Protection of 3D models using cross recovery

Suiang Shyan Lee*, Yi Jheng Huang, Chih-Ching Lin

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

This paper proposes a cross recovery scheme to protect a group of 3D models. The lost or damaged models can be reconstructed using the mutual support of the survived authenticated models. In the encoding phase, we convert a group of n given models (called host models) into n stego* models. The n stego* models would still preserve the appearance of the n host models. In the decoding phase, we divide the received models into two groups: authenticated vs. non-authenticated. Then, we rebuild the recovered models of the non-authenticated group by the mutual support of any t authenticated models (t < n is a given parameter). The experimental results show that the visual quality of our stego* models is very similar to that of the host models, and the size of the stego* models is also very similar to that of the host models. Moreover, after hacker’s attack or disk crash, if the number of attacked or crashed stego* models is not larger than n − t, then the damaged or lost models can be recovered, and the recovered models still have acceptable quality. We also provide an equation which can estimate the suitable size of the recovered model in advance.

Original languageEnglish
Pages (from-to)243-264
Number of pages22
JournalMultimedia Tools and Applications
Volume76
Issue number1
DOIs
StatePublished - 1 Jan 2017

Keywords

  • Authentication
  • Cross recovery
  • Mutual support
  • Sharing of 3D models
  • Size-estimation formula

Fingerprint Dive into the research topics of 'Protection of 3D models using cross recovery'. Together they form a unique fingerprint.

Cite this