Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3565387.3565456acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

Research on Information Hiding Algorithm Based on Local Fusion of 3D Model

Published: 13 December 2022 Publication History

Abstract

Aiming at the problem that the single-carrier 3D model has a weak ability to resist heterogeneous compression attacks, an information hiding algorithm based on the local feature fusion of the multi-carrier 3D model is proposed. First, the PCA (principal components analysis) regression method was used to estimate the normal carrier of the surface curvature, and the feature points of the vector set of 3D model were extracted from the surface curvature; Secondly, the carrier set was prefused with spindle correction, and then the distance threshold between feature points was set by ICP (Iterative Closest Point) nearest point iterative algorithm. After the fusion state of the carrier was obtained, the local fusion block was extracted by difference calculation with the original carrier; Thirdly, Arnold is used to scramble the secret information to get the binary sequence with the optimal matching degree with the carrier; Finally, meshed local fusion blocks, whose structural complexity is defined by the perimeter of the grid, embed binary sequences into vertices with high structural complexity. The algorithm hides the binary sequences with optimal matching degree with the carrier in the vertices with high structural complexity in the local fusion block, the invisibility and robustness of the algorithm are improved greatly. It can be seen from the experimental results that the proposed algorithm has high resistance to non-uniform compression and other attacks, indicating that its invisibility and robustness are high.

References

[1]
Li L, Wang S, Luo T, Reversible Data Hiding for Encrypted 3D Model Based on Prediction Error Expansion[J]. Journal of Sensors, 2020: 1–14.
[2]
Zhou H, Chen K, Zhang W, Distortion Design for Secure Adaptive 3-D Mesh Steganography[J]. IEEE Transactions on Multimedia, 2019, 21(6): 1384–1398.
[3]
Medimegh N, Belaid S, Atri M, 3D mesh watermarking using salient points[J]. Multimedia Tools and Applications, Dordrecht: Springer, 2018, 77(24): 32287–32309.
[4]
Girdhar A, Kumar V. A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(12): 4947–4961.
[5]
Shah M, Zhang W, Hu H, Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models[J]. Arabian Journal for Science and Engineering, Heidelberg: Springer Heidelberg, 2018, 43(12): 8145–8157.
[6]
Ren S, Wang Z, Su D X, Information hiding algorithm based on mapping and structure data of 3D model [J]. Journal on Communications, 2019, 40(05): 211–222.
[7]
Wu P, Li W, Yan M. 3D scene reconstruction based on improved ICP algorithm[J]. Microprocessors and Microsystems, Amsterdam: Elsevier, 2020, 75: 103064.
[8]
Huang J Y, Zou Q F. A Reversible Information Hiding Method for Encrypted Image Based on Arnold Scrambling [J]. modern computer,2019(12):68-72.
[9]
Ren S, Zhang T, Yang T, Information hiding algorithm based on spherical segmentation of 3D model [J]. Journal of Computer Applications, 2017, 37(09): 2576–2580.
[10]
Ren S, Su D X, Xu Z C, Three-dimensional model information hiding algorithm based on distance feature and volume integral invariant [J]. Journal of Cyber Security, 2020, 5(05): 110–120.
[11]
Wang Y, Zheng J, Wang H. Fast Mesh Simplification Method for Three-Dimensional Geometric Models with Feature-Preserving Efficiency[J]. Scientific Programming, London: Hindawi Ltd, 2019, 2019: 4926190.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSAE '22: Proceedings of the 6th International Conference on Computer Science and Application Engineering
October 2022
411 pages
ISBN:9781450396004
DOI:10.1145/3565387
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 December 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Grid perimeter
  2. ICP iterative algorithm
  3. Information hiding
  4. Multi-carrier 3D model
  5. Multi-carrier local fusion state
  6. Structure complexity
  7. Surface curvature

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • The National Natural Science Foundation of China
  • The Fundamental Research Funds for the Central Universities, CHD

Conference

CSAE 2022

Acceptance Rates

Overall Acceptance Rate 368 of 770 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 33
    Total Downloads
  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media