Abstract
For over a decade, 3D objects are an increasingly popular form of media. It has become necessary and urgent to secure them during their transmission or archiving. In this article, we propose a new method to obtain a watermarked 3D object from high-capacity data hiding in the encrypted domain. Based on the homomorphic properties of the Paillier cryptosystem, our proposed method allows us to embed several secret messages in the encrypted domain with a high-capacity. These messages can be extracted in the plain-text domain after the 3D object decryption. To the best of our knowledge, we are the first to propose a data hiding method in the encrypted domain where the high-capacity watermark is conserved in the plain-text domain after the 3D object is decrypted. The encryption and the data hiding in the encrypted domain are format compliant and without size expansion, despite the use of the Paillier cryptosystem. Each time a new message is embedded in the encrypted domain, flags are added in order to indicate which blocks are still available for the embedding of additional messages. After the decryption of a watermarked encrypted 3D object, our method produces a watermarked 3D object which is visually very similar to the original 3D object. From the decrypted watermarked 3D object, we can then extract all the embedded messages directly in the plain-text domain, without the need for an auxiliary file. Moreover, large keys are used, rending our method secure for real-life applications.
- [1] . 2013. Group homomorphic encryption: Characterizations, impossibility results, and applications. Designs, Codes and Cryptography 67, 2 (2013), 209–232.Google ScholarDigital Library
- [2] . 2019. Format-compliant selective secret 3-D object sharing scheme. IEEE Transactions on Multimedia 21, 9 (2019), 2171–2183.Google ScholarCross Ref
- [3] . 2018. From visual confidentiality to transparent format-compliant selective encryption of 3D objects. In Proceedings of the 2018 IEEE International Conference on Multimedia & Expo Workshops.
IEEE , 1–6.Google ScholarCross Ref - [4] . 2016. High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Transactions on Cybernetics 46, 5 (2016), 1132–1143.Google ScholarCross Ref
- [5] . 2003. Data hiding on 3-D triangle meshes. IEEE Transactions on Signal Processing 51, 4 (2003), 939–949.Google ScholarDigital Library
- [6] . 2014. Encrypted signal-based reversible data hiding with public key cryptosystem. Journal of Visual Communication and Image Representation 25, 5 (2014), 1164–1170.Google ScholarCross Ref
- [7] . 2007. Digital Watermarking and Steganography (2nd ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA.Google ScholarDigital Library
- [8] . 2015. Perceptual quality assessment for 3D triangle mesh based on curvature. IEEE Transactions on Multimedia 17, 12 (2015), 2174–2184.Google ScholarDigital Library
- [9] . 2009. High capacity, reversible data hiding in medical images. In Proceedings of the 2009 16th IEEE International Conference on Image Processing. 4241–4244.Google ScholarCross Ref
- [10] . 2012. An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters 19, 4 (2012), 199–202.Google ScholarCross Ref
- [11] . 2017. Saliency detection for 3D surface geometry using semi-regular meshes. IEEE Transactions on Multimedia 19, 12 (2017), 2692–2705.Google ScholarCross Ref
- [12] . 2018. Reversible data hiding in encrypted three-dimensional mesh models. IEEE Transactions on Multimedia 20, 1 (2018), 55–67.Google ScholarDigital Library
- [13] . 2013. High capacity reversible data hiding based on histogram shifting for medical images. In Proceedings of the 2013 International Conference on Communication and Signal Processing. 730–733.Google ScholarCross Ref
- [14] . 2010. A comparison of perceptually-based metrics for objective evaluation of geometry processing. IEEE Transactions on Multimedia 12, 7 (2010), 636–649.Google ScholarDigital Library
- [15] . 2022. High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Signal Processing 201 (2022), 108686.Google ScholarDigital Library
- [16] . 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8, 3 (2013), 553–562.Google ScholarDigital Library
- [17] . 2019. Reversible data hiding in homomorphically encrypted image using interpolation technique. Journal of Information Security and Applications 48 (2019), 102374.Google ScholarCross Ref
- [18] . 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques.
Springer , 223–238.Google ScholarCross Ref - [19] . 2008. A reversible data hiding method for encrypted images. Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 68191E (18 March 2008).Google Scholar
- [20] . 2018. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security 13, 7 (2018), 1670–1681.Google ScholarCross Ref
- [21] . 2021. A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Transactions on Multimedia 23 (2020), 636–650.Google ScholarCross Ref
- [22] . 2020. Homomorphic encryption-based LSB substitution for high capacity data hiding in the encrypted domain. IEEE Access 8 (2020), 108655–108663.Google ScholarCross Ref
- [23] . 2020. Reversible data hiding in encrypted images with dual data embedding. IEEE Access 8 (2020), 23209–23220.Google ScholarCross Ref
- [24] . 2009. On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM 56, 6 (2009), 1–40.Google ScholarDigital Library
- [25] . 2021. Homomorphic two tier reversible data hiding in encrypted 3D objects. In Proceedings of the 2021 IEEE International Conference on Image Processing. IEEE, 3068–3072.Google ScholarCross Ref
- [26] . 2018. Homomorphic encryption-based reversible data hiding for 3D mesh models. Arabian Journal for Science and Engineering 43, 12 (2018), 8145–8157.Google ScholarCross Ref
- [27] . 2004. The Princeton shape benchmark. In Proceedings Shape Modeling Applications.
IEEE , 167–178.Google ScholarCross Ref - [28] . 2015. Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Processing: Image Communication 39, PA (2015), 226–233.Google ScholarDigital Library
- [29] . 2008. A comprehensive survey on three-dimensional mesh watermarking. IEEE Transactions on Multimedia 10, 8 (2008), 1513–1527.Google ScholarDigital Library
- [30] . 2016. Reversible data hiding in paillier cryptosystem. Journal of Visual Communication and Image Representation 40, PB (2016), 765–771.Google ScholarDigital Library
- [31] . 2019. A high-capacity reversible data hiding method for homomorphic encrypted images. Journal of Visual Communication and Image Representation 62, C (2019), 87–96.Google ScholarDigital Library
- [32] . 2018. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Transactions on Circuits and Systems for Video Technology 28, 11 (2018), 3099–3110.Google ScholarDigital Library
- [33] . 2022. Separable reversible data hiding based on integer mapping and MSB prediction for encrypted 3D mesh models. Cognitive Computation 14, 3 (2022), 1172–1181.Google ScholarCross Ref
- [34] . 2021. Separable reversible data hiding based on integer mapping and multi-MSB prediction for encrypted 3D mesh models. Pattern Recognition and Computer Visio (PRCV’21). Lecture Notes in Computer Science, Vol. 13020,
Springer , Cham.Google ScholarDigital Library - [35] . 2012. Reversible data hiding with optimal value transfer. IEEE Transactions on Multimedia 15, 2 (2012), 316–325.Google ScholarDigital Library
- [36] . 2015. Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26, 9 (2015), 1622–1631.Google ScholarDigital Library
- [37] . 2019. Lossless data hiding based on homomorphic cryptosystem. IEEE Transactions on Dependable and Secure Computing 18, 2 (2019), 692–705.Google ScholarDigital Library
- [38] . 2015. Secure reversible image data hiding over encrypted domain via key modulation. IEEE Transactions on Circuits and Systems for Video Technology 26, 3 (2015), 441–452.Google ScholarDigital Library
- [39] . 2020. Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU. IEEE Access 8 (2020), 81412–81424.Google ScholarCross Ref
Index Terms
- 3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain
Recommendations
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
In most watermarking schemes for copyright protection, a seller usually embeds a watermark in multimedia content to identify a buyer. When an unauthorized copy is found by the seller, the traitor's identity can be traced by the embedded watermark. ...
Secure watermarking scheme against watermark attacks in the encrypted domain
We have proposed a robust watermarking scheme in the encrypted domain.For traditional schemes, original media could be exposed to the embedder.The robustness of watermark in the encrypted domain should be taken into account.We investigate the watermark ...
A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing
Reversible information hiding plays an important roles in the field of privacy protection. In this paper, a new reversible information hiding scheme is proposed which supports the direct operation in homomorphic encrypted domain. The proposed "Joint ...
Comments