Skip to main content

Fragile Watermarking Techniques for 3D Model Authentication: Review

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 921))

Abstract

The need for multimedia data in many fields such as industry, medicine, and entertainment has become a common need nowadays. 3D graphics, as a type of multimedia, attracts the attention of many researchers. The spread of programs that are used to modify and duplicate this data easily leads to increase the necessity to develop a variety of watermark technologies for various protection purposes such as copyrights protection and authentication. In this study, we provide a review study of fragile watermarking techniques for 3D models over the last decade and clarify what are the criteria and requirements for design such systems. We briefly show the different types of 3D models representation and what are the most common kinds of attacks could be applied to them, and finally discuss the challenges encountered at designing such techniques.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chou, C.M., Tseng, D.C.: Technologies for 3D model watermarking: a survey. Int. J. Comput. Sci. Netw. Secur. 7(2), 328–334 (2007)

    Google Scholar 

  2. Bors, A.G.: Watermarking mesh-based representations of 3-D objects using local moments. IEEE Trans. Image Process. 15(3), 687–701 (2006)

    Article  Google Scholar 

  3. Ohbuchi, R., Masuda, H., Aono, M.: Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Sel. Areas Commun. 16(4), 551–560 (1998)

    Article  Google Scholar 

  4. Dugelay, J.L., Baskurt, A., Daoudi, M. (eds.): 3D Object Processing: Compression Indexing and Watermarking. Wiley, Hoboken (2008)

    Google Scholar 

  5. Ichikawa, S., Chiyama, H., Akabane, K.: Redundancy in 3D polygon models and its application to digital signature. J. WSCG 10(1), 225–232 (2002)

    Google Scholar 

  6. Wu, H.T., Cheung, Y.M.: Public authentication of 3D mesh models. In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings) (WI 2006), Hong Kong, pp. 940–948, December 2006

    Google Scholar 

  7. Bennour, J., Dugelay, J.L.: Protection of 3D object visual representations. In: 2006 IEEE International Conference on Multimedia and Expo, Toronto, Ontario, pp. 1113–1116, July 2006

    Google Scholar 

  8. Bennour, J., Dugelay, J.L.: Protection of 3D object through silhouette watermarking. In: 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, Toulouse, pp. 221–224, May 2006

    Google Scholar 

  9. Sales, M.M., Rondao Alface, P., Macq, B.: 3D objects watermarking and tracking of their visual representations. In: The Third International Conferences on Advances in Multimedia (2011)

    Google Scholar 

  10. Werghi, N., Medimegh, N., Gazzah, S.: Watermarking of 3D triangular mesh models using ordered ring facets. In: 10th International Multi-Conference on Systems, Signals and Devices, SSD, pp. 1–6 (2013)

    Google Scholar 

  11. Mao, X., Shiba, M., Imamiya, A.: Watermarking 3D geometric models through triangle subdivision. In: Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 253–260, August 2001

    Google Scholar 

  12. Yeo, B.L., Yeung, M.M.: Watermarking 3D objects for verification. IEEE Comput. Graph. Appl. 19(1), 36–45 (1999)

    Article  Google Scholar 

  13. Lin, H.Y., Liao, H.Y., Lu, C.S., Lin, J.C.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997–1006 (2005)

    Article  Google Scholar 

  14. Chou, C.M., Tseng, D.C.: A public fragile watermarking scheme for 3D model authentication. Comput. Aided Des. 38(11), 1154–1165 (2006)

    Article  Google Scholar 

  15. Cayre, F., Macq, B.: Data hiding on 3-D triangle meshes. IEEE Trans. Signal Process. 51(4), 939–949 (2003)

    Article  MathSciNet  Google Scholar 

  16. Tsai, Y.Y., Tsai, Y.S., Chang, C.C.: An improved region-based tampered detection algorithm for 3D polygonal models. In: 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, pp. 1163–1166 (2018)

    Google Scholar 

  17. Chou, C.M., Tseng, D.C.: Affine-transformation-invariant public fragile watermarking for 3D model authentication. IEEE Comput. Graph. Appl. 29(2), 72–79 (2009)

    Article  Google Scholar 

  18. Huang, C.C., Yang, Y.W., et al.: Spherical coordinate based fragile watermarking scheme for 3D models. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 566–571. Springer, Heidelberg, June 2013

    Google Scholar 

  19. Molaei, A.M., Ebrahimnezhad, H., Sedaaghi, M.H.: A blind fragile watermarking method for 3D models based on geometric properties of triangles. 3D Res. 4(4), 4 (2013)

    Article  Google Scholar 

  20. Tao, X., Zhao-Quan, C.: A novel semi-fragile watermarking algorithm for 3D mesh models. In: 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 782–785 (2012)

    Google Scholar 

  21. Wang, W.B., Zheng, G.Q., Yong, J.H., Gu, H.J.: A numerically stable fragile watermarking scheme for authenticating 3D models. Comput. Aided Des. 40(5), 634–645 (2008)

    Article  Google Scholar 

  22. Wang, Y.P., Hu, S.M.: A new watermarking method for 3D models based on integral invariants. IEEE Trans. Vis. Comput. Graph. 15(2), 285–294 (2009)

    Article  Google Scholar 

  23. Chen, T.Y., Hwang, M.S., Jan, J.K.: Adaptive authentication schemes for 3D mesh models. Int. J. Innovative Comput. Inf. Control 5(12), 4561–4572 (2009)

    Google Scholar 

  24. Wang, J.T., et al: Hamming code based watermarking scheme for 3D model verification. In: 2014 International Symposium on Computer, Consumer and Control (I3C), Taichung, pp. 1095–1098 (2014)

    Google Scholar 

  25. Wang, J.T., et al.: Error detecting code based fragile watermarking scheme for 3D models. In: 2014 International Symposium on Computer, Consumer and Control (I3C), Taichung, pp. 1099–1102, June 2014

    Google Scholar 

  26. Chang, Y.C., et al.: An error-detecting code based fragile watermarking scheme in spherical coordinate system. In: 2016 International Symposium on Computer, Consumer and Control (IS3C), Xi’an, pp. 287–290, July 2016

    Google Scholar 

  27. Wang, J.T., et al.: A novel chaos sequence based 3D fragile watermarking scheme. In: 2014 International Symposium on Computer, Consumer and Control (IS3C), Taichung, pp. 745–748, June 2014

    Google Scholar 

  28. Lavoué, G.: A roughness measure for 3D mesh visual masking. In: Proceedings of the 4th Symposium on Applied perception in Graphics and Visualization, pp. 57–60. ACM (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kariman M. Mabrouk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mabrouk, K.M., Semary, N.A., Abdul-Kader, H. (2020). Fragile Watermarking Techniques for 3D Model Authentication: Review. In: Hassanien, A., Azar, A., Gaber, T., Bhatnagar, R., F. Tolba, M. (eds) The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). AMLTA 2019. Advances in Intelligent Systems and Computing, vol 921. Springer, Cham. https://doi.org/10.1007/978-3-030-14118-9_66

Download citation

Publish with us

Policies and ethics