{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:54:38Z","timestamp":1777128878710,"version":"3.51.4"},"reference-count":35,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The reversible data hiding scheme in the encrypted domain is a potential solution to the concerns regarding user privacy in cloud applications. The 3D mesh model is an emerging file format and is widely used in engineering modeling, special effects, and video games. However, studies on reversible data hiding in encrypted 3D mesh models are still in the preliminary stage. In this paper, two novel techniques, multi-group partition (MGP) and closest pair prediction (CPP), are proposed to improve performance. The MGP technique adaptively classifies vertices into reference and embeddable vertices, while the CPP technique efficiently predicts embeddable vertices and generates shorter recovery information to vacate more redundancy for additional data embedding. Experimental results indicate that the proposed scheme significantly improves the embedding rate compared to state-of-the-art schemes and can be used in real-time applications.<\/jats:p>","DOI":"10.3390\/fi16060210","type":"journal-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T04:48:12Z","timestamp":1718599692000},"page":"210","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction"],"prefix":"10.3390","volume":"16","author":[{"given":"Xu","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, University of Jinan, Jinan 250022, China"},{"name":"Department of Information Engineering and Computer Science, Feng Chia University, 100 Wenhwa Road, Seatwen, Taichung 40724, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3401-8742","authenticated-orcid":false,"given":"Jui-Chuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, 100 Wenhwa Road, Seatwen, Taichung 40724, Taiwan"}]},{"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Warwick, Coventry CV47AL, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, 100 Wenhwa Road, Seatwen, Taichung 40724, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2024,6,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/MCOM.1978.1089771","article-title":"The data encryption standard in perspective","volume":"16","author":"Davis","year":"1978","journal-title":"IEEE Commun. Soc. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_3","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M., and Saber, E. (2002, January 22\u201325). Reversible data hiding. Proceedings of the International conference on image processing, Rochester, NY, USA."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.dsp.2013.11.002","article-title":"Improved PVO-based reversible data hiding","volume":"25","author":"Peng","year":"2014","journal-title":"Digit. Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","article-title":"Reversible data hiding in encrypted image","volume":"18","author":"Zhang","year":"2011","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","article-title":"Effective reversible data hiding in encrypted image with privacy protection for image content","volume":"31","author":"Qin","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","article-title":"An improved reversible data hiding in encrypted images using side match","volume":"19","author":"Hong","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","article-title":"Separable reversible data hiding in encrypted image","volume":"7","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","article-title":"Reversible data hiding in encrypted images with distributed source encoding","volume":"26","author":"Qian","year":"2015","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","article-title":"High-capacity reversible data hiding in encrypted images by prediction error","volume":"104","author":"Wu","year":"2014","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"103421","DOI":"10.1016\/j.jvcir.2021.103421","article-title":"Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images","volume":"82","author":"Wang","year":"2022","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_12","first-page":"78","article-title":"Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion","volume":"47","author":"Xiong","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"60635","DOI":"10.1109\/ACCESS.2018.2876036","article-title":"High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption","volume":"6","author":"Xiong","year":"2018","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1109\/TCSVT.2019.2963393","article-title":"Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain","volume":"30","author":"Ke","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","article-title":"New framework for reversible data hiding in encrypted domain","volume":"11","author":"Huang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2285","DOI":"10.1109\/TCSVT.2018.2863029","article-title":"A high capacity multi-level approach for reversible data hiding in encrypted images","volume":"29","author":"Ge","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.ins.2017.12.044","article-title":"Reversible data-hiding in encrypted images by redundant space transfer","volume":"433","author":"Liu","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.ins.2021.02.079","article-title":"Reversible data hiding in encrypted images with block-based adaptive MSB encoding","volume":"567","author":"Wang","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","article-title":"Reversible data hiding in encrypted images by reserving room before encryption","volume":"8","author":"Ma","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","article-title":"High capacity reversible data hiding in encrypted images by patch-level sparse representation","volume":"46","author":"Cao","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/TMM.2018.2844679","article-title":"Separable and reversible data hiding in encrypted images using parametric binary tree labeling","volume":"21","author":"Yi","year":"2018","journal-title":"IEEE Trans. Multimed."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","article-title":"Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding","volume":"22","author":"Yin","year":"2019","journal-title":"IEEE Trans. Multimed."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2366","DOI":"10.1109\/TCSVT.2020.2990952","article-title":"A high-capacity reversible data hiding in encrypted images employing local difference predictor","volume":"30","author":"Mohammadi","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/TMM.2020.2985537","article-title":"A recursive reversible data hiding in encrypted images method with a very high payload","volume":"23","author":"Puteaux","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"103556","DOI":"10.1016\/j.jvcir.2022.103556","article-title":"On the multi-level embedding of crypto-image reversible data hiding","volume":"87","author":"Wang","year":"2022","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TMM.2017.2723244","article-title":"Reversible data hiding in encrypted three-dimensional mesh models","volume":"20","author":"Jiang","year":"2017","journal-title":"IEEE Trans. Multimed."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"8145","DOI":"10.1007\/s13369-018-3354-4","article-title":"Homomorphic encryption-based reversible data hiding for 3D mesh models","volume":"43","author":"Shah","year":"2018","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Van Rensburg, B.J., Puteaux, P., Puech, W., and Pedeboy, J.-P. (2021, January 19\u201322). Homomorphic two tier reversible data hiding in encrypted 3d objects. Proceedings of the 2021 IEEE International Conference on Image Processing (ICIP), Virtual.","DOI":"10.1109\/ICIP42928.2021.9506320"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.1109\/TMM.2020.3009492","article-title":"Separable reversible data hiding for encrypted three-dimensional models based on spatial subdivision and space encoding","volume":"23","author":"Tsai","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1007\/s12559-021-09919-5","article-title":"Separable reversible data hiding based on integer mapping and MSB prediction for encrypted 3D mesh models","volume":"14","author":"Xu","year":"2022","journal-title":"Cogn. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yin, Z., Xu, N., Wang, F., Cheng, L., and Luo, B. (November, January 29). Separable reversible data hiding based on integer mapping and multi-MSB prediction for encrypted 3D mesh models. Proceedings of the Pattern Recognition and Computer Vision: 4th Chinese Conference, PRCV 2021, Beijing, China. Proceedings, Part II 4.","DOI":"10.1007\/978-3-030-88007-1_28"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"108686","DOI":"10.1016\/j.sigpro.2022.108686","article-title":"High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction","volume":"201","author":"Lyu","year":"2022","journal-title":"Signal Process."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"109357","DOI":"10.1016\/j.sigpro.2023.109357","article-title":"Ring Co-XOR encryption based reversible data hiding for 3D mesh model","volume":"217","author":"Qu","year":"2024","journal-title":"Signal Process."},{"key":"ref_34","unstructured":"Shilane, P., Min, P., Kazhdan, M., and Funkhouser, T. (2004, January 7\u20139). The Princeton Shape Benchmark. Proceedings of the Proceedings Shape Modeling Applications, Genova, Italy."},{"key":"ref_35","unstructured":"Dubuisson, M.-P., and Jain, A.K. (1994, January 9\u201313). A modified Hausdorff distance for object matching. Proceedings of the 12th International Conference on Pattern Recognition, Jerusalem, Israel."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/6\/210\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:59:16Z","timestamp":1760108356000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/6\/210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,15]]},"references-count":35,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["fi16060210"],"URL":"https:\/\/doi.org\/10.3390\/fi16060210","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,15]]}}}