information hiding algorithm based on dual 3D model spectrum analysis. Firstly, the 3D model carrier set is standardized and preprocessed, and the carrier set is classified by calculating the Euler characteristic of each model. Secondly, construct the spectral standard orthogonal basis function of the dual model, and project the attribute values of each vertex onto a fixed standard orthogonal basis to obtain the corresponding spectral coefficients. Finally, the double information hiding is completed by modifying the polar diameter under the spherical coordinate system of each vertex and the geometric attributes under the Cartesian coordinate system. The experimental results show that in terms of robustness indicators, the algorithm improves its BCR values by 17.78%, 12.46%, 10.19%, 7.00%, 14.44%, 10.79%, 14.05%, 10.54%, 19.53%, 13.70%, 14.17%, and 10.26%, respectively, when compared with the two comparison algorithms in the face of 12.5° rotation, 0.7% noise addition, 50% simplification, 40% cutting, 70% remeshing, and 30 smoothing attacks. This algorithm has improved its performance in terms of invisibility, robustness, and anti-analysis, making it suitable for the field of information security transmission.