skip to main content
research-article

A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models

Published: 20 September 2012 Publication History

Abstract

In this article we propose a novel, robust, and high-capacity watermarking method for 3D meshes with arbitrary connectivities in the spatial domain based on affine invariants. Given a 3D mesh model, a watermark is embedded as affine-invariant length ratios of one diagonal segment to the residing diagonal intersected by the other one in a coplanar convex quadrilateral. In the extraction process, a watermark is recovered by combining all the watermark pieces embedded in length ratios through majority voting. Extensive experimental results demonstrate the robustness, high computational efficiency, high capacity, and affine-transformation-invariant characteristics of the proposed approach.

References

[1]
Agarwal, P. and Prabhakaran, B. 2007. Robust blind watermarking mechanism for point sampled geometry. In Proceedings of the 9th Workshop on Multimedia & Security. 175--186.
[2]
Aiger, D., Mitra, N. J., and Cohen-Or, D. 2008. 4-points congruent sets for robust surface registration. In Proceedings of the Siggraph '08 Conference.
[3]
Au, O. K.-C., Tai, C.-L., Liu, L., and Fu, H. 2006. Dual laplacian editing for meshes. IEEE Trans. Visu. Comput. Graph. 12, 3, 386--395.
[4]
Benedens, O. 2000. Affine invariant watermarks for 3D polygonal and nurbs based models. In Proceedings of the 3rd International Workshop on Information Security (ISW'00). Springer, 15--29.
[5]
Benedens, O. and Busch, C. 2000. Towards blind detection of robust watermarks in polygonal models. Comput. Graph. Forum 19, 3, C199--C208.
[6]
Bogomjakov, A., Gotsman, C., and Isenburg, M. 2008. Distortion-Free steganography for polygonal meshes. Comput. Graph. Forum 27, 2, 637--642.
[7]
Cayre, F., Devillers, O., Schmitt, F., and Maître, H. 2004. Watermarking 3D triangle meshed for authentication and integrity. Res. rep. RR-5223 INRIA.
[8]
Cayre, F., Rondao-Alface, P., Schmitt, F., Macq, B., and Matîre, H. 2003. Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry. Signal Process. Image Commun. 18, 4, 309--319.
[9]
Chao, M.-W., Lin, C.-H., Yu, C.-W., and Lee, T.-Y. 2009. A high capacity 3D steganography algorithm. IEEE Trans. Visu. Comput. Graph. 15, 2, 274--284.
[10]
Cheng, S.-C. and Wu, T.-L. 2005. Subpixel edge detection of color images by principal axis analysis and moment-preserving principle. Pattern Recogn. 38, 4, 527--537.
[11]
Cho, J.-W., Prost, R., and Jung, H.-Y. 2007. An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Trans. Signal Process. 55, 1, 142--155.
[12]
Cignoni, P., Rocchini, C., and Scopigno, R. 1998. Metro: Measuring error on simplified surfaces. Comput. Graph. Forum 17, 2, 167--174.
[13]
Cox, I. J., Kilian, J., Leighton, F. T., and Shamoon, T. 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 12, 1673--1687.
[14]
Efimov, N. V. 1980. Higher Geometry. Mir Publishers, Moscow.
[15]
Gao, X., Zhang, C., Wei, Y., and Li, W. 2010. A highly adaptable capacity and invisibility 3D watermarking based on four-points sets. In Proceedings of the 12th Workshop on Multimedia & Security. 137--146.
[16]
Garland, M. and Heckbert, P. S. 1997. Surface simplification using quadric error metrics. In Proceedings of the ACM SIGGRAPH Conference on Computer Graphics. 209--216.
[17]
Guskov, I., Sweldens, W., and Schröder, P. 1999. Multiresolution signal processing for meshes. In Proceedings of the ACM SIGGRAPH '99 Conference. 325--334.
[18]
Hoppe, H. 1996. Progressive mesh. In Proceedings of the ACM SIGGRAPH'96 Conference. 99--108.
[19]
Huttenlocher, D. P. 1991. Fast affine point matching: An output-sensitive method. In Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition (CVPR'91). 263--268.
[20]
Kalivas, A., Tefas, A., and loannis Pitas. 2003. Watermarking of 3D models using principal component analysis. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. Vol. 5, 676--679.
[21]
Konstantinides, J. M., Mademlis, A., Daras, P., Mitkas, P. A., and Strintzis, M. G. 2009. Blind robust 3-D mesh watermarking based on oblate spheroidal harmonics. IEEE Trans. Multimedia 11, 1, 23--38.
[22]
Kuo, C.-T., Cheng, S.-C., Wu, D.-C., and Chang, C.-C. 2009. A blind robust watermarking scheme for 3D triangular mesh models using 3d edge vertex detection. Asian J. Health Inf. Sci. 4, 1, 36--63.
[23]
Lee, S.-H. and Kwon, K.-R. 2007. A watermarking for 3D mesh using the patch cegis. Digital Signal Process. Rev. J. 17, 2, 396--413.
[24]
Li, L., Zhang, D., Pan, Z., Shi, J., Zhou, K., and Ye, K. 2004. Watermarking 3D mesh by spherical parameterization. Comput. Graph. 28, 6, 981--989.
[25]
Lin, C.-H., Min-Wen-Chao, Liang, C.-Y., and Lee, T.-Y. 2010. A novel semi-blind-and-semi-reversible robust watermarking scheme for 3D polygonal models. Vis. Comput. 1--11.
[26]
Liu, Y., Prabhakaran, B., and Guo, X. 2008. A robust spectral approach for blind watermarking of manifold surfaces. In Proceedings of the 10th ACM Workshop on Multimedia and Security. 43--52.
[27]
Luo, M. and Bors, A. G. 2008. Principal component analysis of spectral coefficients for mesh watermarking. In Proceedings of the International Conference on Image Processing. 441--444.
[28]
Ohbuchi, R., Masuda, H., and Aono, M. 1997. Watermarking three-dimensional polygonal models. In Proceedings of the 5th ACM International Conference on Multimedia (Multimedia '97). 261--272.
[29]
Ohbuchi, R., Masuda, H., and Aono, M. 1998. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Select. Areas Comm. 16, 4, 551--560.
[30]
Ohbuchi, R., Mukaiyama, A., and Takahashi, S. 2002. A frequency-domain approach to watermarking 3D shapes. Comput. Graph. Forum 21, 3, 373--382.
[31]
Perez-Freire, L., Comesana, P., Troncoso-Pastoriza, J. R., and Perez-Gonzalez, F. 2006. Watermarking security: A survey. In Transactions on Data Hiding and Multimedia Security. Lecture Notes in Computer Science. Springer.
[32]
Praun, E., Hoppe, H., and Finkelstein, A. 1999. Robust mesh watermarking. In Proceedings of the ACM SIGGRAPH '99 Conference. 325--334.
[33]
Taubin, G. 1995. A signal processing approach to fair surface design. In Proceedings Siggraph '95. 351--358.
[34]
Uccheddu, F. C.-C. J. K. and Barni, M. 2008. Anticollusion watermarking of 3d meshes by prewarping. In Proc. SPIE 6819, 68190S.
[35]
Wagner, M. G. 2000. Robust watermarking of polygonal meshes. In Proceedings of the Geometric Modeling and Processing (GMP '00). IEEE Computer Society, Los Alamitos, CA, 201--.
[36]
Wang, K., Lavoué, G., Denis, F., and Baskurt, A. 2008a. A comprehensive surevy on three dimensional mesh watermarking. IEEE Trans. Multimedia 10, 8, 1513--1527.
[37]
Wang, K., Lavoué, G., Denis, F., and Baskurt, A. 2008b. Hierarchical watermarking of semiregular meshes based on wavelet transform. IEEE Trans. Inf. Forensics Secur. 3, 4, 620--634.
[38]
Wang, K., Lavoue, G., Denis, F., and Baskurt, A. 2011. Robust and blind mesh watermarking based on volume moments. Comput. Graph. 35, 1, 1--19.
[39]
Wang, K., Luo, M., Bors, A. G., and Denis, F. 2009. Blind and robust mesh watermarking using manifold harmonics. In Proceedings of the IEEE International Conference on Image Processing. 3657--3660.
[40]
Wang, Y.-P. and Hu, S.-M. 2009. A new watermarking mehthod for 3D models based on integral invariants. IEEE Trans. Visu. Comput. Grap. 15, 2, 285--294.
[41]
Yin, K., Pan, Z., Shi, J., and Zhang, D. 2001. Robust mesh watermarking based on multiresolution processing. Comput. Graph. 25, 3, 409--420.
[42]
Yu, Z., Ip, H. H. S., and Kwok, L. F. 2003. A robust watermarking scheme for 3D triangular mesh models. Pattern Recogn. 36, 11, 2603--2614.
[43]
Zafeiriou, S., Tefas, A., and loannis Pitas. 2005. Blind robust watermarking schemes for copyright protection of 3D mesh objects. IEEE Trans. Visu. Comput. Graph. 11, 5, 596--607.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 8, Issue 2S
Special Issue on Multimedia Security
September 2012
121 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/2344436
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2012
Accepted: 01 January 2012
Revised: 01 November 2011
Received: 01 August 2011
Published in TOMM Volume 8, Issue 2S

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 3D model authentication
  2. 3D model watermarking
  3. affine transformation invariant
  4. copyright protection
  5. high capacity

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2019)A Review on Anaglyph 3D Image and Video Watermarking3D Research10.1007/s13319-019-0223-110:2(1-12)Online publication date: 1-Jun-2019
  • (2018)Robust watermarking of airborne LiDAR dataMultimedia Tools and Applications10.5555/3287850.328790677:21(29077-29097)Online publication date: 1-Nov-2018
  • (2018)A Watermarking Method for 3D Models Based on Feature Vertex LocalizationIEEE Access10.1109/ACCESS.2018.28727836(56122-56134)Online publication date: 2018
  • (2017)3D model watermarking algorithm robust to geometric attacksIET Image Processing10.1049/iet-ipr.2016.092711:10(822-832)Online publication date: 14-Sep-2017
  • (2017)High capacity data hiding for 3D point clouds based on Static Arithmetic CodingMultimedia Tools and Applications10.1007/s11042-016-4163-y76:24(26421-26445)Online publication date: 1-Dec-2017
  • (2015)Highcapacity data-hiding for 3D meshes based on static arithmetic coding2015 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP.2015.7351673(4575-4579)Online publication date: Sep-2015
  • (2015)Topology authentication for piping isometric drawingsComputer-Aided Design10.1016/j.cad.2015.04.00566:C(33-44)Online publication date: 1-Sep-2015
  • (2014)Cryptanalysis aspects in 3-D watermarking2014 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP.2014.7025967(4772-4776)Online publication date: Oct-2014
  • (2014)An accurate vehicle counting approach based on block background modeling and updating2014 7th International Congress on Image and Signal Processing10.1109/CISP.2014.7003742(16-21)Online publication date: Oct-2014
  • (2014)Authenticating topological integrity of process plant models through digital watermarkingMultimedia Tools and Applications10.1007/s11042-013-1677-473:3(1687-1707)Online publication date: 1-Dec-2014

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media