Skip to main content
Log in

Crypto-watermarking system for safe transmission of 3D multiresolution meshes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The idea of digitizing documents to be archived or shared has given rise to a variety of new data types such as 3D meshes. The sharing of this data type between remote users, using high-speed computer networks and remote multimedia databases, poses great security problems. As a solution, we propose, in this paper, a new crypto watermarking algorithm. The originality of this work lies in joining cryptography with digital watermarking to secure 3D multiresolution meshes. To this end, three steps should be executed. The first is the watermark preparation. It consists, firstly, in applying the Secure Hash Algorithm 1 algorithm to generate an electronic signature of the mesh source. Secondly, the logo undergoes an encryption using Advanced Encryption Standard algorithm. To end this step, the signature and the encrypted logo pass through a convolutional encoder to obtain a codeword. As for the second step, it is called mesh preparation and it consists in applying a spiral scanning method to the mesh to split it into Groups Of Triangles. For each Group Of Triangles, a wavelet transform is applied to generate the corresponding Wavelet coefficients vector. Finally, embedding data occurs using the cylindrical coordinate system, a modulation and the least Significant Bit method. The experiment of our algorithm proves that it allows a very high insertion rate without influencing the mesh quality. Our algorithm also minimizes the amount of memory used. Moreover, it is robust against the most popular attacks. Our results show that our algorithm presents an improvement in comparison with recently published results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Benyamin N, Sattar M, Seyed MS, Mohammad RM (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497

  2. Charfeddine M, El’arbi M, Ben Amar C (2012) A new DCT audio watermarking scheme based on preliminary MP3 study. Multimed Tools Appl 70(3). https://doi.org/10.1007/s11042-012-1167-0

  3. Chrysafis C, Ortega A (2000) Line-based, reduced memory, wavelet image compression. IEEE Trans Image Process 9(3):378–389

    Article  MathSciNet  MATH  Google Scholar 

  4. Cho DJ (2015) Watermarking scheme of mpeg-4 laser object for mobile device. Int J Secur Its Appl 9(1):305–312. https://doi.org/10.14257/ijsia.2015.9.1.29

    Google Scholar 

  5. Dang QH (2002) Secure hash standard. Federal Information Processing Standards Publication, pp 180–184

  6. Dong W, Bin W, Sicheng Z, Hongxun Y, Hong L (2017) View-based 3d object retrieval with discriminative views. Neurocomputing 252(23):58–66

    Google Scholar 

  7. Elkefi A (2011) Compression des maillages 3d multiresolutions de grandes précisions

  8. Geri B (2015) A robust digital watermarking algorithm for three dimensional meshes. In: International conference on information engineering for mechanics and materials, pp 1105–1110

  9. Guedri B, Zaied M, Ben Amar C (2011) Indexing and images retrieval by content. In: 2011 international conference on high performance computing and simulation (HPCS). https://doi.org/10.1109/HPCSim.2011.5999848

  10. Guiguang D, Yuchen G, Jile Z, Yue G (2016) Large-scale cross-modality search via collective matrix factorization hashing. IEEE Trans Image Process 25(11):5427–5440

    Article  MathSciNet  MATH  Google Scholar 

  11. Hitendra G, Krishna K, Manish G, Suneeta A (2014) Uniform selection of vertices for watermark embedding in 3-d polygon mesh using ieee754 floating point representation. In: International conference on communication systems and network technologies, pp 788–792

  12. Isenburg M, Gumholh S (2003) Out-of-core compression for gigantic polygon meshes. ACM Trans Graph 22(3):935–942. https://doi.org/10.1145/882262.882366

    Article  Google Scholar 

  13. Jen-Tse W, Yi-Ching C, Shyr-Shen Y, Chun-Yuan Y (2014) Hamming code based watermarking scheme for 3d model verification. In: International symposium on computer, consumer and control, pp 1095–1098

  14. Karthigaikumar P, Soumiya R (2011) Simulation of image encryption using aes algorithm. IJCA Special Issue on Computational Science - New Dimensions and Perspectives (4), 166–172

  15. Koubaa M, El’arbi M, Ben Amar C, Nicolas H (2012) Collusion, MPEG4 compression and frame dropping resistant video watermarking. Multimed Tools Appl 56(2):281–301. https://doi.org/10.1007/s11042-010-0626-8

    Article  Google Scholar 

  16. Lamiaa B, Saleh HI, Abdelhalim MB (2015) Enhanced watermarking scheme for 3d mesh models. In: International conference on information technology, pp 612–619

  17. Lu K, Rongrong J, Jinhui T, Yue G (2014) Learning-based bipartite graph matching for view-based 3d model retrieval. IEEE Trans Image Process 10(23):4553–4563

    Article  MathSciNet  MATH  Google Scholar 

  18. Mallat SG (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11(7):674–693. https://doi.org/10.1109/34.192463

    Article  MATH  Google Scholar 

  19. Ouled Zaid A, Hachani M, Puech W (2015) Wavelet-based high-capacity watermarking of 3-d irregular meshes. Multimed Tools Appl 74 (15):5897–5915. https://doi.org/10.1007/s11042-014-1896-3

    Article  Google Scholar 

  20. Othmani M, Bellil W, Ben Amar C, Alimi AM (2010) A new structure and training procedure for multi-mother wavelet networks. Int J Wavelets Multiresolution Inf Process 8(1):149–175. https://doi.org/10.1142/S0219691310003353

    Article  MathSciNet  MATH  Google Scholar 

  21. Pancholi VR, Patel BP (2016) Enhancement of cloud computing security with secure data storage using aes. Int J Innov Res Sci Technol 2(9):18–21

    Google Scholar 

  22. Parisot C, Antonini M (2001) Barlaud, m.: 3d scan based wavelet transform for video coding. In: IEEE 4th workshop on multimedia signal processing, pp 403–408

  23. Prerna M, Abhishek S (2013) A study of encryption algorithms aes, des and rsa for security. Global J Comput Sci Technol Netw Web Secur 13(15):15–22

  24. Roland H, Li X, Huimin Y, Baocang D (2014) Applying 3d polygonal mesh watermarking for transmission security protection through sensor networks. Math Probl Eng 2014(2014):27–40. https://doi.org/10.1155/2014/305960

    MathSciNet  MATH  Google Scholar 

  25. Rolland-Neviere X (2014) Robust 3d watermarking

  26. Sayahi I, Elkefi A, Ben Amar C (2006) A multi-resolution approach for blind watermarking of 3d meshes using scanning spiral method. In: International conference on computational intelligence in security for information systems, pp 526–537

  27. Sayahi I, Elkefi A, Koubaa M, Ben Amar C (2015) Robust watermarking algorithm for 3d multiresolution meshes. In: International conference on computer vision theory and applications, pp 150–157

  28. Sayahi I, Elkefi A, Ben Amar C (2016) Blind watermarking algorithm based on spiral scanning method and error correcting codes. Int J Multimed Tools Appl 76:1–24

  29. Sayahi I, Elkefi A, Ben Amar C (2016) Blind watermarking algorithm for 3d multiresolution meshes based on spiral scanning method. Int J Comput Sci Inf Secur 14(6):331–342

    Google Scholar 

  30. Sicheng Z, Hongxun Y, Yue G, Rongrong J, Guiguang D (2017) Continuous probability distribution prediction of image emotions via multitask shared sparse regression. IEEE Trans Multimed 19(3):632–645

    Article  Google Scholar 

  31. Sicheng Z, Lujun C, Hongxun Y, Yanhao Z, Xiaoshuai S (2015) Strategy for dynamic 3d depth data matching towards robust action retrieval. Neurocomputing 151(2):533–543

    Google Scholar 

  32. Sweldens W (1989) The lifting scheme: a construction of second generation wavelets. SIAM J Math Anal 29(2):511–546. https://doi.org/10.1137/S0036141095289051

    Article  MathSciNet  MATH  Google Scholar 

  33. Tamane SC, Deshmukh RR (2012) Blind 3d model watermarking based on multi-resolution representation and fuzzy logic. Int J Computer Sci Inf Technol 4(1):117–136. arXiv:1203.2485v1

    Google Scholar 

  34. Tariq S, Ayesha Q (2016) Encrypting grayscale images using s8 sboxes chosen by logistic map. Int J Comput Sci Inf Secur 14(4):440–444

    Google Scholar 

  35. Tsai YY (2015) An efficient 3d information hiding algorithm based on sampling concepts. Multimed Tools Appl 74(34):1–17. https://doi.org/10.1007/s11042-015-2707-1

    Google Scholar 

  36. Tsai YY (2016) A secret 3d model sharing scheme with reversible data hiding based on space subdivision. 3D Res 7(1):1–14. https://doi.org/10.1007/s13319-015-0078-z

  37. Umamageswari A, Suresh G (2014) Novel algorithm for secure medical image communication using roi based digital lossless watermarking and ds. Int J Appl Eng Res 9(22):12,163–12,176

    Google Scholar 

  38. Viterbi A (1971) Convolutional codes and their performance in communication systems. IEEE Transactions on Communication Technology 19(5):751–772

    Article  MathSciNet  Google Scholar 

  39. Wadi SM, Nasharuddin Z (2014) High definition image encryption algorithm based on aes modification. Wirel Pers Commun 79(2):811–829

    Article  Google Scholar 

  40. Wali A, Ben Aoun N, Karray H, Ben Amar C, Alimi AM (2010) A new system for event detection from video surveillance sequences. Proceedings of the 12th international conference on advanced concepts for intelligent vision systems, ACIVS 2010. Part I. Sydney, Australia, December 13–16, 2010. https://doi.org/10.1007/978-3-642-17691-3_11

  41. Xiangjiu C, Zhanheng G (2012) Watermarking algorithm for 3d mesh based on multi-scale radial basis functions. Int J Parallel Emerg Distrib Syst 27(2):133–141. https://doi.org/10.1080/17445760.2011.574631

    Article  Google Scholar 

  42. Xiao Z, Qing Z (2012) A dct-based dual watermarking algorithm for three-dimensional mesh models. In: International conference on consumer electronics, communications and networks, pp 1509–1513

  43. Ying Y, Ruggero P, Holly R, Ioannis I (2016) A 3d steganalytic algorithm and steganalysis-resistant watermarking. In: IEEE transactions on visualization and computer graphics

  44. Zhao S, Yao H, Zhang Y, Wang Y, Liu S (2015) View-based 3d object retrieval via multi-modal graph learning. Signal Process 112(C):110–118

    Article  Google Scholar 

  45. Zhiyong S, Weiqing L, Jianshou K, Yuewei D, Weiqing T (2013) Watermarking 3d capd models for topology verification. Computer-Aided Design 45(7):1042–1052. https://doi.org/10.1016/j.cad.2013.04.001

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ikbel Sayahi.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sayahi, I., Elkefi, A. & Amar, C.B. Crypto-watermarking system for safe transmission of 3D multiresolution meshes. Multimed Tools Appl 78, 13877–13903 (2019). https://doi.org/10.1007/s11042-018-6721-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6721-y

Keywords

Navigation