Reference Hub3
A Blind 3D Watermarking Approach for 3D Mesh Using Clustering Based Methods

A Blind 3D Watermarking Approach for 3D Mesh Using Clustering Based Methods

Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi
Copyright: © 2013 |Volume: 3 |Issue: 2 |Pages: 11
ISSN: 2155-6997|EISSN: 2155-6989|EISBN13: 9781466632462|DOI: 10.4018/ijcvip.2013040104
Cite Article Cite Article

MLA

Soliman, Mona M., et al. "A Blind 3D Watermarking Approach for 3D Mesh Using Clustering Based Methods." IJCVIP vol.3, no.2 2013: pp.43-53. http://doi.org/10.4018/ijcvip.2013040104

APA

Soliman, M. M., Hassanien, A. E., & Onsi, H. M. (2013). A Blind 3D Watermarking Approach for 3D Mesh Using Clustering Based Methods. International Journal of Computer Vision and Image Processing (IJCVIP), 3(2), 43-53. http://doi.org/10.4018/ijcvip.2013040104

Chicago

Soliman, Mona M., Aboul Ella Hassanien, and Hoda M. Onsi. "A Blind 3D Watermarking Approach for 3D Mesh Using Clustering Based Methods," International Journal of Computer Vision and Image Processing (IJCVIP) 3, no.2: 43-53. http://doi.org/10.4018/ijcvip.2013040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Blind and robust watermarking of 3D mesh aims to embed message into a 3D mesh model such that the mesh is not visually distorted from the original model. An essential condition is that the message should be securely extracted even after the mesh model was processed. This paper explores use of artificial intelligence techniques to build blind and robust 3D-watermarking approach. It is based on clustering 3D vertices into appropriate or inappropriate candidates for watermark insertion using K-means clustering and Self Organization Map (SOM) clustering algorithms. The watermark insertion were performed only on set of selected vertices come out from clustering technique. These vertices are used as candidates for watermark carriers that will hold watermark bits stream. Through the simulations, the authors prove that the proposed approach is robust against various kinds of geometrical attacks such as mesh smoothing, noise addition and mesh cropping.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.