Skip to main content
Erschienen in: 3D Research 1/2016

01.03.2016 | 3DR Express

A Secret 3D Model Sharing Scheme with Reversible Data Hiding Based on Space Subdivision

verfasst von: Yuan-Yu Tsai

Erschienen in: 3D Research | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secret sharing is a highly relevant research field, and its application to 2D images has been thoroughly studied. However, secret sharing schemes have not kept pace with the advances of 3D models. With the rapid development of 3D multimedia techniques, extending the application of secret sharing schemes to 3D models has become necessary. In this study, an innovative secret 3D model sharing scheme for point geometries based on space subdivision is proposed. Each point in the secret point geometry is first encoded into a series of integer values that fall within [0, p − 1], where p is a predefined prime number. The share values are derived by substituting the specified integer values for all coefficients of the sharing polynomial. The surface reconstruction and the sampling concepts are then integrated to derive a cover model with sufficient model complexity for each participant. Finally, each participant has a separate 3D stego model with embedded share values. Experimental results show that the proposed technique supports reversible data hiding and the share values have higher levels of privacy and improved robustness. This technique is simple and has proven to be a feasible secret 3D model sharing scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bernardini, F., Mittleman, J., Rushmeier, H., Silva, C., & Taubin, G. (1999). The ball-pivoting algorithm for surface reconstruction. IEEE Transactions on Visualization and Computer Graphics, 5(4), 349–359.CrossRef Bernardini, F., Mittleman, J., Rushmeier, H., Silva, C., & Taubin, G. (1999). The ball-pivoting algorithm for surface reconstruction. IEEE Transactions on Visualization and Computer Graphics, 5(4), 349–359.CrossRef
2.
Zurück zum Zitat Blakley, G. R. (1979). Safeguarding cryptographic keys. In Proceedings of AFIPS National Computer Conference (pp. 313–317). Blakley, G. R. (1979). Safeguarding cryptographic keys. In Proceedings of AFIPS National Computer Conference (pp. 313–317).
3.
Zurück zum Zitat Chang, C. C., Hsieh, Y. P., & Lin, C. H. (2008). Sharing secrets in stego images with authentication. Pattern Recognition, 41(10), 3130–3137.CrossRefMATH Chang, C. C., Hsieh, Y. P., & Lin, C. H. (2008). Sharing secrets in stego images with authentication. Pattern Recognition, 41(10), 3130–3137.CrossRefMATH
4.
Zurück zum Zitat Chao, M. W., Lin, C. H., Yu, C. W., & Lee, T. Y. (2009). A high capacity 3D steganography algorithm. IEEE Transactions on Visualization and Computer Graphics, 15(2), 274–284.CrossRef Chao, M. W., Lin, C. H., Yu, C. W., & Lee, T. Y. (2009). A high capacity 3D steganography algorithm. IEEE Transactions on Visualization and Computer Graphics, 15(2), 274–284.CrossRef
5.
Zurück zum Zitat Chen, Y. C., Tsai, D. S., & Horng, G. (2013). Visual secret sharing with cheating prevention revisited. Digital Signal Processing, 23(5), 1496–1504.MathSciNetCrossRef Chen, Y. C., Tsai, D. S., & Horng, G. (2013). Visual secret sharing with cheating prevention revisited. Digital Signal Processing, 23(5), 1496–1504.MathSciNetCrossRef
6.
Zurück zum Zitat Chung, I. L., Chou, C. M., & Tseng, D. C. (2010). Multi-layer reversible data-hiding scheme on 3D mesh models. Journal of Internet Technology, 11(5), 609–618. Chung, I. L., Chou, C. M., & Tseng, D. C. (2010). Multi-layer reversible data-hiding scheme on 3D mesh models. Journal of Internet Technology, 11(5), 609–618.
7.
Zurück zum Zitat Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. (2008). Digital watermarking and steganography (2nd ed.). Burlington: Morgan Kaufmann. Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. (2008). Digital watermarking and steganography (2nd ed.). Burlington: Morgan Kaufmann.
8.
Zurück zum Zitat Elsheh, E., & Hamza, A. B. (2010a). Robust approaches to 3D object secret sharing. In Proceedings of 7th International Conference of Image Analysis and Recognition (pp. 326–335). Elsheh, E., & Hamza, A. B. (2010a). Robust approaches to 3D object secret sharing. In Proceedings of 7th International Conference of Image Analysis and Recognition (pp. 326–335).
9.
Zurück zum Zitat Elsheh, E., & Hamza, A. B. (2010b). Secret sharing of 3D models using blakely scheme. In Proceedings of 25th Biennial Symposium on Communications (pp. 92–95). Elsheh, E., & Hamza, A. B. (2010b). Secret sharing of 3D models using blakely scheme. In Proceedings of 25th Biennial Symposium on Communications (pp. 92–95).
10.
Zurück zum Zitat Elsheh, E., & Hamza, A. B. (2011). Secret sharing approaches for 3D object encryption. Expert Systems with Applications, 38(11), 13906–13911. Elsheh, E., & Hamza, A. B. (2011). Secret sharing approaches for 3D object encryption. Expert Systems with Applications, 38(11), 13906–13911.
11.
Zurück zum Zitat Hu, W. T., Li, M. C., Guo, C., & Ren, Y. Z. (2012). Reversible secret image sharing with steganography and dynamic embedding. Security and Communication Networks, 5(11), 1267–1276. Hu, W. T., Li, M. C., Guo, C., & Ren, Y. Z. (2012). Reversible secret image sharing with steganography and dynamic embedding. Security and Communication Networks, 5(11), 1267–1276.
12.
Zurück zum Zitat Hu, W. T., Li, M. C., Guo, C., & Yuan, L. F. (2015). A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction. Mathematical Problems in Engineering. 2015, Article: 849768, 1–11. Hu, W. T., Li, M. C., Guo, C., & Yuan, L. F. (2015). A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction. Mathematical Problems in Engineering. 2015, Article: 849768, 1–11.
13.
Zurück zum Zitat Huang, Y. H. & Tsai, Y. Y. (2015). A reversible data hiding scheme for 3D polygonal models based on histogram shifting with high embedding capacity. 3D Research, 6(20), Article: 20, 1–12. Huang, Y. H. & Tsai, Y. Y. (2015). A reversible data hiding scheme for 3D polygonal models based on histogram shifting with high embedding capacity. 3D Research, 6(20), Article: 20, 1–12.
14.
Zurück zum Zitat Li, M. T., Huang, N. C., & Wang, C. M. (2011). A novel high capacity 3D steganographic algorithm. International Journal of Innovative Computing, Information and Control, 7(3), 1055–1074.MathSciNet Li, M. T., Huang, N. C., & Wang, C. M. (2011). A novel high capacity 3D steganographic algorithm. International Journal of Innovative Computing, Information and Control, 7(3), 1055–1074.MathSciNet
15.
Zurück zum Zitat Lin, P. Y., Lee, J. S., & Chang, C. C. (2009). Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition, 42(5), 886–895.CrossRefMATH Lin, P. Y., Lee, J. S., & Chang, C. C. (2009). Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition, 42(5), 886–895.CrossRefMATH
16.
Zurück zum Zitat Lo, C. C., & Hu, Y. C. (2014). A novel reversible image authentication scheme for digital images. Signal Processing, 98, 174–185.CrossRef Lo, C. C., & Hu, Y. C. (2014). A novel reversible image authentication scheme for digital images. Signal Processing, 98, 174–185.CrossRef
17.
Zurück zum Zitat Lu, T. C., Tseng, C. Y., & Deng, K. M. (2014). Reversible data hiding using local edge sensing prediction methods and adaptive thresholds. Signal Processing, 104, 152–166.CrossRef Lu, T. C., Tseng, C. Y., & Deng, K. M. (2014). Reversible data hiding using local edge sensing prediction methods and adaptive thresholds. Signal Processing, 104, 152–166.CrossRef
18.
Zurück zum Zitat Martín del Rey, Á. (2015). A multi-secret sharing scheme for 3D solid objects. Expert Systems with Applications, 42(4), 2114–2120.CrossRef Martín del Rey, Á. (2015). A multi-secret sharing scheme for 3D solid objects. Expert Systems with Applications, 42(4), 2114–2120.CrossRef
19.
21.
Zurück zum Zitat Thien, C. C., & Lin, J. C. (2002). Secret image sharing. Computer and Graphics, 26(5), 765–770.CrossRef Thien, C. C., & Lin, J. C. (2002). Secret image sharing. Computer and Graphics, 26(5), 765–770.CrossRef
23.
Zurück zum Zitat Turk, G. (1990). Generating random points in triangles. In A. Glassner (Ed.), Graphics Gems (pp. 24–28). San Diego: Academic Press Inc.CrossRef Turk, G. (1990). Generating random points in triangles. In A. Glassner (Ed.), Graphics Gems (pp. 24–28). San Diego: Academic Press Inc.CrossRef
24.
Zurück zum Zitat Ulutas, M., Ulutas, G., & Nabiyev, V. V. (2013). Invertible secret image sharing for gray level and dithered cover images. Journal of Systems and Software, 86(2), 485–500.CrossRef Ulutas, M., Ulutas, G., & Nabiyev, V. V. (2013). Invertible secret image sharing for gray level and dithered cover images. Journal of Systems and Software, 86(2), 485–500.CrossRef
25.
Zurück zum Zitat Wang, R. Z., & Su, C. H. (2006). Secret image sharing with smaller shadow images. Pattern Recognition Letters, 27(6), 551–555.CrossRef Wang, R. Z., & Su, C. H. (2006). Secret image sharing with smaller shadow images. Pattern Recognition Letters, 27(6), 551–555.CrossRef
26.
Zurück zum Zitat Wang, P. C., & Wang, C. M. (2007). Reversible data hiding for point-sampled geometry. Journal of Information Science and Engineering, 23(6), 1865–1887.MathSciNet Wang, P. C., & Wang, C. M. (2007). Reversible data hiding for point-sampled geometry. Journal of Information Science and Engineering, 23(6), 1865–1887.MathSciNet
27.
Zurück zum Zitat Wu, Y. S., Thien, C. C., & Lin, J. C. (2004). Sharing and hiding secret images with size constraint. Pattern Recognition, 37(7), 1377–1385.CrossRef Wu, Y. S., Thien, C. C., & Lin, J. C. (2004). Sharing and hiding secret images with size constraint. Pattern Recognition, 37(7), 1377–1385.CrossRef
28.
Zurück zum Zitat Zhao, D., Peng, H., Wang, C., & Yang, Y. (2012). A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Computers & Mathematics with Applications, 64(4), 611–615.MathSciNetCrossRefMATH Zhao, D., Peng, H., Wang, C., & Yang, Y. (2012). A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Computers & Mathematics with Applications, 64(4), 611–615.MathSciNetCrossRefMATH
Metadaten
Titel
A Secret 3D Model Sharing Scheme with Reversible Data Hiding Based on Space Subdivision
verfasst von
Yuan-Yu Tsai
Publikationsdatum
01.03.2016
Verlag
3D Display Research Center
Erschienen in
3D Research / Ausgabe 1/2016
Elektronische ISSN: 2092-6731
DOI
https://doi.org/10.1007/s13319-015-0078-z

Weitere Artikel der Ausgabe 1/2016

3D Research 1/2016 Zur Ausgabe