Affiliation:
1. Department of Computer Science and Engineering Assam University Silchar India
Abstract
AbstractData hiding refers to the technique employed to conceal sensitive data within various forms of multimedia, such as video, audio, text, 2D images, 3D images, and more, while also being able to successfully extract said information from the multimedia file. Although numerous data hiding techniques exist for 2D images, research on data hiding in 3D images is still in its early stages. Current 3D image steganography methods suffer from limitations in terms of embedding capacity and time complexity. To overcome these difficulties, we propose a novel 3D image steganographic technique using Parallel Breadth First Search (PBFS) with hyper‐object. Our approach utilizes the PBFS searching strategy, along with layer synchronization, to embed private information within the vertices of the 3D mesh images. To maximize the effectiveness of the process and minimize time, cost, complexity, and execution, we involved the data structure “bag” to parallelize the BFS. The implementation of bags is based on the pennant data structure. This methodology obtained an impressive Embedding Capacity (EC) of 9.00 bits per vertex (bpv) while maintaining superior visual quality and time complexity. Consequently, the proposed methodology holds great potential for widespread utilization across numerous sectors, including private and government organizations such as intelligence agencies, intellectual property rights management, cloud data security, defense, covert communication, medical imagery, and more.
Reference45 articles.
1. Cybercrime in India: an analysis of crime against women in ever expanding digital space;Sankhwar S;Secur Priv
2. Personal health record storage and sharing using searchable encryption and blockchain: a comprehensive survey;Bisht A;Secur Priv
3. Design of efficient storage and retrieval of medical records in blockchain based on InterPlanetary File System and modified bloom tree
4. A novel reversible data hiding scheme for VQ codebooks;Wang X;Secur Priv
5. Physically secure and privacy‐preserving blockchain enabled authentication scheme for internet of drones
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献