Abstract
Inspired by the successful application of image secret sharing schemes in multimedia protection, we present in this paper two secret sharing approaches for 3D models using Blakely and Thien & Lin schemes. We show that encoding 3D models using lossless data compression algorithms prior to secret sharing helps reduce share sizes and remove redundancies and patterns that possibly ease cryptanalysis. The proposed approaches provide a higher tolerance against data corruption/loss than existing 3D protection mechanisms, such as encryption. Experimental results are provided to demonstrate the secrecy and safety of the proposed schemes. The feasibility of the proposed algorithms is demonstrated on various 3D models.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cheng, H., Xiaobo, L.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000)
Bourbakis, N., Dollas, A.: Scan-based compression-encryption hiding for video on demand. IEEE Multimedia Mag. 10, 79–87 (2003)
Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey. Proc. IEEE 87(7), 1062–1078 (1999)
Shamir, A.: How to share a secret. ACM Comm. 22(11), 612–613 (1979)
Blakley, G.R.: Safeguarding cryptography keys. In: Proc. of the AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317 (1979)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Chen, Y., Chan, Y., Huang, C., Tsai, M., Chu, Y.: A multiple-level visual secretsharing scheme without image size expansion. Inform. Sciences 177, 4696–4710 (2007)
Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374, 261–276 (2007)
Lin, S., Lin, J.: VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40, 3652–3666 (2007)
Shyu, S.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39, 866–880 (2006)
Tsai, D., Chen, T., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn. 40, 2356–2366 (2007)
Chang, C., Hwang, R.: Sharing secret images using shadow codebooks. Inform. Sciences 111, 335–345 (1998)
Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recognition Letters 27(6), 551–555 (2006)
Thien, C.C., Lin, J.C.: Secret image sharing. Computers and Graphics 26(1), 765–770 (2002)
Wu, Y., Thien, L., Lin, J.: Sharing and hiding secret images with size constraint. Pattern Recogn. 37, 1377–1385 (2004)
Feng, J., Wu, H., Tsai, C., Chu, Y.: A new multi-secret image sharing scheme using Lagrange’s interpolation. Journal Syst. Software 76, 327–329 (2005)
Noar, N., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Storer, J.A.: Data Compression: Methods and Theory. Computer Science Press, Rockville (1988)
ZLIB Specification, http://www.zlib.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Elsheh, E., Hamza, A.B. (2010). Robust Approaches to 3D Object Secret Sharing. In: Campilho, A., Kamel, M. (eds) Image Analysis and Recognition. ICIAR 2010. Lecture Notes in Computer Science, vol 6111. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13772-3_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-13772-3_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13771-6
Online ISBN: 978-3-642-13772-3
eBook Packages: Computer ScienceComputer Science (R0)