ABSTRACT
The main focus of current information hidding algorithms is to improve the robustness and capacity of the algorithms but there are still certain drawbacks in invisibility. Therefore, an information hiding algorithm based on curvature radius of 3D models is proposed. The first step is to calculate the curvature of every triangle in each 3D model. Then, use a clustering algorithm to group the triangles based on their curvature radius. The second step is to calculate their mean curvature radius. Then, by changing the mean curvature of each group, embed the transformed and optimized secret information. Finally, the vertices of the chosen triangular patch are modified to lessen the influence of the secret information on the 3D model, thereby reducing the distortion of the marked model. The experimental results reveal that, in comparison with VLR and MPS algorithms, the algorithm has increased the mean SNR values by 4.31% and 8.57% respectively and improved invisibility. For robustness, the algorithm’s Corr value increased by 1.13% and 25.53%; 7.54 and 17.67%; 5.19% and 25.68%; 6.08% and 15.11%, when faced with 2% noise attack, 60% mesh simplification, 30% cutting, and 60% compression.
- Ashish Girdhar and Vijay Kumar. 2019. A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map. Journal of Ambient Intelligence and Humanized Computing (2019).Google Scholar
- Jing Liu, Yinghui Wang, Ye Li, Ruijiao Liu, and Jinlei Chen. 2017. A robust and blind 3D watermarking algorithm using multiresolution adaptive parameterization of surface. Neurocomputing 237, 24 (2017), 304–315.Google ScholarDigital Library
- Wanli Lv, Lulu Cheng, and Zhaoxia Yin. 2021. High Capacity Reversible Data Hiding in Encrypted 3D mesh models Based on multi-MSB Prediction. (2021).Google Scholar
- Nassima Medimegh, Samir Belaid, Mohamed Atri, and Naoufel Werghi. 2018. 3D mesh watermarking using salient points. Multimedia Tools and Applications 77, 24 (2018), 32287–32309.Google ScholarDigital Library
- Fei Peng, Tongxin Liao, and Min Long. 2022. A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation. IEEE Transactions on Circuits and Systems for Video Technology 32, 12 (2022), 8394–8408. https://doi.org/10.1109/TCSVT.2022.319254Google ScholarCross Ref
- Zillur Rahman, Md. Sabir Hossain, Mohd. Hasan, and Ahmed Imteaj. 2021. An enhanced method of initial cluster center selection for K-means algorithm. 2021 Innovations in Intelligent Systems and Applications Conference (ASYU) 77, 24 (2021), 1–6. https://api.semanticscholar.org/CorpusID:244406669Google ScholarCross Ref
- C Richard, Wilson, R Edwin, Hancock, Elzbieta, Pekalska, P W Robert, and Duin. 2014. Spherical and Hyperbolic Embeddings of Data.IEEE transactions on pattern analysis and machine intelligence (2014).Google Scholar
- Guoyou W. J. Zhang and J. Li. 2022. Zero-watermarking algorithm for three-dimensional mesh model based on vector length ratio. Computer Systems and Applications 31, 7 (2022), 165–171.Google Scholar
Index Terms
- An Information Hiding Algorithm of 3D Model Based on Curvature Radius
Recommendations
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Information hiding is a technique that embeds secret data in digital media for using in a variety of applications, including ownership protection, authentication, access control, annotation and so on. In this paper, we propose an information hiding ...
Information Hiding Algorithm Based on Spherical Segmentation of 3D Model
CSAE '20: Proceedings of the 4th International Conference on Computer Science and Application EngineeringFor the problem of poor robustness of geometric attack based on 3D model information hiding algorithm, an information hiding algorithm based on 3D model spherical segmentation is proposed. The algorithm firstly uses the principal component analysis, ...
A Research on Information Hiding Algorithm Based on Frequency Blocks of DCT Coefficients
AMME 2019: Proceedings of the 2019 Annual Meeting on Management EngineeringThere are two embedded methods of computer information hiding, the time-domain method and the frequency-domain method, and the time-domain method has a large amount of information hiding but poor robustness, while the frequency-domain method has a small ...
Comments