Skip to main content

Analysis of Substitutive Fragile Watermarking Techniques for 3D Model Authentication

  • Conference paper
  • First Online:
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019 (AISI 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1058))

  • 2279 Accesses

Abstract

Due to the importance of multimedia data and the urgent need to use it in many fields such as industry, medicine and entertainment, protecting them becomes an important issue. Digital watermarking is considered an efficient solution for multimedia security as it preserves the original media content as it is. For 3D graphical models, 3D fragile watermarking aims to detect any attacks to the models and protect the copyright and the ownership of the models. In this paper, we present a comparative analysis between two substitutive 3D fragile watermarking algorithms. The first algorithm is based on adaptive watermark generation technique using Hamming code, while the other algorithm uses Chaos sequence for 3D models fragile watermarking in the spatial domain. The study uses different assessment measures to show the points of strength and weaknesses of both methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mabrouk, K.M., Semary, N.A., Abdul-Kader, H.: Fragile watermarking techniques for 3D model authentication: review. In: Hassanien, A., Azar, A., Gaber, T., Bhatnagar, R., Tolba, M.F. (eds.) The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). AMLTA 2019. Advances in Intelligent Systems and Computing, vol. 921, pp. 669–679. Springer, Cham (2020)

    Google Scholar 

  2. Wang, J.T., et al.: Hamming code based watermarking scheme for 3D model verification. In: 2014 International Symposium on Computer, Consumer and Control, Taichung, pp. 1095–1098 (2014)

    Google Scholar 

  3. Wang, J.T., et al.: A novel chaos sequence based 3d fragile watermarking scheme. In: 2014 International Symposium on Computer, Consumer and Control, Taichung, pp. 745–748 (2014)

    Google Scholar 

  4. Yeo, B.L., Yeung, M.M.: Watermarking 3D objects for verification. IEEE Comput. Graph. Appl. 19(1), 36–45 (1999)

    Article  Google Scholar 

  5. Lin, H.S., et al.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimed. 7(6), 997–1006 (2005)

    Article  Google Scholar 

  6. Dugelay, J.L., Baskurt, A., Daoudi, M. (eds.): 3D Object Processing: Compression: Indexing and Watermarking. Wiley, Hoboken (2008)

    Google Scholar 

  7. Wu, H.T., Cheung, Y.M.: A fragile watermarking scheme for 3D meshes. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 117–124. ACM (2005)

    Google Scholar 

  8. Wang, W.B., et al.: A numerically stable fragile watermarking scheme for authenticating 3D models. Comput. Aided Des. 40(5), 634–645 (2008)

    Article  Google Scholar 

  9. Wang, Y.P., Hu, S.M.: A new watermarking method for 3D models based on integral invariants. IEEE Trans. Vis. Comput. Graph. 15(2), 285–294 (2009)

    Article  Google Scholar 

  10. Wang, J.T., et al.: Error detecting code based fragile watermarking scheme for 3D models. In: 2014 international Symposium on Computer, Consumer and Control (IS3C), pp. 1099–1102. IEEE (2014)

    Google Scholar 

  11. Ichikawa, S., Chiyama, H., Akabane, K.: Redundancy in 3D polygon models and its application to digital signature. J. SCG 10(1), 225–232 (2002)

    Google Scholar 

  12. Wu, H.T., Cheung, Y.M.: Public authentication of 3D mesh models. In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings) (WI 2006), Hong Kong, pp. 940–948, December 2006

    Google Scholar 

  13. Bennour, J., Dugelay, J.L.: Protection of 3D object visual representations. In: 2006 IEEE International Conference on Multimedia and Expo, Toronto, Ontario, pp. 1113–1116, July 2006

    Google Scholar 

  14. Sales, M.M., RondaoAlface, P., Macq, B.: 3D objects watermarking and tracking of their visual representations. In: The Third International Conferences on Advances in Multimedia (2011)

    Google Scholar 

  15. Ohbuchi, R., Masuda, H., Aono, M.: Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Sel. Areas Commun. 16(4), 551–560 (1998)

    Article  Google Scholar 

  16. Mao, X., Shiba, M., Imamiya, A.: Watermarking 3D geometric models through triangle subdivision. In: Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 253–260, August 2001

    Google Scholar 

  17. Chou, C.M., Tseng, D.C.: A public fragile watermarking scheme for 3D model authentication. Comput. Aided Des. 38(11), 1154–1165 (2006)

    Article  Google Scholar 

  18. Cayre, F., Macq, B.: Data hiding on 3-D triangle meshes. IEEE Trans. Signal Process. 51(4), 939–949 (2003)

    Article  MathSciNet  Google Scholar 

  19. Chou, C.M., Tseng, D.C.: Affine-transformation-invariant public fragile watermarking for 3D model authentication. IEEE Comput. Graph. Appl. 29(2), 72–79 (2009)

    Article  Google Scholar 

  20. Huang C.C., et al.: Spherical coordinate based fragile watermarking scheme for 3D models. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 566–571. Springer, Heidelberg, June 2013

    Google Scholar 

  21. Xu, T., Cai, Z.: A novel semi-fragile watermarking algorithm for 3D mesh models. In: 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 782–785 (2012)

    Google Scholar 

  22. Chen, H.-K., Lee, C.-I.: Anti-control of chaos in rigid body motion. Chaos Solit. Fractals 21(4), 957–965 (2004)

    Article  MathSciNet  Google Scholar 

  23. Borah, S., Borah, B.: Watermarking techniques for three-dimensional (3D) mesh authentication in spatial domain. 3D Res. 9 (2018). https://doi.org/10.1007/s13319-018-0194-7

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kariman M. Mabrouk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mabrouk, K.M., Semary, N.A., Abdul-Kader, H. (2020). Analysis of Substitutive Fragile Watermarking Techniques for 3D Model Authentication. In: Hassanien, A., Shaalan, K., Tolba, M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019. AISI 2019. Advances in Intelligent Systems and Computing, vol 1058. Springer, Cham. https://doi.org/10.1007/978-3-030-31129-2_79

Download citation

Publish with us

Policies and ethics