A multi-secret sharing scheme for 3D solid objects

A novel secret sharing scheme for multiple 3D solid objects is proposed.The algorithm is based on the use of a reversible memory 3D cellular automaton.The scheme exhibit good statistical properties; it is perfect and ideal. In this work a novel protocol to share multiple 3D solid objects in a secure way is presented. Specifically, it is an ( n , n ) -threshold secret sharing scheme based on the use of a particular type of finite state machine called 3D cellular automata. This protocol is shown to be perfect and ideal; moreover, it exhibit good statistical properties.

[1]  Shunzhi Zhu,et al.  A Real-Time 3D Collision Detection Encryption Algorithm Based on Improved RC5 , 2011 .

[2]  A. Ben Hamza,et al.  Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..

[3]  Myungjin Cho,et al.  Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.

[4]  Boon-Lock Yeo,et al.  Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.

[5]  A. Ben Hamza,et al.  Robust Approaches to 3D Object Secret Sharing , 2010, ICIAR.

[6]  A. Ben Hamza,et al.  Information-theoretic hashing of 3D objects using spectral graph theory , 2009, Expert Syst. Appl..

[7]  Myungjin Cho,et al.  Optical Encryption and Information Authentication of 3D Objects Considering Wireless Channel Characteristics , 2013 .

[8]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[9]  Bin Ren,et al.  The 3-dimensional cellular automata for HIV infection , 2014 .

[10]  Svyatoslav Igorevich Ivanov,et al.  3D Cellular automata for modeling of spray freeze drying process , 2011 .

[11]  William Puech,et al.  Wavelet-based high-capacity watermarking of 3-D irregular meshes , 2014, Multimedia Tools and Applications.

[12]  Emmanuel Fernandes,et al.  Geometric soft hash functions for 2D and 3D objects , 2004, IS&T/SPIE Electronic Imaging.

[13]  Julio C. Rodriguez-Quinonez,et al.  Optical monitoring of scoliosis by 3D medical laser scanner , 2014 .

[14]  Ki-Ryong Kwon,et al.  Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol , 2014, KSII Trans. Internet Inf. Syst..

[15]  Sylaiou Styliani,et al.  Virtual museums, a survey and some issues for consideration , 2009 .

[16]  Dengfu Chen,et al.  A three-dimensional cellular automata model coupled with finite element method and thermodynamic database for alloy solidification , 2013 .

[17]  Atilla Baskurt,et al.  Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation , 2007, Information Hiding.

[18]  Palash Sarkar,et al.  A brief history of cellular automata , 2000, CSUR.

[19]  Karthik Ramani,et al.  Shape-based clustering for 3D CAD objects: A comparative study of effectiveness , 2009, Comput. Aided Des..

[20]  Din-Chang Tseng,et al.  A public fragile watermarking scheme for 3D model authentication , 2006, Comput. Aided Des..

[21]  Peng-Zhi Pan,et al.  Modeling the cracking process of rocks from continuity to discontinuity using a cellular automaton , 2012, Comput. Geosci..

[22]  Yu-Ming Cheng,et al.  An adaptive steganographic algorithm for 3D polygonal meshes , 2007, The Visual Computer.

[23]  Ki-Ryong Kwon,et al.  Multiple 3D Medical Data Watermarking for Healthcare Data Management , 2010, Journal of Medical Systems.

[24]  Bahrain Javidi,et al.  Optical watermarking of 3D objects for authentication in transmission and storage , 2003, The 16th Annual Meeting of the IEEE Lasers and Electro-Optics Society, 2003. LEOS 2003..

[25]  A. Ben Hamza,et al.  Secret sharing of 3D models using Blakely scheme , 2010, 2010 25th Biennial Symposium on Communications.

[26]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[27]  Sergio D. Felicelli,et al.  Modeling dendritic solidification of Al–3%Cu using cellular automaton and phase-field methods , 2013 .

[28]  Benoît Macq,et al.  3D Objects Watermarking and Tracking of Their Visual Representations , 2011, MMEDIA 2011.

[29]  Chen-Ming Fan,et al.  Error Detecting Code Based Fragile Watermarking Scheme for 3D Models , 2014, 2014 International Symposium on Computer, Consumer and Control.

[30]  Prabir Bhattacharya,et al.  Watermarking 3D models using spectral mesh compression , 2009, Signal Image Video Process..

[31]  A. Ben Hamza,et al.  Entropic hashing of 3D objects using Laplace-Beltrami operator , 2008, 2008 15th IEEE International Conference on Image Processing.

[32]  Ian Hughes Virtual worlds, augmented reality, blended reality , 2012, Comput. Networks.

[33]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[34]  Fabio Bruno,et al.  From 3D reconstruction to virtual reality: A complete methodology for digital archaeological exhibition , 2010 .

[35]  Byoungho Kim,et al.  Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging. , 2014, Applied optics.