• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lü Wanli, Tang Yun, Yin Zhaoxia, Luo Bin. Reversible Data Hiding for 3D Mesh Model in Encrypted Domain Based on Vertex Partition and Coordinate Standardization[J]. Journal of Computer Research and Development, 2024, 61(6): 1536-1544. DOI: 10.7544/issn1000-1239.202221040
Citation: Lü Wanli, Tang Yun, Yin Zhaoxia, Luo Bin. Reversible Data Hiding for 3D Mesh Model in Encrypted Domain Based on Vertex Partition and Coordinate Standardization[J]. Journal of Computer Research and Development, 2024, 61(6): 1536-1544. DOI: 10.7544/issn1000-1239.202221040

Reversible Data Hiding for 3D Mesh Model in Encrypted Domain Based on Vertex Partition and Coordinate Standardization

Funds: This work was supported by the National Natural Science Foundation of China (62172001,61872003) and the Research Project of Anhui Provincial Department of Education (2022AH50120).
More Information
  • Author Bio:

    Lü Wanli: born in 1974. PhD, associate professor. Her main research interests include image processing, digital watermarking, and information security

    Tang Yun: born in 1999. Master candidate. His main research interest includes reversible data hiding in 3D mesh models in encrypted domain

    Yin Zhaoxia: born in 1983. PhD, professor. Her main research interests include data hiding, privacy&security of multimedia and artificial intelligence

    Luo Bin: born in 1963. PhD, professor. His main research interests include patterns recognition and digital image processing

  • Received Date: December 29, 2022
  • Revised Date: August 15, 2023
  • Available Online: March 13, 2024
  • Reversible data hiding in encrypted domain enables the secure and confidential embedding of additional information in encrypted multimedia, ensuring the privacy and integrity of both the carrier and the embedded data during transmission. The authorized recipients can extract the data without any loss and recover the media successfully. In the realm of digital media, 3D mesh models, being a relatively nascent form, possesses a distinctive file structure markedly different from that of conventional image media. Consequently, limited research has been conducted in this domain. Augmenting the embedding capacity of 3D mesh models in the encrypted domain poses an enduring challenge. The direct application of multiple most significant bit prediction algorithm from the image domain to 3D mesh models is impeded by disparities in data storage formats, thus encumbering the predictive performance of algorithms. To effectively tackle this issue, we propose the adoption of coordinate standardization to eliminate the influence of the sign bit and ameliorate the prediction algorithm’s overall performance. In order to further mitigate the inclusion of redundant auxiliary information, we introduce the integration of the selection of embedding set vertices into our experiments, which effectively generates additional payload space. The experimental results affirm that our purposed methodology attains the maximum embedding capacity while guaranteeing lossless and separable recovery of both the model and the embedded information, surpassing the capabilities of existing techniques.

  • [1]
    张新鹏,殷赵霞. 多媒体信息隐藏技术[J]. 自然杂志,2017,39(2):87−95

    Zhang Xinpeng, Yin Zhaoxia. Data hiding in multimedia[J]. Chinese Journal of Nature, 2017, 39(2): 87−95 (in Chinese)
    [2]
    周航,陈可江,张卫明,等. 3D网格隐写与隐写分析回顾与展望[J]. 中国图象图形学报,2022,27(1):150−162

    Zhou Hang, Chen Kejiang, Zhang Weiming, et al. 3D mesh steganography and steganalysis: Review and prospect[J]. Journal of Image and Graphics, 2022, 27(1): 150−162 (in Chinese)
    [3]
    陈君夫,付章杰,张卫明,等. 基于深度学习的图像隐写分析综述[J]. 软件学报,2021,32(2):551−578

    Chen Junfu, Fu Zhangjie, Zhang Weiming, et a1. Review of image steganalysis based on deep learning[J]. Journal of Software, 2021, 32(2): 551−578 (in Chinese)
    [4]
    苏文桂,沈玉龙,王祥. 双层差值扩展可逆数字水印算法[J]. 计算机研究与发展,2019,56(7):1498−1505

    Su Wengui, Shen Yulong, Wang Xiang. Two-layer reversible watermarking algorithm using difference expansion[J]. Journal of Computer Research and Developmen, 2019, 56(7): 1498−1505 (in Chinese)
    [5]
    巩道福,刘粉林,罗向阳. 一种变容量的自嵌入图像易碎水印算法[J]. 计算机研究与发展,2014,5l(11):2505−2512

    Gong Daofu, Liu Fenlin, Luo Xiangyang. A variable payload self embedding fragile watermarking algorithm for image[J]. Journal of Computer Research and Development, 2014, 5l(11): 2505−2512 (in Chinese)
    [6]
    Shi Yunqing, Li Xiaolong, Zhang Xinpeng, et al. Reversible data hiding: advances in the past two decades[J]. IEEE Access, 2016, 4: 3210−3237 doi: 10.1109/ACCESS.2016.2573308
    [7]
    欧博,殷赵霞,项世军. 明文图像可逆信息隐藏综述[J]. 中国图象图形学报,2022,27(1):111−124

    Ou Bo, Yin Zhaoxia, Xiang Shijun. Overview of reversible data hiding in plaintext image[J]. Journal of Image and Graphics, 2022, 27(1): 111−124 (in Chinese)
    [8]
    罗雅婷,和红杰,陈帆,等. 基于非0比特个数特征的冗余转移图像加密安全性分析[J]. 计算机研究与发展,2022,59(11):2606−2617

    Luo Yating, He Hongjie, Chen Fan, et al. Security analysis of image encryption for redundant transfer based on non-zero-bit number feature[J]. Journal of Computer Research and Development, 2022, 59(11): 2606−2617 (in Chinese)
    [9]
    佘晓萌,杜洋,马文静,等. 基于像素预测和块标记的图像密文可逆信息隐藏[J]. 计算机研究与发展,2022,59(9):2089−2100

    She Xiaomeng, Du Yang, Ma Wenjing, et al. Reversible data hiding in encrypted images based on pixel prediction and block labeling[J]. Journal of Computer Research and Development, 2022, 59(9): 2089−2100 (in Chinese)
    [10]
    杨尧林,和红杰,陈帆,等. 基于预测误差自适应编码的图像加密可逆数据隐藏[J]. 计算机研究与发展,2021,58(6):1340−1350

    Yang Yaolin, He Hongjie, Chen Fan, et al. Reversible data hiding of image encryption based on prediction error adaptive coding[J]. Journal of Computer Research and Development, 2021, 58(6): 1340−1350 (in Chinese)
    [11]
    吴友情,马文静,殷赵霞,等. 基于预测误差位平面压缩的密文图像可逆信息隐藏[J]. 通信学报,2022,43(8):219−230

    Wu Youqing, Ma Wenjing, Yin Zhaoxia, et al. Reversible data hiding in encrypted images based on bit-plane com-pression of prediction error[J]. Journal on Communications, 2022, 43(8): 219−230 (in Chinese)
    [12]
    Puteaux P, Ong S, Wong K, et a1. A survey of reversible data hiding in encrypted images the first 12 years[J]. Journal of Visual Communication and image Representation, 2021, 77: 103085 doi: 10.1016/j.jvcir.2021.103085
    [13]
    Pucci J U, Christophe B R, Sisti J A, et al. Three-dimensional printing: Technologies, applications, and limitations in neurosurgery[J]. Biotechnology Advances, 2017, 35(5): 521−529 doi: 10.1016/j.biotechadv.2017.05.007
    [14]
    Ni Jiahua, Ling Haonan, Zhang Shiming, et al. Three-dimensional printing of metals for biomedical applications[J]. Materials Today Bio, 2019, 3: 100024 doi: 10.1016/j.mtbio.2019.100024
    [15]
    Yu Mingji, Yao Heng, Qin Chuan, et al. A comprehensive analysis method for reversible data hiding in stream-cipher-encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(10): 7241−7254 doi: 10.1109/TCSVT.2022.3172226
    [16]
    Jiang Ruiqi, Zhou Hang, Yu Nenghai. Reversible data hiding in encrypted three-dimensional mesh models[J]. IEEE Transactions on Multimedia, 2017, 20(1): 55−67
    [17]
    Xu Na, Tang Jin, Luo Bin, et al. Separable reversible data hiding based on integer mapping and MSB prediction for encrypted 3D mesh models[J]. Cognitive Computation, 2022, 14(3): 1172−1181 doi: 10.1007/s12559-021-09919-5
    [18]
    Yin Zhaoxia, Xu Na, Wang Feng, et al. Separable reversible data hiding based on integer mapping and multi-MSB prediction for encrypted 3D mesh models[C]//Proc of the 4th Chinese Conf on Pattern Recognition and Computer Vision. Berlin: Springer, 2021: 336–348
    [19]
    Lv Wanli. Cheng Lulu, Yin Zhaoxia. High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction[J]. Signal Processing, 2022, 201: 108686 doi: 10.1016/j.sigpro.2022.108686
    [20]
    Tang Yun, Cheng Lulu, Lv Wanli, et al. High capacity reversible data hiding for encrypted 3D mesh models based on topology[C]//Proc of the 21st Int Workshop on Digital Watermarking. Berlin: Springer, 2022: 205−218
    [21]
    Shah M, Zhang Weiming, Hu Honggang, et al. Homomorphic encryption-based reversible data hiding for 3D mesh models[J]. Arabian Journal for Science and Engineering, 2018, 43(12): 8145−8157 doi: 10.1007/s13369-018-3354-4
    [22]
    Jansen van Rensburg B, Pauline P, Puech W, et al. Homomorphic two tier reversible data hiding in encrypted 3D objects[C]//Proc of the 28th IEEE Int Conf on Image Processing. Piscataway, NJ: IEEE, 2021: 3068−3072
    [23]
    Tsai Y. Separable reversible data hiding for encrypted three-dimensional models based on spatial subdivision and space encoding[J]. IEEE Transactions on Multimedia, 2020, 23: 2286−2296
    [24]
    Modigari N, Valarmathi M, Jani A. Watermarking techniques for three-dimensional (3D) mesh models: A survey[J]. Multimedia Systems, 2022, 28(2): 623−641 doi: 10.1007/s00530-021-00860-z
    [25]
    Deering M. Geometry compression[C]//Proc of the 22nd Annual Conf on Computer Graphics and Interactive Techniques. New York: ACM, 1995: 13−20
    [26]
    Yin Zhaoxia, Xiang Youzhi, Zhang Xinpeng. Reversible data hiding in encrypted images based on muhi MSB prediction and Huffman coding[J]. IEEE Transactions on Muhimedia, 2020, 22(4): 874−884
    [27]
    Philip S, Patrick M, Michael K, et al. The Princeton shape benchmark[C]//Proc of the 6th Shape Modeling Applications. Piscataway, NJ: IEEE, 2004: 167−178
  • Related Articles

    [1]Wu Jingya, Lu Wenyan, Yan Guihai, Li Xiaowei. HyperTree: High Concurrent B+tree Index Accelerator[J]. Journal of Computer Research and Development, 2023, 60(7): 1661-1677. DOI: 10.7544/issn1000-1239.202111055
    [2]Yang Yongpeng, Jiang Dejun. A Method for Solving the wandering B+ tree Problem[J]. Journal of Computer Research and Development, 2023, 60(3): 539-554. DOI: 10.7544/issn1000-1239.202220555
    [3]Yan Wei, Zhang Xingjun, Ji Zeyu, Dong Xiaoshe, Ji Chenzhao. One-Direction Shift B+-Tree Based on Persistent Memory[J]. Journal of Computer Research and Development, 2021, 58(2): 371-383. DOI: 10.7544/issn1000-1239.2021.20200403
    [4]Te Rigen, Li Wei, and Li Xiongfei. Storage Model and Implementation of the Dynamic Ordered Tree[J]. Journal of Computer Research and Development, 2013, 50(5): 969-985.
    [5]Shen Yan, Song Shunlin, Zhu Yuquan. Mining Algorithm of Association Rules Based on Disk Table Resident FP-TREE[J]. Journal of Computer Research and Development, 2012, 49(6): 1313-1322.
    [6]Wang Hongqiang, Li Jianzhong, and Wang Hongzhi. Processing XPath over F&B-Index[J]. Journal of Computer Research and Development, 2010, 47(5): 866-877.
    [7]Zhou Da, Liang Zhichao, Meng Xiaofeng. HF-Tree: An Update-Efficient Index for Flash Memory[J]. Journal of Computer Research and Development, 2010, 47(5): 832-840.
    [8]Sun Xiaojuan, Sun Ninghui, Chen Mingyu. Optimization of B-NIDS for Multicore[J]. Journal of Computer Research and Development, 2007, 44(10): 1733-1740.
    [9]Ju Dapeng, Li Ming, Hu Jinfeng, Wang Dongsheng, Zheng Weimin, and Ma Yongquan. An Algorithm of B\++ Tree Management in P2P Environment[J]. Journal of Computer Research and Development, 2005, 42(8): 1438-1444.
    [10]Dong Daoguo, Liang Liuhong, and Xue Xiangyang. VAR-Tree—A New High-Dimensional Data Index Structure[J]. Journal of Computer Research and Development, 2005, 42(1): 10-17.
  • Cited by

    Periodical cited type(1)

    1. LUO Haoran,HU Shuisong,WANG Wenyong,TANG Yuke,ZHOU Junwei. Research on Multi-Core Processor Analysis for WCET Estimation. ZTE Communications. 2024(01): 87-94 .

    Other cited types(4)

Catalog

    Article views (131) PDF downloads (53) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return