Results 1 -
9 of
9
A Comprehensive Survey on Three-Dimensional Mesh Watermarking
, 2008
"... Three-dimensional meshes have been used more and more in industrial, medical and entertainment applications during the last decade. Many researchers, from both the academic and the industrial sectors, have become aware of their intellectual property protection and authentication problems arising wit ..."
Abstract
-
Cited by 12 (6 self)
- Add to MetaCart
(Show Context)
Three-dimensional meshes have been used more and more in industrial, medical and entertainment applications during the last decade. Many researchers, from both the academic and the industrial sectors, have become aware of their intellectual property protection and authentication problems arising with their increasing use. This paper gives a comprehensive survey on 3D mesh watermarking, which is considered an effective solution to the above two emerging problems. Our survey covers an introduction to the relevant state of the art, an attack-centric investigation, and a list of existing problems and potential solutions. First, the particular difficulties encountered while applying watermarking on 3D meshes are discussed, followed by a presentation and an analysis of the existing algorithms, distinguishing them between fragile techniques and robust techniques. Since the attacks play an important role in the design of 3D mesh watermarking algorithms, we also provide an attack-centric viewpoint of this state of the art. Finally, some future working directions are pointed out especially on the ways of devising robust and blind algorithms and on some new probably promising watermarking feature spaces.
Perceptual metrics for static and dynamic triangle meshes
- EUROGRAPHICS
, 2012
"... Almost all mesh processing procedures cause some more or less visible changes in the appearance of objects represented by polygonal meshes. In many cases, such as mesh watermarking, simplification or lossy compression, the objective is to make the change in appearance negligible, or as small as poss ..."
Abstract
-
Cited by 9 (3 self)
- Add to MetaCart
Almost all mesh processing procedures cause some more or less visible changes in the appearance of objects represented by polygonal meshes. In many cases, such as mesh watermarking, simplification or lossy compression, the objective is to make the change in appearance negligible, or as small as possible, given some other constraints. Measuring the amount of distortion requires taking into account the final purpose of the data. In many applications, the final consumer of the data is a human observer, and therefore the perceptibility of the introduced appearance change by a human observer should be the criterion that is taken into account when designing and configuring the processing algorithms. In this review, we discuss the existing comparison metrics for static and dynamic (animated) triangle meshes. We describe the concepts used in perception-oriented metrics used for 2D image comparison, and we show how these concepts are employed in existing 3D mesh metrics. We describe the character of subjective data used for evaluation of mesh metrics and provide comparison results identifying the advantages and drawbacks of each method. Finally, we also discuss employing the perception-correlated metrics in perception-oriented mesh processing algorithms.
Hierarchical watermarking of semiregular meshes based on wavelet transform
- IEEE Trans. on Information Forensics and Security
, 2008
"... Abstract—This paper presents a hierarchical watermarking framework for semiregular meshes. Three blind watermarks are inserted in a semiregular mesh with different purposes: a geometrically robust watermark for copyright protection, a high-capacity watermark for carrying a large amount of auxiliary ..."
Abstract
-
Cited by 8 (3 self)
- Add to MetaCart
Abstract—This paper presents a hierarchical watermarking framework for semiregular meshes. Three blind watermarks are inserted in a semiregular mesh with different purposes: a geometrically robust watermark for copyright protection, a high-capacity watermark for carrying a large amount of auxiliary information, and a fragile watermark for content authentication. The proposed framework is based on wavelet transform of the semiregular mesh. More precisely, the three watermarks are inserted in different appropriate resolution levels obtained by wavelet decomposition of the mesh: the robust watermark is inserted by modifying the norms of the wavelet coefficient vectors associated with the lowest resolution level; the fragile watermark is embedded in the high resolution level obtained just after one wavelet decomposition by modifying the orientations and norms of the wavelet coefficient vectors; the high-capacity watermark is inserted in one or several intermediate levels by considering groups of wavelet coefficient vector norms as watermarking primitives. Experimental results demonstrate the effectiveness of the proposed framework: the robust watermark is able to resist all common geometric attacks even with a relatively strong amplitude; the fragile watermark is robust to content-preserving operations, while being sensitive to other attacks of which it can also provide the precise location; the payload of the high-capacity watermark increases rapidly along with the number of watermarking primitives. Index Terms—Authentication, copyright protection, hierarchical watermarking, high capacity, semiregular mesh.
BLIND AND ROBUST MESH WATERMARKING USING MANIFOLD HARMONICS
"... In this paper, we present a new blind and robust 3-D mesh watermarking scheme that makes use of the recently proposed manifold harmonics analysis. The mesh spectrum coefficient amplitudes obtained by using this analysis are quite robust against various attacks, including connectivity changes. A blin ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
(Show Context)
In this paper, we present a new blind and robust 3-D mesh watermarking scheme that makes use of the recently proposed manifold harmonics analysis. The mesh spectrum coefficient amplitudes obtained by using this analysis are quite robust against various attacks, including connectivity changes. A blind 16-bit watermark is embedded through an iterative scalar Costa quantization of the low frequency coefficient amplitudes. The imperceptibility of the watermark is ensured since the human visual system has been proved insensitive to the mesh low frequency components modification. The embedded watermark is experimentally robust against both geometry and connectivity attacks. Comparison results with two state-ofthe-art methods are provided. Index Terms — Mesh watermarking, blind, manifold harmonics 1.
REGION AWARE DCT DOMAIN INVISIBLE ROBUST BLIND WATERMARKING FOR COLOR IMAGES
, 2008
"... The multimedia revolution has made a strong impact on our society. The explosive growth of the Internet, the access to this digital information generates new opportunities and challenges. The ease of editing and duplication in digital domain created the concern of copyright protection for content pr ..."
Abstract
- Add to MetaCart
(Show Context)
The multimedia revolution has made a strong impact on our society. The explosive growth of the Internet, the access to this digital information generates new opportunities and challenges. The ease of editing and duplication in digital domain created the concern of copyright protection for content providers. Various schemes to embed secondary data in the digital media are investigated to preserve copyright and to discourage unauthorized duplication: where digital watermarking is a viable solution. This thesis proposes a novel invisible watermarking scheme: a discrete cosine transform (DCT) domain based watermark embedding and blind extraction algorithm for copyright protection of the color images. Testing of the proposed watermarking scheme’s robustness and security via different benchmarks proves its resilience to digital attacks. The detectors response, PSNR and RMSE results show that our algorithm has a better security performance than most of the existing algorithms.
based on Polygonal Representation
"... Multimedia has recently played an increasingly important role in various domains, including Web applications, movies, video game and medical visualization. The rapid growth of digital media data over the Internet, on the other hand, makes it easy for anyone to access, copy, edit and distribute digit ..."
Abstract
- Add to MetaCart
(Show Context)
Multimedia has recently played an increasingly important role in various domains, including Web applications, movies, video game and medical visualization. The rapid growth of digital media data over the Internet, on the other hand, makes it easy for anyone to access, copy, edit and distribute digital contents such as electronic documents, images, sounds and videos. Motivated by this, much research work has been dedicated to develop methods for digital data copyright protection, tracing the ownership, and preventing illegal duplication or tampering. This paper introduces a methodology of robust digital watermarking based on a wellknown spherical wavelet transformation, applied to 3D compressed model based on polygonal representation using a neural network. It will be demonstrated in this work that applying a watermarking algorithm on a compressed domain of a 3D object is more effective, efficient, and robust than when applied on a normal domain.
(Guest Editors) Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity
"... 3D computer graphics models and digitally-controlled manufacturing have come together to enable the design, visualization, simulation, and automated creation of complex 3D objects. In our work, we propose and implement a framework for designing computer graphics objects and digitally manufacturing t ..."
Abstract
- Add to MetaCart
3D computer graphics models and digitally-controlled manufacturing have come together to enable the design, visualization, simulation, and automated creation of complex 3D objects. In our work, we propose and implement a framework for designing computer graphics objects and digitally manufacturing them such that no adversary can make imitations or counterfeit copies of the physical object, even if the adversary has a large number of original copies of the object, knowledge of the original object design, and has manufacturing precision that is comparable to or superior to that of the legitimate creator of the object. Our approach is to design and embed a signature on the surface of the object which acts as a certificate of genuinity of the object. The signature is detectable by a signature-reading device, based on methods in computer graphics and computer vision, which contains some of the secret information that was used when marking the physical object. Further, the compromise of a signature-reading device by an adversary who is able to extract all its secrets, does not enable the adversary to create counterfeit objects that fool other readers, thereby still enabling reliable copy detection. We implemented a prototype of our scheme end-to-end, including the production of the physical object and the genuinity-testing device.
unknown title
"... models into the spherical coordinate systems for robustness [26, 31,42]. Compared with the spatial domain algorithms, the spectral domain algorithms are more robust and preserve the visual effect of the models better. It is because the inserted watermark bits are diluted in all the spatial parts of ..."
Abstract
- Add to MetaCart
(Show Context)
models into the spherical coordinate systems for robustness [26, 31,42]. Compared with the spatial domain algorithms, the spectral domain algorithms are more robust and preserve the visual effect of the models better. It is because the inserted watermark bits are diluted in all the spatial parts of the models. Some commonly used spectral analysis tools include Laplacian basis functions [22,25,28,38], radial basis functions [33] and multi-resolutions such as wavelet [9,26,32]. The drawbacks of the spectral domain algorithms are that they are complicated and computationally expensive compared to the spatial domain algorithms. In 3D fragile watermarking, Yeung and Yeo [10] slightly perturb the vertices such that a certain hash function of each vertex’s coordinates matches another hash function applied to the centroid of its neighboring vertices. Lin et al. [29] apply two different hash functions on the coordinates of vertices and perturb the vertices
MANUSCRIPT ACCEPTED BY THE IEEE TRANSACTIONS ON MULTIMEDIA 1 A Comprehensive Survey on Three-Dimensional Mesh Watermarking
"... Abstract—Three-dimensional meshes have been used more and more in industrial, medical and entertainment applications dur-ing the last decade. Many researchers, from both the academic and the industrial sectors, have become aware of their intellectual property protection and authentication problems a ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—Three-dimensional meshes have been used more and more in industrial, medical and entertainment applications dur-ing the last decade. Many researchers, from both the academic and the industrial sectors, have become aware of their intellectual property protection and authentication problems arising with their increasing use. This paper gives a comprehensive survey on 3D mesh watermarking, which is considered an effective solution to the above two emerging problems. Our survey covers an introduction to the relevant state of the art, an attack-centric investigation, and a list of existing problems and potential solutions. First, the particular difficulties encountered while applying watermarking on 3D meshes are discussed. Then we give a presentation and an analysis of the existing algorithms by distinguishing them between fragile techniques and robust techniques. Since attacks play an important role in the design of 3D mesh watermarking algorithms, we also provide an attack-centric viewpoint of this state of the art. Finally, some future working directions are pointed out especially on the ways of devising robust and blind algorithms and on some new probably promising watermarking feature spaces. Index Terms—3D mesh, digital watermarking, copyright pro-tection, authentication, attack, robustness.