EconPapers    
Economics at your fingertips  
 

Efficient Reversible Data Hiding in Encrypted Point Clouds via KD Tree-Based Path Planning and Dual-Model Design

Yuan-Yu Tsai (), Chia-Yuan Li, Cheng-Yu Ho and Ching-Ta Lu ()
Additional contact information
Yuan-Yu Tsai: Department of Communications Engineering, Feng Chia University, Taichung City 407102, Taiwan
Chia-Yuan Li: Professional Master’s Program of Information and Electrical Engineering, Feng Chia University, Taichung City 407102, Taiwan
Cheng-Yu Ho: Department of M-Commerce and Multimedia Applications, Asia University, Taichung City 413305, Taiwan
Ching-Ta Lu: Department of Communications Engineering, Feng Chia University, Taichung City 407102, Taiwan

Mathematics, 2025, vol. 13, issue 16, 1-21

Abstract: Reversible data hiding in encrypted point clouds presents unique challenges due to their unstructured geometry, absence of mesh connectivity, and high sensitivity to spatial perturbations. In this paper, we propose an efficient and secure reversible data hiding framework for encrypted point clouds, incorporating KD tree-based path planning, adaptive multi-MSB prediction, and a dual-model design. To establish a consistent spatial traversal order, a Hamiltonian path is constructed using a KD tree-accelerated nearest-neighbor algorithm. Guided by this path, a prediction-driven embedding strategy dynamically adjusts the number of most significant bits (MSBs) embedded per point, balancing capacity and reversibility while generating a label map that reflects local predictability. The label map is then compressed using Huffman coding to reduce the auxiliary overhead. For enhanced security and lossless recovery, the encrypted point cloud is divided into two complementary shares through a lightweight XOR-based (2, 2) secret sharing scheme. The Huffman tree and compressed label map are distributed across both encrypted shares, ensuring that neither share alone can reveal the original point cloud or the embedded message. Experimental evaluations on diverse 3D models demonstrate that the proposed method achieves near-optimal embedding rates, perfect reconstruction of the original model, and significant obfuscation of the geometric structure. These results confirm the practicality and robustness of the proposed framework for scenarios involving secure 3D point cloud transmission, storage, and sharing.

Keywords: reversible data hiding; encrypted point clouds; KD tree; Hamiltonian path; Huffman coding; multi-MSB prediction (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/13/16/2593/pdf (application/pdf)
https://www.mdpi.com/2227-7390/13/16/2593/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:13:y:2025:i:16:p:2593-:d:1723653

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-08-14
Handle: RePEc:gam:jmathe:v:13:y:2025:i:16:p:2593-:d:1723653