skip to main content
10.1145/1854229.1854255acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

A highly adaptable capacity and invisibility 3D watermarking based on four-points sets

Published:09 September 2010Publication History

ABSTRACT

In this paper, we propose a fine tuneable capacity and invisibility novel blind watermarking method for 3D models with arbitrary topology in spatial domain. Our atermarking approach is based on a novel four-points sets construction and selection scheme to embed watermark in the vertices of the 3D models. Experimental results show that the capacity and invisibility of the watermarked models can be monotonically adjusted. To the best of our knowledge, our novel method can provide much better watermark visibility than other state-of-the-art watermarking method, while maintain large capacity and strong robustness against various typical attacks including cropping, RST transformations and local attacks. The low computational complexity of both the embedding and the extraction processes makes it suitable for copyright protection of 3D models.

References

  1. P. Agarwal and B. Prabhakaran. Robust blind watermarking of point sampled geometry. In Proc. of the 9th Workshop on Multimedia & Security., Sep. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. O. Benedens. Geometry-based watermarking of 3d models. IEEE Computer Graphics and Applications, special issue on image security, 19(1):45--46, Jan./Feb. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. O. Benedens and C. Busch. Towards blind detection of robust watermarks in polygonal models. In Proc. Eurographics'00, pages C199--C208, Aug. 2000.Google ScholarGoogle ScholarCross RefCross Ref
  4. F. Cayre, O. Deviller, F. Schmitt, and H. Maître. Watermarking 3d triangle meshed for authentication and integrity. Inria researchreport rr-5223, June 2004.Google ScholarGoogle Scholar
  5. F. Cayre, P. Rondao-Alface, F. Schmitt, B. Macqb, and H. Matîre. Application of spectral decomposition to compression and watermarking of 3d triangle mesh geometry. Signal Processing, 8(4):309--319, 2003.Google ScholarGoogle Scholar
  6. S. C. Cheng and T. L. Wu. Subpixel edge detection of color images by principal axis analysis and moment-preserving principle. Pattern Recognition, 38(4):527--537, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. W. Cho, R. Prost, and H. Y. Jung. An oblivious watermarking for 3d polygonal meshes using distribution of vertex norms. IEEE Trans. Signal Processing, 55(1):142--155, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. M. Chou and D. C. Tseng. A public fragile watermarking scheme for 3d model authentication. Computer-Aided Design, 38(11):1154--1165, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. M. Chou and D. C. Tseng. Affine-transformation-invariant public fragile watermarking for 3d model authentication. IEEE Computer Graphics and Applications, 29:72--79, Mar./Apr. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. I. Guskov, W. Sweldens, and P. Schröder. Multiresolution signal processing for meshes. In Proc. ACM SIGGRAPH'99, pages 325--334, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H. Hoppe. Progressive mesh. In Proc. ACM SIGGRAPH'96, pages 99--108, Aug. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Kanai, H. Date, and T. Kishinami. Digital watermarking for 3d polygons using multiresolution wavelet decomposition. In Proc. Sixth IFIP WG 5.2 Int'l Workshop Geometric Modeling, pages 296--307, 1998.Google ScholarGoogle Scholar
  13. C. T. Kuo, S. C. Cheng, D. C. Wu, and C. C. Chang. A blind robust watermarking scheme for 3d triangular mesh models using 3d edge vertex detection. Asian Journal of Health and Information Sciences, 4(1):36--63, 2009.Google ScholarGoogle Scholar
  14. S. K. Lee and Y. S. Ho. A fragile watermarking scheme for three-dimensional polygonal models using triangle strips. IEICE Trans. Comm., 87(9):2811--2815, 2004.Google ScholarGoogle Scholar
  15. L. Li, D. Zhang, Z. G. Pan, J. Shi, K. Zhou, and K. Ye. Watermarking 3d mesh by spherical parameterization. Computers & Graphics, 28(6):981--989, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Ohbuchi, H. Masuda, and M. Aono. Watermarking three-dimensional polygonal models. In Proc. Fifth ACM Int’l Conf. Multimedia (Multimedia'97), pages 261--272, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Ohbuchi, H. Masuda, and M. Aono. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Selected Areas in Comm., 16(4):551--560, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Ohbuchi, A. Mukaiyama, and S. Takahashi. A frequency-domain approach to watermarking 3d shapes. In Proc. Eurographics'02, pages 373--382, 2002.Google ScholarGoogle Scholar
  19. E. Praun, H. Hoppe, and A. Finkelstein. Robust mesh watermarking. In Proc. ACM SIGGRAPH’99, pages 325--334, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. K. Wang, G. Lavou, F. Denis, and A. Baskurt. A comprehensive surevy on three dimensional mesh watermarking. IEEE Trans. Multimedia, 10(8):309--319, Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Y. P. Wang and S. M. Hu. A new watermarking mehthod for 3d models based on integral invariants. IEEE Trans. Visualization and Computer Graphics, 15(2):285--294, Mar./Apr. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. K. K. Yin, Z. G. Pan, J. Y. Shi, and D. Zhang. Robust mesh watermarking based on multiresolution processing. Computers & Graphics, 25(3):409--420, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  23. S. Zafeiriou, A. Tefas, and I. Pitas. Blind robust watermarking schemes for copyright protection of 3d mesh objects. IEEE Trans. Visualization and Computer Graphics, 11(5):596--607, Sep./Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A highly adaptable capacity and invisibility 3D watermarking based on four-points sets

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and security
          September 2010
          264 pages
          ISBN:9781450302869
          DOI:10.1145/1854229

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 September 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate128of318submissions,40%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader