The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2009 vol.15)
pp: 285--294
Yu-Ping Wang , Tsinghua University, Beijing
Shi-Min Hu , Tsinghua University, Beijing
In this paper, we propose a new semi-fragile watermarking algorithm for the authentication of 3D models based on integral invariants. A watermark image is embedded by modifying the integral invariants of some of the vertices. In order to modify the integral invariants, the positions of a vertex and its neighbors are shifted. To extract the watermark, all the vertices are tested for the embedded information, and this information is combined to recover the watermark image. The number of parts of the watermark image that can be recovered will determine the authentication decision. Experimental tests show that this method is robust against normal use modifications introduced by rigid transformations, format conversions, rounding errors, etc., and can be used to test for malicious attacks such as mesh editing and cropping. An additional contribution of this paper is a new algorithm for computing two kinds of integral invariants.
Applications, Computational Geometry and Object Modeling, Model Validation and Analysis
Yu-Ping Wang, Shi-Min Hu, "A New Watermarking Method for 3D Models Based on Integral Invariants", IEEE Transactions on Visualization & Computer Graphics, vol.15, no. 2, pp. 285--294, March/April 2009, doi:10.1109/TVCG.2008.101
[1] S. Manay, B.W. Hong, A.J. Yezzi, and S. Soatto, “Integral Invariant Signatures,” Proc. Eighth European Conf. Computer Vision (ECCV '04), pp. 87-99, 2004.
[2] H. Pottmann, Q.X. Huang, Y.L. Yang, and S. Kölpl, “Integral Invariants for Robust Geometry Processing,” technical report, Geometry Preprint Series, Vienna Univ. of Tech nology, 2005.
[3] R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking Three-Dimensional Polygonal Models,” Proc. Fifth ACM Int'l Conf. Multimedia (Multimedia '97), pp. 261-272, 1997.
[4] R. Ohbuchi, H. Masuda, and M. Aono, “Embedding Data in 3D Models,” Proc. Fourth Int'l Workshop Interactive Distributed Multimedia Systems and Telecomm. Services (IDMS '97), pp. 1-10, 1997.
[5] R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking Three-Dimensional Polygonal Models through Geometric and Topological Modifications,” IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 551-560, 1998.
[6] R. Ohbuchi, H. Masuda, and M. Aono, “Data Embedding Algorithms for Geometrical and on Geometrical Targets in Three-Dimensional Polygonal Models,” Computer Comm., vol. 21, no. 15, pp. 1344-1354, 1998.
[7] O. Benedens and C. Busch, “Towards Blind Detection of Robust Watermarks in Polygonal Models,” Proc. Eurographics '00, pp.C199-C208, 2000.
[8] O. Benedens, “Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models,” Proc. Third Int'l Workshop Information Security (ISW '00), pp. 15-29, 2000.
[9] S. Kanai, H. Date, and T. Kishinami, “Digital Watermarking for 3D Polygons Using Multiresolution Wavelet Decomposition,” Proc. Sixth IFIP WG 5.2 Int'l Workshop Geometric Modeling, pp.296-307, 1998.
[10] F. Uccheddu, M. Corsini, and M. Barni, “Wavelet-Based Blind Watermarking of 3D Models,” Proc. ACM Multimedia and Security Workshop, pp. 143-154, 2004.
[11] R. Ohbuchi, A. Mukaiyama, and S. Takahashi, “A Frequency-Domain Approach to Watermarking 3D Shapes,” Proc. Eurographics'02, pp. 373-382, 2002.
[12] F. Cayre, P. Rondao-Alface, F. Schmitt, B. Macqb, and H. Maître, “Application of Spectral Decomposition to Compression and Watermarking of 3D Triangle Mesh Geometry,” Signal Processing, vol. 8, no. 4, pp. 309-319, 2003.
[13] F. Cayre, O. Deviller, F. Schmitt, and H. Maître, Watermarking 3D Triangle Meshed for Authentication and Integrity, INRIA Research Report RR-5223, June 2004.
[14] E. Praun, H. Hoppe, and A. Finkelstein, “Robust Mesh Watermarking,” Proc. ACM SIGGRAPH '99, pp. 325-334, 1999.
[15] K.K. Yin, Z.G. Pan, J.Y. Shi, and D. Zhang, “Robust Mesh Watermarking Based on Multiresolution Processing,” Computers & Graphics, vol. 25, no. 3, pp. 409-420, 2001.
[16] L. Li, D. Zhang, Z.G. Pan, J.Y. Shi, K. Zhou, and K. Ye, “Watermarking 3D Mesh by Spherical Parameterization,” Computers & Graphics, vol. 28, no. 6, pp. 981-989, 2004.
[17] J.H. Wu and L. Kobbelt, “Efficient Spectral Watermarking of Large Meshes with Orthogonal Basis Functions,” Visual Computer, vol. 21, nos. 8-10, pp. 848-857, 2005.
[18] J.W. Cho, R. Prost, and H.Y. Jung, “An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms,” IEEE Trans. Signal Processing, vol. 55, no. 1, pp. 142-155, 2007.
[19] S.K. Lee and Y.S. Ho, “A Fragile Watermarking Scheme for Three-Dimensional Polygonal Models Using Triangle Strips,” IEICE Trans. Comm., vol. 87, no. 9, pp. 2811-2815, 2004.
[20] C.M. Chou and D.C. Tseng, “A Public Fragile Watermarking Scheme for 3D Model Authentication,” Computer-Aided Design, vol. 38, no. 11, pp. 1154-1165, 2006.
[21] D. Zou, Y.Q. Shi, Z. Ni, and W. Su, “A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform,” IEEE Trans. Circuits and Systems for Video Technology, vol. 16, no. 10, pp. 1294-1300, 2006.
[22] Y.L. Yang, Y.K. Lai, S.M. Hu, and H. Pottmann, “Robust Principal Curvatures on Multiple Scales,” Proc. Fourth Eurographics Symp. Geometry Processing (SGP '06), pp. 223-226, 2006.
[23] H. Pottmann, Q.X. Huang, Y.L. Yang, and S.M. Hu, “Geometry and Convergence Analysis of Algorithms for Registration of 3D Shapes,” Int'l J. Computer Vision, vol. 67, no. 3, pp. 277-296, 2006.
[24] Y.K. Lai, Q.Y. Zhou, S.M. Hu, J. Wallner, and H. Pottmann, “Robust Feature Classification and Editing,” IEEE Trans. Visualization and Computer Graphics, vol. 13, pp. 34-45, 2007.
[25] W. Ding, W.Q. Yan, and D.X. Qi, “Digital Image Scrambling Technology Based on Arnold Transformation,” J. Computer-Aided Design and Computer Graphics, vol. 13, no. 4, pp. 338-341, 2001.
[26] P. Cignoni, C. Rocchini, and R. Scopigno, “Metro: Measuring Error on Simplified Surfaces,” Computer Graphics Forum, vol. 17, no. 2, pp. 167-174, 1998.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool