About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Digital Forensics and Cyber Crime. 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I

Research Article

Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-56580-9_9,
        author={Shuai Ren and Hao Gong and Huirong Cheng and Zejing Cheng},
        title={Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator},
        proceedings={Digital Forensics and Cyber Crime. 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I},
        proceedings_a={ICDF2C},
        year={2024},
        month={4},
        keywords={Information hiding 3D point cloud model Feature extraction NSCT transform},
        doi={10.1007/978-3-031-56580-9_9}
    }
    
  • Shuai Ren
    Hao Gong
    Huirong Cheng
    Zejing Cheng
    Year: 2024
    Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator
    ICDF2C
    Springer
    DOI: 10.1007/978-3-031-56580-9_9
Shuai Ren1, Hao Gong1,*, Huirong Cheng1, Zejing Cheng1
  • 1: School of Information Engineering
*Contact email: 2022124045@chd.edu.cn

Abstract

In order to improve the security and robustness of the 3D model information hiding algorithm, this paper proposes a point cloud model information hiding algorithm based on multi-scale transformation and composite operator. Firstly, rasterizing the 3D point cloud model, and use the improved 3D Harris algorithm to extract the corner points of the rasterized model. Secondly, using SURF operator to screen robust feature points as embedding regions of secret information. Finally, the feature region is subjected to the multiscale transformation, and the secret information is hid by using a quantization-based method to embed it into the low-frequency coefficient matrix. The experimental results show that the algorithm can completely avoid affine transformation attacks and can achieve a Corr value of 0.729 in the face of a composite attack with 10% simplification, 0.5% noise and 10% shear. The algorithm’s invisibility, capacity, and its robustness against multiple attacks are improved.

Keywords
Information hiding 3D point cloud model Feature extraction NSCT transform
Published
2024-04-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-56580-9_9
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL