{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:32:02Z","timestamp":1771468322334,"version":"3.50.1"},"reference-count":41,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62362064"],"award-info":[{"award-number":["62362064"]}]},{"name":"National Natural Science Foundation of China","award":["62166045"],"award-info":[{"award-number":["62166045"]}]},{"name":"National Natural Science Foundation of China","award":["62161051"],"award-info":[{"award-number":["62161051"]}]},{"name":"National Natural Science Foundation of China","award":["202201AT070166"],"award-info":[{"award-number":["202201AT070166"]}]},{"name":"National Natural Science Foundation of China","award":["2022J0475"],"award-info":[{"award-number":["2022J0475"]}]},{"name":"Yunnan Fundamental Research Projects","award":["62362064"],"award-info":[{"award-number":["62362064"]}]},{"name":"Yunnan Fundamental Research Projects","award":["62166045"],"award-info":[{"award-number":["62166045"]}]},{"name":"Yunnan Fundamental Research Projects","award":["62161051"],"award-info":[{"award-number":["62161051"]}]},{"name":"Yunnan Fundamental Research Projects","award":["202201AT070166"],"award-info":[{"award-number":["202201AT070166"]}]},{"name":"Yunnan Fundamental Research Projects","award":["2022J0475"],"award-info":[{"award-number":["2022J0475"]}]},{"name":"Scientific Research Foundation of Yunnan Provincial Department of Education","award":["62362064"],"award-info":[{"award-number":["62362064"]}]},{"name":"Scientific Research Foundation of Yunnan Provincial Department of Education","award":["62166045"],"award-info":[{"award-number":["62166045"]}]},{"name":"Scientific Research Foundation of Yunnan Provincial Department of Education","award":["62161051"],"award-info":[{"award-number":["62161051"]}]},{"name":"Scientific Research Foundation of Yunnan Provincial Department of Education","award":["202201AT070166"],"award-info":[{"award-number":["202201AT070166"]}]},{"name":"Scientific Research Foundation of Yunnan Provincial Department of Education","award":["2022J0475"],"award-info":[{"award-number":["2022J0475"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Although reversible data hiding technology is widely used, it still faces several challenges and issues. These include ensuring the security and reliability of embedded secret data, improving the embedding capacity, and maintaining the quality of media data. Additionally, irregular data types, such as three-dimensional point clouds and triangle mesh-represented 3D models, lack an ordered structure in their representation. As a result, embedding these irregular data into digital media does not provide sufficient information for the complete recovery of the original data during extraction. To address this issue, this paper proposes a method based on convolutional neural network prediction error expansion to enhance the embedding capacity of carrier images while maintaining acceptable visual quality. The triangle mesh representation of the 3D model is regularized in a two-dimensional parameterization domain, and the regularized 3D model is reversibly embedded into the image. The process of embedding and extracting confidential information in carrier images is symmetrical, and the regularization and restoration of 3D models are also symmetrical. Experiments show that the proposed method increases the reversible embedding capacity, and the triangle mesh can be conveniently subjected to reversible hiding.<\/jats:p>","DOI":"10.3390\/sym15091782","type":"journal-article","created":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T05:59:06Z","timestamp":1695016746000},"page":"1782","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Reversible 3D Model Hiding Method Based on Convolutional Neural Network Prediction Error Expansion"],"prefix":"10.3390","volume":"15","author":[{"given":"Guochang","family":"Hu","sequence":"first","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, Kunming 650221, China"},{"name":"Yunnan Key Laboratory of Service Computing, Kunming 650221, China"}]},{"given":"Kun","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, Kunming 650221, China"},{"name":"Yunnan Key Laboratory of Service Computing, Kunming 650221, China"}]},{"given":"Yinghua","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statisties, Huizhou University, Huizhou 516007, China"}]},{"given":"Hong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, Kunming 650221, China"}]},{"given":"Xinggui","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, Kunming 650221, China"}]},{"given":"Hao","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, Kunming 650221, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Onyshchenko, S., Yanko, A., Hlushko, A., and Sivitska, S. (2020, January 1\u20132). Increasing information protection in the information security management system of the enterprise. Proceedings of the International Conference Building Innovations, Baku, Poltava.","DOI":"10.1007\/978-3-030-85043-2_67"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"10659","DOI":"10.1016\/j.aej.2022.03.075","article-title":"Medical big data access control model based on UPHFPR and evolutionary game","volume":"61","author":"Jiang","year":"2022","journal-title":"Alex. Eng. J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"108423","DOI":"10.1016\/j.asoc.2022.108423","article-title":"A medical big data access control model based on fuzzy trust prediction and regression analysis","volume":"117","author":"Jiang","year":"2022","journal-title":"Appl. Soft Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"108469","DOI":"10.1016\/j.ijpe.2022.108469","article-title":"A trust transitivity model of small and medium-sized manufacturing enterprises under blockchain-based supply chain finance","volume":"247","author":"Jiang","year":"2022","journal-title":"Int. J. Prod. Econ."},{"key":"ref_5","unstructured":"Fridrich, J., Goljan, M., and Du, R. (2001, January 2\u20134). Invertible authentication. Proceedings of the Security and Watermarking of Multimedia Contents III, SPIE, Las Vegas, NV, USA."},{"key":"ref_6","unstructured":"Fridrich, J., Goljan, M., and Du, R. (2002, January 29). Lossless data embedding for all image formats. Proceedings of the Security and Watermarking of Multimedia Contents IV, SPIE, San Jose, CA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","article-title":"Lossless watermarking for image authentication: A new framework and an implementation","volume":"15","author":"Celik","year":"2006","journal-title":"IEEE Trans. Image Process."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.image.2018.03.001","article-title":"Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion","volume":"64","author":"Yi","year":"2018","journal-title":"Signal Process. Image Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","article-title":"An improved reversible data hiding in encrypted images using side match","volume":"19","author":"Hong","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","article-title":"Separable reversible data hiding in encrypted image","volume":"7","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","article-title":"Reversibility improved data hiding in encrypted images","volume":"94","author":"Zhang","year":"2014","journal-title":"Signal Process."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","article-title":"Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding","volume":"22","author":"Yin","year":"2019","journal-title":"IEEE Trans. Multimed."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.sigpro.2014.08.022","article-title":"Dual imaging-based reversible hiding technique using LSB matching","volume":"108","author":"Lu","year":"2015","journal-title":"Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","article-title":"Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection","volume":"20","author":"Li","year":"2011","journal-title":"IEEE Trans. Image Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1587\/elex.5.870","article-title":"Reversible image data hiding based on gradient adjusted prediction","volume":"5","author":"Fallahpour","year":"2008","journal-title":"IEICE Electron. Express"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/LSP.2021.3059202","article-title":"CNN prediction based reversible data hiding","volume":"28","author":"Hu","year":"2021","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","article-title":"Improved embedding for prediction-based reversible watermarking","volume":"6","author":"Coltuc","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/TIP.2011.2162424","article-title":"Low distortion transform for reversible watermarking","volume":"21","author":"Coltuc","year":"2011","journal-title":"IEEE Trans. Image Process."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1093\/comjnl\/bxv067","article-title":"Efficient reversible data hiding using multiple predictors","volume":"59","author":"Jafar","year":"2016","journal-title":"Comput. J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","article-title":"High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion","volume":"93","author":"Li","year":"2013","journal-title":"Signal Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TCSVT.2018.2803303","article-title":"Reversible data hiding in color image with grayscale invariance","volume":"29","author":"Hou","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1587\/elex.4.205","article-title":"High capacity lossless data hiding based on histogram modification","volume":"4","author":"Fallahpour","year":"2007","journal-title":"IEICE Electron. Express"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","article-title":"Reversible image hiding scheme using predictive coding and histogram shifting","volume":"89","author":"Tsai","year":"2009","journal-title":"Signal Process."},{"key":"ref_28","unstructured":"Qi, C.R., Su, H., Mo, K., and Guibas, L.J. (2017, January 21\u201326). Pointnet: Deep learning on point sets for 3D classification and segmentation. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Su, H., Maji, S., Kalogerakis, E., and Learned-Miller, E. (2015, January 7\u201313). Multi-view convolutional neural networks for 3D shape recognition. Proceedings of the IEEE International Conference on Computer Vision, Santiago, Chile.","DOI":"10.1109\/ICCV.2015.114"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2339","DOI":"10.1109\/LSP.2015.2480802","article-title":"Deeppano: Deep panoramic representation for 3-D shape recognition","volume":"22","author":"Shi","year":"2015","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Laine, S., and Karras, T. (2010, January 19). Efficient sparse voxel octrees. Proceedings of the 2010 ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games, Washington, DC, USA.","DOI":"10.1145\/1730804.1730814"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Baert, J., Lagae, A., and Dutr\u00e9, P. (2013, January 19). Out-of-core construction of sparse voxel octrees. Proceedings of the 5th High-Performance Graphics Conference, Anaheim, CA, USA.","DOI":"10.1145\/2492045.2492048"},{"key":"ref_33","first-page":"1","article-title":"Real-time 3D reconstruction at scale using voxel hashing","volume":"32","author":"Izadi","year":"2013","journal-title":"ACM Trans. Graph. (ToG)"},{"key":"ref_34","first-page":"383","article-title":"Variational principles for Minkowski type problems, discrete optimal transport, and discrete Monge-Ampere equations","volume":"20","author":"Gu","year":"2016","journal-title":"AJM"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1109\/TVCG.2008.57","article-title":"Discrete surface Ricci flow","volume":"14","author":"Jin","year":"2008","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Wei, X., Li, H., and Gu, X.D. (2017, January 28\u201329). Three Dimensional Face Recognition via Surface Harmonic Mapping and Deep Learning. Proceedings of the Biometric Recognition: 12th Chinese Conference, CCBR 2017, Shenzhen, China.","DOI":"10.1007\/978-3-319-69923-3_8"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"LeCun","year":"1998","journal-title":"Proc. IEEE"},{"key":"ref_38","unstructured":"Kingma, D.P., and Ba, J. (2014). Adam: A method for stochastic optimization. arXiv."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1145\/1073204.1073241","article-title":"Color2gray: Salience-preserving color removal","volume":"24","author":"Gooch","year":"2005","journal-title":"ACM Trans. Graph. (TOG)"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2891","DOI":"10.1016\/j.patcog.2006.11.003","article-title":"Decolorize: Fast, contrast enhancing, color to grayscale conversion","volume":"40","author":"Grundland","year":"2007","journal-title":"Pattern Recognit."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s11760-016-0911-8","article-title":"Significance of incorporating chrominance information for effective color-to-grayscale image conversion","volume":"11","author":"Sowmya","year":"2017","journal-title":"Signal Image Video Process."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/9\/1782\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:52:53Z","timestamp":1760129573000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/9\/1782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,18]]},"references-count":41,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["sym15091782"],"URL":"https:\/\/doi.org\/10.3390\/sym15091782","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,18]]}}}