Public Authentication of 3D Mesh Models
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
A numerically stable fragile watermarking scheme for authenticating 3D models
Computer-Aided Design
Technical Section: Robust watermarking motion data with DL-STDM
Computers and Graphics
A public fragile watermarking scheme for 3D model authentication
Computer-Aided Design
Affine-transformation-invariant public fragile watermarking for 3D model authentication
IEEE Computer Graphics and Applications - Special issue title on demystifying visual analytics impaired driving in virtual spaces
A high-capacity data hiding method for polygonal meshes
IH'06 Proceedings of the 8th international conference on Information hiding
Three-dimensional meshes watermarking: review and attack-centric investigation
IH'07 Proceedings of the 9th international conference on Information hiding
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
An adaptive steganographic algorithm for 3D polygonal models using vertex decimation
Multimedia Tools and Applications
Hi-index | 0.00 |
Designing a powerful fragile watermarking technique for authenticating three-dimensional (3-D) polygonal meshes is a very difficult task. Yeo and Yeung were first to propose a fragile watermarking method to perform authentication of 3-D polygonal meshes. Although their method can authenticate the integrity of 3-D polygonal meshes, it cannot be used for localization of changes. In addition, it is unable to distinguish malicious attacks from incidental data processings. In this paper, we trade off the causality problem in Yeo and Yeung's method for a new fragile watermarking scheme. The proposed scheme can not only achieve localization of malicious modifications in visual inspection, but also is immune to certain incidental data processings (such as quantization of vertex coordinates and vertex reordering). During the process of watermark embedding, a local mesh parameterization approach is employed to perturb the coordinates of invalid vertices while cautiously maintaining the visual appearance of the original model. Since the proposed embedding method is independent of the order of vertices, the hidden watermark is immune to some attacks, such as vertex reordering. In addition, the proposed method can be used to perform region-based tampering detection. The experimental results have shown that the proposed fragile watermarking scheme is indeed powerful.