Abstract
The need for multimedia data in many fields such as industry, medicine, and entertainment has become a common need nowadays. 3D graphics, as a type of multimedia, attracts the attention of many researchers. The spread of programs that are used to modify and duplicate this data easily leads to increase the necessity to develop a variety of watermark technologies for various protection purposes such as copyrights protection and authentication. In this study, we provide a review study of fragile watermarking techniques for 3D models over the last decade and clarify what are the criteria and requirements for design such systems. We briefly show the different types of 3D models representation and what are the most common kinds of attacks could be applied to them, and finally discuss the challenges encountered at designing such techniques.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chou, C.M., Tseng, D.C.: Technologies for 3D model watermarking: a survey. Int. J. Comput. Sci. Netw. Secur. 7(2), 328–334 (2007)
Bors, A.G.: Watermarking mesh-based representations of 3-D objects using local moments. IEEE Trans. Image Process. 15(3), 687–701 (2006)
Ohbuchi, R., Masuda, H., Aono, M.: Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Sel. Areas Commun. 16(4), 551–560 (1998)
Dugelay, J.L., Baskurt, A., Daoudi, M. (eds.): 3D Object Processing: Compression Indexing and Watermarking. Wiley, Hoboken (2008)
Ichikawa, S., Chiyama, H., Akabane, K.: Redundancy in 3D polygon models and its application to digital signature. J. WSCG 10(1), 225–232 (2002)
Wu, H.T., Cheung, Y.M.: Public authentication of 3D mesh models. In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings) (WI 2006), Hong Kong, pp. 940–948, December 2006
Bennour, J., Dugelay, J.L.: Protection of 3D object visual representations. In: 2006 IEEE International Conference on Multimedia and Expo, Toronto, Ontario, pp. 1113–1116, July 2006
Bennour, J., Dugelay, J.L.: Protection of 3D object through silhouette watermarking. In: 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, Toulouse, pp. 221–224, May 2006
Sales, M.M., Rondao Alface, P., Macq, B.: 3D objects watermarking and tracking of their visual representations. In: The Third International Conferences on Advances in Multimedia (2011)
Werghi, N., Medimegh, N., Gazzah, S.: Watermarking of 3D triangular mesh models using ordered ring facets. In: 10th International Multi-Conference on Systems, Signals and Devices, SSD, pp. 1–6 (2013)
Mao, X., Shiba, M., Imamiya, A.: Watermarking 3D geometric models through triangle subdivision. In: Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 253–260, August 2001
Yeo, B.L., Yeung, M.M.: Watermarking 3D objects for verification. IEEE Comput. Graph. Appl. 19(1), 36–45 (1999)
Lin, H.Y., Liao, H.Y., Lu, C.S., Lin, J.C.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997–1006 (2005)
Chou, C.M., Tseng, D.C.: A public fragile watermarking scheme for 3D model authentication. Comput. Aided Des. 38(11), 1154–1165 (2006)
Cayre, F., Macq, B.: Data hiding on 3-D triangle meshes. IEEE Trans. Signal Process. 51(4), 939–949 (2003)
Tsai, Y.Y., Tsai, Y.S., Chang, C.C.: An improved region-based tampered detection algorithm for 3D polygonal models. In: 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, pp. 1163–1166 (2018)
Chou, C.M., Tseng, D.C.: Affine-transformation-invariant public fragile watermarking for 3D model authentication. IEEE Comput. Graph. Appl. 29(2), 72–79 (2009)
Huang, C.C., Yang, Y.W., et al.: Spherical coordinate based fragile watermarking scheme for 3D models. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 566–571. Springer, Heidelberg, June 2013
Molaei, A.M., Ebrahimnezhad, H., Sedaaghi, M.H.: A blind fragile watermarking method for 3D models based on geometric properties of triangles. 3D Res. 4(4), 4 (2013)
Tao, X., Zhao-Quan, C.: A novel semi-fragile watermarking algorithm for 3D mesh models. In: 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 782–785 (2012)
Wang, W.B., Zheng, G.Q., Yong, J.H., Gu, H.J.: A numerically stable fragile watermarking scheme for authenticating 3D models. Comput. Aided Des. 40(5), 634–645 (2008)
Wang, Y.P., Hu, S.M.: A new watermarking method for 3D models based on integral invariants. IEEE Trans. Vis. Comput. Graph. 15(2), 285–294 (2009)
Chen, T.Y., Hwang, M.S., Jan, J.K.: Adaptive authentication schemes for 3D mesh models. Int. J. Innovative Comput. Inf. Control 5(12), 4561–4572 (2009)
Wang, J.T., et al: Hamming code based watermarking scheme for 3D model verification. In: 2014 International Symposium on Computer, Consumer and Control (I3C), Taichung, pp. 1095–1098 (2014)
Wang, J.T., et al.: Error detecting code based fragile watermarking scheme for 3D models. In: 2014 International Symposium on Computer, Consumer and Control (I3C), Taichung, pp. 1099–1102, June 2014
Chang, Y.C., et al.: An error-detecting code based fragile watermarking scheme in spherical coordinate system. In: 2016 International Symposium on Computer, Consumer and Control (IS3C), Xi’an, pp. 287–290, July 2016
Wang, J.T., et al.: A novel chaos sequence based 3D fragile watermarking scheme. In: 2014 International Symposium on Computer, Consumer and Control (IS3C), Taichung, pp. 745–748, June 2014
Lavoué, G.: A roughness measure for 3D mesh visual masking. In: Proceedings of the 4th Symposium on Applied perception in Graphics and Visualization, pp. 57–60. ACM (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Mabrouk, K.M., Semary, N.A., Abdul-Kader, H. (2020). Fragile Watermarking Techniques for 3D Model Authentication: Review. In: Hassanien, A., Azar, A., Gaber, T., Bhatnagar, R., F. Tolba, M. (eds) The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). AMLTA 2019. Advances in Intelligent Systems and Computing, vol 921. Springer, Cham. https://doi.org/10.1007/978-3-030-14118-9_66
Download citation
DOI: https://doi.org/10.1007/978-3-030-14118-9_66
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14117-2
Online ISBN: 978-3-030-14118-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)