3D steganography hiding of information
DOI:
https://doi.org/10.30837/rt.2018.4.195.19Keywords:
steganography, 3D-printing, hiding information data, 3D-model, laser scannersAbstract
A new direction of technical steganography related to the concealment of information in the process of layer-by-layer creation (cultivation) of a solid-state object using various 3D-printing technologies is investigated. Information data are converted into a digital 3D-model of elementary physical objects that are placed inside this 3D-model of the container product. After printing, a solid object physically contains the hidden information that cannot be deleted or distorted without damaging the container product. In addition, the applied methods do not reduce the operational, aesthetic and any other properties of the finished product. The proposed complex is invariant to the method of layer-by-layer growing, that is, it can be equipped with any peripheral devices of 3D-printing of various manufacturers with any materials and principles of layer-by-layer creation.References
Katzenbeisser S., Petitcolas F. A. Information Hiding Techniques for Steganography and Digital Watermarking. – Norwood, MA, USA: Artech House, 2000. – 220 p.
Petitcolas F. A. P., Anderson R. J. and Kuhn M. G. Information hiding-a survey // Proceedings of the IEEE. – vol. 87, no. 7. – pp. 1062-1078. – Jul 1999.
Mazurczyk W., Smolarczyk M., Szczypiorski K. Retransmission steganography and its detection // Soft Computing, vol. 15, no. 3, pp. 505-515, 2011.
Nair A. S., Kumar A., Sur A. and Nandi S. Length based network steganography using UDP protocol // IEEE 3rd International Conference on Communication Software and Networks, Xi'an, 2011, pp. 726-730.
Ahsan K. and Kundur D. Practical data hiding in TCP Lip // ACM Workshop on Multimedia and Security, 2002, [On-line]. Internet: http://ee.tamu.edu/deepalpdf/ acm02.pdf.
S. H. Sellke, C. Wang, S. Bagchi and N. B. Shroff, "TCP/IP Timing Channels: Theory to Implementation", pp. 2204-2212, 2009.
Khan H., Javed M., Khayam S.A., Mirza F. Designing a cluster-based covert channel to evade disk investigation and forensics // Computers & Security. – Volume 30, Issue 1. – January 2011. [On-line]. Internet: https://www.sciencedirect.com/science/article/pii/ S016740481000088X
Khan H., Javed M., Khayam S.A., Mirza F. Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel / National University of Science & Technology (NUST). – Islamabad 44000, Pakistan. [On-line]. Internet: https://www.sigsac.org/ccs/CCS2009/pd/abstract_17.pdf
Morkevičius N., Petraitis G., Venčkauskas A., Čeponis J. Covert Channel for Cluster-based File Systems Using Multiple Cover Files // Information Technology and Control, 2013, Vol.42, No.3. pp. 32. [On-line]. Internet: http://itc.ktu.lt/index.php/ITC/article/ view/3328
Rani R. and Deep G. Digital 3D barcode image as a container for data hiding using steganography // 4th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, 2017. – Р. 325-330.
Sun Z. , Z. m. Lu and Z. Li. Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain // International Conference on Intelligent Information Hiding and Multimedia, Pasadena, CA, USA, 2006, pp. 593-596.
Wang K., Lavoué G., Denis F., Baskurt A. and He X. A Benchmark for 3D Mesh Watermarking // Shape Modeling International Conference, Aix-en-Provence, 2010. – Р. 231-235.
Motwani M. C., Bryant B. D., Dascalu S. M. and F. C. Harris Jr. 3D Multimedia Protection Using Artificial Neural Network // 7th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2010. – Р. 1-5.
Vasić B. Annotation of cultural heritage 3-D models by robust data embedding in the object mesh // 22nd Telecommunications Forum Telfor (TELFOR), Belgrade, 2014. – Р. 842-849.
Кузнецов А.А., Коваленко О.Ю. Стеганографическая защита информации с использованием 3D-печати // Інформаційна безпека держави, суспільства та особистості : зб. тез доповідей Всеукр. наук.-практ. конф., 16 квітня 2015 р. – Кіровоград : КНТУ, 2015. – С. 91-92.
Кузнецов О.О. Лекція 12: Технічна стеганографія. Приховування даних в твердотільних об'єктах за допомогою 3D-друку : Електронний конспект лекцій за дисципліною «Стеганографія». – Харків : Харк. нац. ун-т ім. Каразіна, 2016. – 14 с.
Коваленко О.Ю. Розробка лабораторного комплексу технічної стеганографії з використанням тривимірного друку : Пояснювальна записка до дипломної роботи бакалавра (Керівник О.О. Кузнецов). – Харків : Харк. нац. ун-т ім. Каразіна, 2015. – 47 с.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).