skip to main content
research-article

3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain

Published:07 June 2023Publication History
Skip Abstract Section

Abstract

For over a decade, 3D objects are an increasingly popular form of media. It has become necessary and urgent to secure them during their transmission or archiving. In this article, we propose a new method to obtain a watermarked 3D object from high-capacity data hiding in the encrypted domain. Based on the homomorphic properties of the Paillier cryptosystem, our proposed method allows us to embed several secret messages in the encrypted domain with a high-capacity. These messages can be extracted in the plain-text domain after the 3D object decryption. To the best of our knowledge, we are the first to propose a data hiding method in the encrypted domain where the high-capacity watermark is conserved in the plain-text domain after the 3D object is decrypted. The encryption and the data hiding in the encrypted domain are format compliant and without size expansion, despite the use of the Paillier cryptosystem. Each time a new message is embedded in the encrypted domain, flags are added in order to indicate which blocks are still available for the embedding of additional messages. After the decryption of a watermarked encrypted 3D object, our method produces a watermarked 3D object which is visually very similar to the original 3D object. From the decrypted watermarked 3D object, we can then extract all the embedded messages directly in the plain-text domain, without the need for an auxiliary file. Moreover, large keys are used, rending our method secure for real-life applications.

REFERENCES

  1. [1] Armknecht F., Katzenbeisser S., and Peter A.. 2013. Group homomorphic encryption: Characterizations, impossibility results, and applications. Designs, Codes and Cryptography 67, 2 (2013), 209232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Beugnon S., Puech W., and Pedeboy J.. 2019. Format-compliant selective secret 3-D object sharing scheme. IEEE Transactions on Multimedia 21, 9 (2019), 21712183.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Beugnon S., Puech W., and Pedeboy J.-P.. 2018. From visual confidentiality to transparent format-compliant selective encryption of 3D objects. In Proceedings of the 2018 IEEE International Conference on Multimedia & Expo Workshops. IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Cao X., Du L., Wei X., Meng D., and Guo X.. 2016. High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Transactions on Cybernetics 46, 5 (2016), 11321143.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Cayre F. and Macq B.. 2003. Data hiding on 3-D triangle meshes. IEEE Transactions on Signal Processing 51, 4 (2003), 939949.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Chen Y.-C., Shiu C.-W., and Horng G.. 2014. Encrypted signal-based reversible data hiding with public key cryptosystem. Journal of Visual Communication and Image Representation 25, 5 (2014), 11641170.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Cox I., Miller M., Bloom J., Fridrich J., and Kalker T.. 2007. Digital Watermarking and Steganography (2nd ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Dong L., Fang Y., Lin W., and Seah H. S.. 2015. Perceptual quality assessment for 3D triangle mesh based on curvature. IEEE Transactions on Multimedia 17, 12 (2015), 21742184.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Fallahpour M., Megias D., and Ghanbari M.. 2009. High capacity, reversible data hiding in medical images. In Proceedings of the 2009 16th IEEE International Conference on Image Processing. 42414244.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Hong W., Chen T., and Wu H.-Y.. 2012. An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters 19, 4 (2012), 199202.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Jeong S. and Sim J.. 2017. Saliency detection for 3D surface geometry using semi-regular meshes. IEEE Transactions on Multimedia 19, 12 (2017), 26922705.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Jiang R., Zhou H., Zhang W., and Yu N.. 2018. Reversible data hiding in encrypted three-dimensional mesh models. IEEE Transactions on Multimedia 20, 1 (2018), 5567.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Kumar C. Vinoth, Natarajan V., and Bhogadi Deepika. 2013. High capacity reversible data hiding based on histogram shifting for medical images. In Proceedings of the 2013 International Conference on Communication and Signal Processing. 730733.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Lavoué G. and Corsini M.. 2010. A comparison of perceptually-based metrics for objective evaluation of geometry processing. IEEE Transactions on Multimedia 12, 7 (2010), 636649.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Lyu W.-L., Cheng L., and Yin Z.. 2022. High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Signal Processing 201 (2022), 108686.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Ma K., Zhang W., Zhao X., Yu N., and Li F.. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8, 3 (2013), 553562.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Malik A., Wang H., Chen T., Yang T., Khan A. N., Wu H., Chen Y., and Hu Y.. 2019. Reversible data hiding in homomorphically encrypted image using interpolation technique. Journal of Information Security and Applications 48 (2019), 102374.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Paillier P.. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 223238.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Puech W., Chaumont M., and Strauss O.. 2008. A reversible data hiding method for encrypted images. Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 68191E (18 March 2008).Google ScholarGoogle Scholar
  20. [20] Puteaux P. and Puech W.. 2018. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security 13, 7 (2018), 16701681.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Puteaux P. and Puech W.. 2021. A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Transactions on Multimedia 23 (2020), 636650.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Puteaux P., Vialle M., and Puech W.. 2020. Homomorphic encryption-based LSB substitution for high capacity data hiding in the encrypted domain. IEEE Access 8 (2020), 108655108663.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Qiu Y., Ying Q., Lin X., Zhang Y., and Qian Z.. 2020. Reversible data hiding in encrypted images with dual data embedding. IEEE Access 8 (2020), 2320923220.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Regev O.. 2009. On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM 56, 6 (2009), 140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Rensburg B. Jansen Van, Puteaux P., Puech W., and Pedeboy J.-P.. 2021. Homomorphic two tier reversible data hiding in encrypted 3D objects. In Proceedings of the 2021 IEEE International Conference on Image Processing. IEEE, 30683072.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Shah M., Zhang W., Hu H., Zhou H., and Mahmood T.. 2018. Homomorphic encryption-based reversible data hiding for 3D mesh models. Arabian Journal for Science and Engineering 43, 12 (2018), 81458157.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Shilane P., Min P., Kazhdan M., and Funkhouser T.. 2004. The Princeton shape benchmark. In Proceedings Shape Modeling Applications. IEEE, 167178.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Shiu C.-W., Chen Y.-C., and Hong W.. 2015. Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Processing: Image Communication 39, PA (2015), 226233.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Wang K., Lavoue G., Denis F., and Baskurt A.. 2008. A comprehensive survey on three-dimensional mesh watermarking. IEEE Transactions on Multimedia 10, 8 (2008), 15131527.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Wu H.-T., Cheung Y.-M., and Huang J.. 2016. Reversible data hiding in paillier cryptosystem. Journal of Visual Communication and Image Representation 40, PB (2016), 765771.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Wu H.-T., Cheung Y.-M., Yang Z., and Tang S.. 2019. A high-capacity reversible data hiding method for homomorphic encrypted images. Journal of Visual Communication and Image Representation 62, C (2019), 8796.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Xiang S. and Luo X.. 2018. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Transactions on Circuits and Systems for Video Technology 28, 11 (2018), 30993110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Xu N., Tang J., Luo B., and Yin Z.. 2022. Separable reversible data hiding based on integer mapping and MSB prediction for encrypted 3D mesh models. Cognitive Computation 14, 3 (2022), 11721181.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Yin Z., Xu N., Wang F., Cheng L., and Luo B.. 2021. Separable reversible data hiding based on integer mapping and multi-MSB prediction for encrypted 3D mesh models. Pattern Recognition and Computer Visio (PRCV’21). Lecture Notes in Computer Science, Vol. 13020, Springer, Cham.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Zhang X.. 2012. Reversible data hiding with optimal value transfer. IEEE Transactions on Multimedia 15, 2 (2012), 316325.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Zhang X., Long J., Wang Z., and Cheng H.. 2015. Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26, 9 (2015), 16221631.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Zheng S., Wang Y., and Hu D.. 2019. Lossless data hiding based on homomorphic cryptosystem. IEEE Transactions on Dependable and Secure Computing 18, 2 (2019), 692705.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Zhou J., Sun W., Dong L., Liu X., Au O. C., and Tang Y. Y.. 2015. Secure reversible image data hiding over encrypted domain via key modulation. IEEE Transactions on Circuits and Systems for Video Technology 26, 3 (2015), 441452.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Zhou N., Zhang M., Wang H., Ke Y., and Di F.. 2020. Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU. IEEE Access 8 (2020), 8141281424.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. 3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 5s
        October 2023
        280 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3599694
        • Editor:
        • Abdulmotaleb El Saddik
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 June 2023
        • Online AM: 21 March 2023
        • Accepted: 15 March 2023
        • Revised: 1 February 2023
        • Received: 30 September 2022
        Published in tomm Volume 19, Issue 5s

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)159
        • Downloads (Last 6 weeks)16

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text