Watermarking of uncompressed and compressed video
Signal Processing
Robust audio watermarking using perceptual masking
Signal Processing
Proceedings of the 26th annual conference on Computer graphics and interactive techniques
Watermarking 3D Objects for Verification
IEEE Computer Graphics and Applications
Geometry-Based Watermarking of 3D Models
IEEE Computer Graphics and Applications
Authentication of volume data using wavelet-based foveation
Proceedings of the sixth Eurographics workshop on Multimedia 2001
Watermarking 3D polygonal meshes in the mesh spectral domain
GRIN'01 No description on Graphics interface 2001
Robust Watermarking of Polygonal Meshes
GMP '00 Proceedings of the Geometric Modeling and Processing 2000
A fragile watermarking scheme for 3D meshes
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Blind Robust Watermarking Schemes for Copyright Protection of 3D Mesh Objects
IEEE Transactions on Visualization and Computer Graphics
A watermarking for 3D mesh using the patch CEGIs
Digital Signal Processing
Technical Section: Subdivision surface watermarking
Computers and Graphics
An adaptive steganographic algorithm for 3D polygonal meshes
The Visual Computer: International Journal of Computer Graphics
A public fragile watermarking scheme for 3D model authentication
Computer-Aided Design
Watermarking for 3d CAD drawings based on three components
SSPR'06/SPR'06 Proceedings of the 2006 joint IAPR international conference on Structural, Syntactic, and Statistical Pattern Recognition
Watermarking technique for authentication of 3-d polygonal meshes
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Robust watermarking on polygonal meshes using distribution of vertex norms
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Data hiding on 3-D triangle meshes
IEEE Transactions on Signal Processing
An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms
IEEE Transactions on Signal Processing
A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT
IEEE Transactions on Signal Processing
Fragile watermarking for authenticating 3-D polygonal meshes
IEEE Transactions on Multimedia
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Watermarking three-dimensional polygonal models through geometric and topological modifications
IEEE Journal on Selected Areas in Communications
Watermarking mesh-based representations of 3-D objects using local moments
IEEE Transactions on Image Processing
A New Approach to Image Copy Detection Based on Extended Feature Sets
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
A Sequential Quantization Strategy for Data Embedding and Integrity Verification
IEEE Transactions on Circuits and Systems for Video Technology
CAD drawing watermarking scheme
Digital Signal Processing
Lossless visible three-dimensional watermark of digital elevation model data
Transactions on Edutainment VIII
Genetic swarm based robust image watermarking
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Robust and blind watermarking scheme for three dimensional anaglyph images
Computers and Electrical Engineering
Hi-index | 0.00 |
This paper analyzes the numerically instable problem in the current 3D fragile watermarking schemes. Some existing fragile watermarking schemes apply the floating-point arithmetic to embed the watermarks. However, these schemes fail to work properly due to the numerically instable problem, which is common in the floating-point arithmetic. This paper proposes a numerically stable fragile watermarking scheme. The scheme views the mantissa part of the floating-point number as an unsigned integer and operates on it by the bit XOR operator. Since there is no numerical problem in the bit operation, this scheme is numerically stable. The scheme can control the watermark strength through changing the embedding parameters. This paper further discusses selecting appropriate embedding parameters to achieve good performance in terms of the perceptual invisibility and the ability to detect unauthorized attacks on the 3D models. The experimental results show that the proposed public scheme could detect attacks such as adding noise, adding/deleting faces, inserting/removing vertices, etc. The comparisons with the existing fragile schemes show that this scheme is easier to implement and use.