TY - JOUR
T1 - Protection of 3D models using cross recovery
AU - Lee, Suiang Shyan
AU - Huang, Yi Jheng
AU - Lin, Chih-Ching
PY - 2017/1/1
Y1 - 2017/1/1
N2 - This paper proposes a cross recovery scheme to protect a group of 3D models. The lost or damaged models can be reconstructed using the mutual support of the survived authenticated models. In the encoding phase, we convert a group of n given models (called host models) into n stego* models. The n stego* models would still preserve the appearance of the n host models. In the decoding phase, we divide the received models into two groups: authenticated vs. non-authenticated. Then, we rebuild the recovered models of the non-authenticated group by the mutual support of any t authenticated models (t < n is a given parameter). The experimental results show that the visual quality of our stego* models is very similar to that of the host models, and the size of the stego* models is also very similar to that of the host models. Moreover, after hacker’s attack or disk crash, if the number of attacked or crashed stego* models is not larger than n − t, then the damaged or lost models can be recovered, and the recovered models still have acceptable quality. We also provide an equation which can estimate the suitable size of the recovered model in advance.
AB - This paper proposes a cross recovery scheme to protect a group of 3D models. The lost or damaged models can be reconstructed using the mutual support of the survived authenticated models. In the encoding phase, we convert a group of n given models (called host models) into n stego* models. The n stego* models would still preserve the appearance of the n host models. In the decoding phase, we divide the received models into two groups: authenticated vs. non-authenticated. Then, we rebuild the recovered models of the non-authenticated group by the mutual support of any t authenticated models (t < n is a given parameter). The experimental results show that the visual quality of our stego* models is very similar to that of the host models, and the size of the stego* models is also very similar to that of the host models. Moreover, after hacker’s attack or disk crash, if the number of attacked or crashed stego* models is not larger than n − t, then the damaged or lost models can be recovered, and the recovered models still have acceptable quality. We also provide an equation which can estimate the suitable size of the recovered model in advance.
KW - Authentication
KW - Cross recovery
KW - Mutual support
KW - Sharing of 3D models
KW - Size-estimation formula
UR - http://www.scopus.com/inward/record.url?scp=84946772166&partnerID=8YFLogxK
U2 - 10.1007/s11042-015-3032-4
DO - 10.1007/s11042-015-3032-4
M3 - Article
AN - SCOPUS:84946772166
VL - 76
SP - 243
EP - 264
JO - Multimedia Tools and Applications
JF - Multimedia Tools and Applications
SN - 1380-7501
IS - 1
ER -