The NURBS book
Watermaking three-dimensional polygonal models
MULTIMEDIA '97 Proceedings of the fifth ACM international conference on Multimedia
Proceedings of the 26th annual conference on Computer graphics and interactive techniques
Geometry-Based Watermarking of 3D Models
IEEE Computer Graphics and Applications
8. Managing CAD Data as a Multimedia Data Type Using Digital Watermarking
Proceedings of the IFIP TC5 WG5.2 Fourth Workshop on Knowledge Intensive CAD to Knowledge Intensive Engineering
Sign Correlation Detector for Blind Image Watermarking in the DCT Domain
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces
CGI '99 Proceedings of the International Conference on Computer Graphics
Watermarking algorithms for 3D NURBS graphic data
EURASIP Journal on Applied Signal Processing
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Multiple 3D Medical Data Watermarking for Healthcare Data Management
Journal of Medical Systems
Blind watermarking of NURBS curves and surfaces
Computer-Aided Design
Hi-index | 0.00 |
The popularity of the worldwide web and the easy availability of the digital content has brought the security issues to the forefront. NURBS is widely used in computer-aided geometry design and computer graphics for its strong representative properties. In this paper, we present a blind watermarking algorithm for NURBS surfaces. First the points sampled from the NURBS surface are watermarked in DCT domain, then the watermarked NURBS surface is obtained by fitting the watermarked points iteratively. In watermark detection stage, the sign correlation detector is used, which is a blind detector and accordingly the original NURBS surface is not required for detection. The experimental results show that the algorithm preserves the shape of the NURBS surface. The proposed algorithm is robust against attacks such as knot insertion, knot removal, reparameterization, order elevation, order reduction, additive white Gaussian noise, rotation, translation, scaling, multi-watermark attacks, etc.