Abstract
The technique of independent component analysis (ICA) has been utilized in digital image and audio watermarking. In this paper, it is applied to improve the security of 3D geometry watermarking by using the ICA de-mixing matrix for transformation. An orthogonal transformation (OT) matrix is further employed so that another watermarking scheme is generated. With the same embedding method, the two watermarking schemes are implemented on the test models. The experimental results show that they have similar performance in imperceptibility and capacity. As both of them have the properties of blind extraction and security, the OT-based scheme can be regarded as a simplified version of the ICA-based one with less computational cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, New York (2001)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)
Comon, P.: Independent Component Analysis - A New Concept? Signal Processing 36(3), 287–314 (1994)
Hyvarinen, A., Oja, E.: Independent Component Analysis: Algorithms and Applications. Neural Networks 13(4-5), 411–430 (2000)
Hyvarinen, A., Oja, E.: A Fast Fixed-Point Algorithm for Independent Component Analysis. Neural Computation 9(7), 1483–1492 (1997)
González-Serrano, F.J., Molina-Bulla, H.Y., Murillo-Fuentes, J.J.: Independent Component Analysis Applied to Digital Watermarking. In: International Conference on Acoustic, Speech and Signal Processing (ICASSP), vol. 3, pp. 1997–2000 (2001)
Bounkong, S., Toch, B., Saad, D., Lowe, D.: ICA for Watermarking Digital Images. Journal of Machine Learning Research 4(7-8), 1471–1498 (2003)
Toch, B., Lowe, D., Saad, D.: Watermarking of Audio Signals Using Independent Component Analysis. In: Proceeding of the 3th International Conference on WEB Delivering of Music, pp. 71–74 (2003)
Yu, D., Sattar, F., Ma, K.-K.: Watermark Detection and Extraction Using Independent Component Analysis Method. EURASIP Journal on Applied Signal Processing 2002(1), 92–104, doi:10.1155/S111086570200046X
Szu, H., Noel, S., Yim, S.-B., Willey, J., Landa, J.: Multimedia Authenticity Protection with ICA Watermarking and Digital Bacteria Vaccination. Neural Networks, Special Issue for International Joint Conference on Neural Networks 16(5-6), 907–914 (2003)
Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)
Ohbuchi, R., Masuda, H., Aono, M.: Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications. IEEE Journal of Selected Areas in Communications 16(4), 551–560 (1998)
Benedens, O.: Geometry-Based Watermarking of 3-D Models. IEEE Computer Graphics and Application, Special Issue on Image Security 19(1), 46–55 (1999)
Praun, E., Hoppe, H., Finkelstein, A.: Robust Mesh Watermarking. In: Proceedings of ACM SIGGRAPH, pp. 69–76 (1999)
Yeo, B.L., Yeung, M.M.: Watermarking 3-D Objects for Verification. IEEE Computer Graphics and Application 19(1), 36–45 (1999)
Cayre, F., Macq, B.: Data Hiding on 3-D Triangle Meshes. IEEE Transactions on Signal Processing 51(4), 939–949 (2003)
Cayre, F., Devillers, O., Schmitt, F., Maitre, H.: Watermarking 3D Triangle Meshes for Authentication and Integrity. INRIA Research Report RR-5223 (2004)
Uccheddu, F., Corsini, M., Barni, M.: Wavelet-Based Blind Watermarking of 3d Models. In: Proceedings of ACM Multimedia & Security Workshop, Magdeburg, Germany, pp. 143–154 (2004)
Zafeiriou, S., Tefas, A., Pitas, I.: Blind Robust Watermarking Schemes for Copyright Protection of 3D Mesh Objects. IEEE Transactions on Visualization and Computer Graphics 11(5), 596–607 (2005)
Ohbuchi, R., Mukaiyama, A., Takahashi, S.: A Frequency Domain Approach to Watermarking 3D Shapes. Computer Graphics Forum 21(3), 373–382 (2002)
Bors, A.G.: Watermarking Mesh-Based Representations of 3-D Objects Using Local Moments. IEEE Transactions on Image Processing 15(3), 687–701 (2006)
Wu, H.T., Cheung, Y.M.: A High-Capacity Data Hiding Method for Polygonal Meshes. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 188–200. Springer, Heidelberg (2007)
Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, Ht., Cheung, Ym. (2012). Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security VII. Lecture Notes in Computer Science, vol 7110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28693-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-28693-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28692-6
Online ISBN: 978-3-642-28693-3
eBook Packages: Computer ScienceComputer Science (R0)