Citation: | Lü Wanli, Tang Yun, Yin Zhaoxia, Luo Bin. Reversible Data Hiding for 3D Mesh Model in Encrypted Domain Based on Vertex Partition and Coordinate Standardization[J]. Journal of Computer Research and Development, 2024, 61(6): 1536-1544. DOI: 10.7544/issn1000-1239.202221040 |
Reversible data hiding in encrypted domain enables the secure and confidential embedding of additional information in encrypted multimedia, ensuring the privacy and integrity of both the carrier and the embedded data during transmission. The authorized recipients can extract the data without any loss and recover the media successfully. In the realm of digital media, 3D mesh models, being a relatively nascent form, possesses a distinctive file structure markedly different from that of conventional image media. Consequently, limited research has been conducted in this domain. Augmenting the embedding capacity of 3D mesh models in the encrypted domain poses an enduring challenge. The direct application of multiple most significant bit prediction algorithm from the image domain to 3D mesh models is impeded by disparities in data storage formats, thus encumbering the predictive performance of algorithms. To effectively tackle this issue, we propose the adoption of coordinate standardization to eliminate the influence of the sign bit and ameliorate the prediction algorithm’s overall performance. In order to further mitigate the inclusion of redundant auxiliary information, we introduce the integration of the selection of embedding set vertices into our experiments, which effectively generates additional payload space. The experimental results affirm that our purposed methodology attains the maximum embedding capacity while guaranteeing lossless and separable recovery of both the model and the embedded information, surpassing the capabilities of existing techniques.
[1] |
张新鹏,殷赵霞. 多媒体信息隐藏技术[J]. 自然杂志,2017,39(2):87−95
Zhang Xinpeng, Yin Zhaoxia. Data hiding in multimedia[J]. Chinese Journal of Nature, 2017, 39(2): 87−95 (in Chinese)
|
[2] |
周航,陈可江,张卫明,等. 3D网格隐写与隐写分析回顾与展望[J]. 中国图象图形学报,2022,27(1):150−162
Zhou Hang, Chen Kejiang, Zhang Weiming, et al. 3D mesh steganography and steganalysis: Review and prospect[J]. Journal of Image and Graphics, 2022, 27(1): 150−162 (in Chinese)
|
[3] |
陈君夫,付章杰,张卫明,等. 基于深度学习的图像隐写分析综述[J]. 软件学报,2021,32(2):551−578
Chen Junfu, Fu Zhangjie, Zhang Weiming, et a1. Review of image steganalysis based on deep learning[J]. Journal of Software, 2021, 32(2): 551−578 (in Chinese)
|
[4] |
苏文桂,沈玉龙,王祥. 双层差值扩展可逆数字水印算法[J]. 计算机研究与发展,2019,56(7):1498−1505
Su Wengui, Shen Yulong, Wang Xiang. Two-layer reversible watermarking algorithm using difference expansion[J]. Journal of Computer Research and Developmen, 2019, 56(7): 1498−1505 (in Chinese)
|
[5] |
巩道福,刘粉林,罗向阳. 一种变容量的自嵌入图像易碎水印算法[J]. 计算机研究与发展,2014,5l(11):2505−2512
Gong Daofu, Liu Fenlin, Luo Xiangyang. A variable payload self embedding fragile watermarking algorithm for image[J]. Journal of Computer Research and Development, 2014, 5l(11): 2505−2512 (in Chinese)
|
[6] |
Shi Yunqing, Li Xiaolong, Zhang Xinpeng, et al. Reversible data hiding: advances in the past two decades[J]. IEEE Access, 2016, 4: 3210−3237 doi: 10.1109/ACCESS.2016.2573308
|
[7] |
欧博,殷赵霞,项世军. 明文图像可逆信息隐藏综述[J]. 中国图象图形学报,2022,27(1):111−124
Ou Bo, Yin Zhaoxia, Xiang Shijun. Overview of reversible data hiding in plaintext image[J]. Journal of Image and Graphics, 2022, 27(1): 111−124 (in Chinese)
|
[8] |
罗雅婷,和红杰,陈帆,等. 基于非0比特个数特征的冗余转移图像加密安全性分析[J]. 计算机研究与发展,2022,59(11):2606−2617
Luo Yating, He Hongjie, Chen Fan, et al. Security analysis of image encryption for redundant transfer based on non-zero-bit number feature[J]. Journal of Computer Research and Development, 2022, 59(11): 2606−2617 (in Chinese)
|
[9] |
佘晓萌,杜洋,马文静,等. 基于像素预测和块标记的图像密文可逆信息隐藏[J]. 计算机研究与发展,2022,59(9):2089−2100
She Xiaomeng, Du Yang, Ma Wenjing, et al. Reversible data hiding in encrypted images based on pixel prediction and block labeling[J]. Journal of Computer Research and Development, 2022, 59(9): 2089−2100 (in Chinese)
|
[10] |
杨尧林,和红杰,陈帆,等. 基于预测误差自适应编码的图像加密可逆数据隐藏[J]. 计算机研究与发展,2021,58(6):1340−1350
Yang Yaolin, He Hongjie, Chen Fan, et al. Reversible data hiding of image encryption based on prediction error adaptive coding[J]. Journal of Computer Research and Development, 2021, 58(6): 1340−1350 (in Chinese)
|
[11] |
吴友情,马文静,殷赵霞,等. 基于预测误差位平面压缩的密文图像可逆信息隐藏[J]. 通信学报,2022,43(8):219−230
Wu Youqing, Ma Wenjing, Yin Zhaoxia, et al. Reversible data hiding in encrypted images based on bit-plane com-pression of prediction error[J]. Journal on Communications, 2022, 43(8): 219−230 (in Chinese)
|
[12] |
Puteaux P, Ong S, Wong K, et a1. A survey of reversible data hiding in encrypted images the first 12 years[J]. Journal of Visual Communication and image Representation, 2021, 77: 103085 doi: 10.1016/j.jvcir.2021.103085
|
[13] |
Pucci J U, Christophe B R, Sisti J A, et al. Three-dimensional printing: Technologies, applications, and limitations in neurosurgery[J]. Biotechnology Advances, 2017, 35(5): 521−529 doi: 10.1016/j.biotechadv.2017.05.007
|
[14] |
Ni Jiahua, Ling Haonan, Zhang Shiming, et al. Three-dimensional printing of metals for biomedical applications[J]. Materials Today Bio, 2019, 3: 100024 doi: 10.1016/j.mtbio.2019.100024
|
[15] |
Yu Mingji, Yao Heng, Qin Chuan, et al. A comprehensive analysis method for reversible data hiding in stream-cipher-encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(10): 7241−7254 doi: 10.1109/TCSVT.2022.3172226
|
[16] |
Jiang Ruiqi, Zhou Hang, Yu Nenghai. Reversible data hiding in encrypted three-dimensional mesh models[J]. IEEE Transactions on Multimedia, 2017, 20(1): 55−67
|
[17] |
Xu Na, Tang Jin, Luo Bin, et al. Separable reversible data hiding based on integer mapping and MSB prediction for encrypted 3D mesh models[J]. Cognitive Computation, 2022, 14(3): 1172−1181 doi: 10.1007/s12559-021-09919-5
|
[18] |
Yin Zhaoxia, Xu Na, Wang Feng, et al. Separable reversible data hiding based on integer mapping and multi-MSB prediction for encrypted 3D mesh models[C]//Proc of the 4th Chinese Conf on Pattern Recognition and Computer Vision. Berlin: Springer, 2021: 336–348
|
[19] |
Lv Wanli. Cheng Lulu, Yin Zhaoxia. High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction[J]. Signal Processing, 2022, 201: 108686 doi: 10.1016/j.sigpro.2022.108686
|
[20] |
Tang Yun, Cheng Lulu, Lv Wanli, et al. High capacity reversible data hiding for encrypted 3D mesh models based on topology[C]//Proc of the 21st Int Workshop on Digital Watermarking. Berlin: Springer, 2022: 205−218
|
[21] |
Shah M, Zhang Weiming, Hu Honggang, et al. Homomorphic encryption-based reversible data hiding for 3D mesh models[J]. Arabian Journal for Science and Engineering, 2018, 43(12): 8145−8157 doi: 10.1007/s13369-018-3354-4
|
[22] |
Jansen van Rensburg B, Pauline P, Puech W, et al. Homomorphic two tier reversible data hiding in encrypted 3D objects[C]//Proc of the 28th IEEE Int Conf on Image Processing. Piscataway, NJ: IEEE, 2021: 3068−3072
|
[23] |
Tsai Y. Separable reversible data hiding for encrypted three-dimensional models based on spatial subdivision and space encoding[J]. IEEE Transactions on Multimedia, 2020, 23: 2286−2296
|
[24] |
Modigari N, Valarmathi M, Jani A. Watermarking techniques for three-dimensional (3D) mesh models: A survey[J]. Multimedia Systems, 2022, 28(2): 623−641 doi: 10.1007/s00530-021-00860-z
|
[25] |
Deering M. Geometry compression[C]//Proc of the 22nd Annual Conf on Computer Graphics and Interactive Techniques. New York: ACM, 1995: 13−20
|
[26] |
Yin Zhaoxia, Xiang Youzhi, Zhang Xinpeng. Reversible data hiding in encrypted images based on muhi MSB prediction and Huffman coding[J]. IEEE Transactions on Muhimedia, 2020, 22(4): 874−884
|
[27] |
Philip S, Patrick M, Michael K, et al. The Princeton shape benchmark[C]//Proc of the 6th Shape Modeling Applications. Piscataway, NJ: IEEE, 2004: 167−178
|
[1] | Wu Jingya, Lu Wenyan, Yan Guihai, Li Xiaowei. HyperTree: High Concurrent B+tree Index Accelerator[J]. Journal of Computer Research and Development, 2023, 60(7): 1661-1677. DOI: 10.7544/issn1000-1239.202111055 |
[2] | Yang Yongpeng, Jiang Dejun. A Method for Solving the wandering B+ tree Problem[J]. Journal of Computer Research and Development, 2023, 60(3): 539-554. DOI: 10.7544/issn1000-1239.202220555 |
[3] | Yan Wei, Zhang Xingjun, Ji Zeyu, Dong Xiaoshe, Ji Chenzhao. One-Direction Shift B+-Tree Based on Persistent Memory[J]. Journal of Computer Research and Development, 2021, 58(2): 371-383. DOI: 10.7544/issn1000-1239.2021.20200403 |
[4] | Te Rigen, Li Wei, and Li Xiongfei. Storage Model and Implementation of the Dynamic Ordered Tree[J]. Journal of Computer Research and Development, 2013, 50(5): 969-985. |
[5] | Shen Yan, Song Shunlin, Zhu Yuquan. Mining Algorithm of Association Rules Based on Disk Table Resident FP-TREE[J]. Journal of Computer Research and Development, 2012, 49(6): 1313-1322. |
[6] | Wang Hongqiang, Li Jianzhong, and Wang Hongzhi. Processing XPath over F&B-Index[J]. Journal of Computer Research and Development, 2010, 47(5): 866-877. |
[7] | Zhou Da, Liang Zhichao, Meng Xiaofeng. HF-Tree: An Update-Efficient Index for Flash Memory[J]. Journal of Computer Research and Development, 2010, 47(5): 832-840. |
[8] | Sun Xiaojuan, Sun Ninghui, Chen Mingyu. Optimization of B-NIDS for Multicore[J]. Journal of Computer Research and Development, 2007, 44(10): 1733-1740. |
[9] | Ju Dapeng, Li Ming, Hu Jinfeng, Wang Dongsheng, Zheng Weimin, and Ma Yongquan. An Algorithm of B\++ Tree Management in P2P Environment[J]. Journal of Computer Research and Development, 2005, 42(8): 1438-1444. |
[10] | Dong Daoguo, Liang Liuhong, and Xue Xiangyang. VAR-Tree—A New High-Dimensional Data Index Structure[J]. Journal of Computer Research and Development, 2005, 42(1): 10-17. |
1. |
LUO Haoran,HU Shuisong,WANG Wenyong,TANG Yuke,ZHOU Junwei. Research on Multi-Core Processor Analysis for WCET Estimation. ZTE Communications. 2024(01): 87-94 .
![]() |