Method of 3D-steganography

  • Alexandr Kuznetsov V. N. Karazin Kharkiv National University https://orcid.org/0000-0003-2331-6326
  • Oleh Stefanovych V. N. Karazin Kharkiv National University
  • Kateryna Kuznetsova V. N. Karazin Kharkiv National University
  • Mykola Pastukhov University of Customs and Finance, Dnipro
  • Dmytro Prokopovych-Tkachenko University of Customs and Finance, Dnipro
Keywords: steganography, 3D-printing, hiding information data, 3D-model, laser scanners

Abstract

In this work, a new direction of technical steganography related to the concealment of information in the process of layer-by-layer creation (cultivation) of a solid-state object using various 3D-printing technologies was investigated. Information data is converted into a digital 3D-model of elementary physical objects that are placed inside this 3D-model of the container product. After printing, a solid object physically contains the hidden information that cannot be deleted or distorted without damaging the container product. In addition, the applied methods do not reduce the operational, aesthetic and any other properties of the finished product. The proposed complex is invariant to the method of layer-by-layer growing, that is, it can be equipped with any peripheral devices of 3D-printing of various manufacturers with any materials and principles of layer-by-layer creation. 

Downloads

Download data is not yet available.

Author Biographies

Alexandr Kuznetsov, V. N. Karazin Kharkiv National University

Doctor of Sciences (Engineering), Full Prof., Academician of the Academy of Applied Radioelectronics Sciences

Oleh Stefanovych, V. N. Karazin Kharkiv National University

computer science student

Kateryna Kuznetsova, V. N. Karazin Kharkiv National University

computer science student

Mykola Pastukhov, University of Customs and Finance, Dnipro

Ph.D., associate professor

Dmytro Prokopovych-Tkachenko, University of Customs and Finance, Dnipro

Ph.D., Head of Chair

References

Katzenbeisser S., Petitcolas F. A. Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA, USA: Artech House, 2000. 220 p.

Petitcolas F. A. P., Anderson R. J., Kuhn M. G. Information hiding-a survey. Proceedings of the IEEE.1999. Vol. 87, №7. P. 1062–1078.

Mazurczyk W., Smolarczyk M., Szczypiorski K. Retransmission steganography and its detection. Soft Computing. 2011. Vol.15, №3. P. 505–515.

Length based network steganography using UDP protocol/ Nair A. S., Kumar A., Sur A., Nandi S. 2011 IEEE 3rd International Conference on Communication Software and Networks. Xi'an, 2011. P. 726–730.

Ahsan K., Kundur D. Practical data hiding in TCP/IP. ACM Workshop on Multimedia and Security, 2002. URL: https://www.gray-world.net/es/papers/acm02.pdf

TCP/IP Timing Channels: Theory to Implementation / Sellke S. H., Wang C., Bagchi S., Shroff N. B. 2009. P. 2204–2212.

Designing a cluster-based covert channel to evade disk investigation and forensics/ Khan H., Javed M., Khayam S.A., Mirza F. Computers & Security. 2011. Vol. 30, Issue 1. URL: https://www.sciencedirect.com/science/article/pii/ S016740481000088X

Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel/ Khan H., Javed M., Khayam S.A., Mirza F. National University of Science & Technology (NUST), Islamabad 44000, Pakistan. URL: https://www.sigsac.org/ccs/CCS2009/ pd/abstract_17.pdf

Covert Channel for Cluster-based File Systems Using Multiple Cover Files / Morkevičius N., Petraitis G., A. Venčkauskas, J. Čeponis. Information Technology and Control. 2013. Vol. 42, №3. P. 32. URL:http://itc.ktu.lt/index.php/ITC/article/ view/3328

Rani R., Deep G. Digital 3D barcode image as a container for data hiding using steganography. 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). Solan, 2017. P. 325–330.

Sun Z., Lu Z. M., Li Z. Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain. 2006 International Conference on Intelligent Information Hiding and Multimedia. Pasadena, CA, USA, 2006. P. 593–596.

A Benchmark for 3D Mesh Watermarking / Wang K., Lavoué G., Denis F., Baskurt A., He X. 2010 Shape Modeling International Conference. Aix-en-Provence, 2010. P. 231–235.

D Multimedia Protection Using Artificial Neural Network /Motwani M. C., Bryant B. D., Dascalu S. M. , Harris Jr. F. C. 2010 7th IEEE Consumer Communications and Networking Conference. Las Vegas, NV, 2010. P. 1–5.

Vasić B. Annotation of cultural heritage 3-D models by robust data embedding in the object mesh. 2014 22nd Telecommunications Forum Telfor (TELFOR). Belgrade, 2014. P. 842–849.

Kuznetsov A.A., Kovalenko O.Yu. Steganographic protection of information using 3D printing. Information Security of the State, Society and Personality: A Collection of Abstracts of the All-Ukrainian Scientific and Practical Conference, April 16, 2015. Kirovograd: KNTU, 2015.P. 91–92. (in Ukrainian)

Published
2019-01-13
Cited
How to Cite
Kuznetsov, A., Stefanovych, O., Kuznetsova, K., Pastukhov, M., & Prokopovych-Tkachenko, D. (2019). Method of 3D-steganography. Computer Science and Cybersecurity, (4), 4-12. Retrieved from https://periodicals.karazin.ua/cscs/article/view/12247
Section
Статті

Most read articles by the same author(s)