SIGGRAPH '93 Proceedings of the 20th annual conference on Computer graphics and interactive techniques
Watermarking 3D Objects for Verification
IEEE Computer Graphics and Applications
Data hiding on 3-D triangle meshes
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
Public Authentication of 3D Mesh Models
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Probabilistic fingerprints for shapes
SGP '06 Proceedings of the fourth Eurographics symposium on Geometry processing
Progressive compression invariant semi-fragile watermarks for 3d meshes
Proceedings of the 9th workshop on Multimedia & security
A numerically stable fragile watermarking scheme for authenticating 3D models
Computer-Aided Design
Technical Section: Robust watermarking motion data with DL-STDM
Computers and Graphics
Tamper proofing mechanisms for motion capture data
Proceedings of the 10th ACM workshop on Multimedia and security
A public fragile watermarking scheme for 3D model authentication
Computer-Aided Design
Affine-transformation-invariant public fragile watermarking for 3D model authentication
IEEE Computer Graphics and Applications - Special issue title on demystifying visual analytics impaired driving in virtual spaces
A high-capacity data hiding method for polygonal meshes
IH'06 Proceedings of the 8th international conference on Information hiding
Three-dimensional meshes watermarking: review and attack-centric investigation
IH'07 Proceedings of the 9th international conference on Information hiding
Tamper proofing 3d motion data streams
MMM'07 Proceedings of the 13th international conference on Multimedia Modeling - Volume Part I
Hi-index | 0.00 |
In this paper, we propose a new fragile watermarking scheme for 3D meshes. Firstly, the watermark information is adaptively embedded into the mesh geometry by slightly adjusting the vertex positions while the mesh topology is unchanged. The embedded watermark can be blindly retrieved with some priori knowledge and used to authenticate the integrity of the watermarked mesh. Compared with previous methods, our proposed one has the following advantages: (1) the embedded watermark is invariant to translation, rotation and uniformly scaling, but sensitive to other operations; (2) enhanced with a reference position, any processing made to the watermarked mesh can be detected; (3) the embedding strength is adjustable so that a trivial tampering with the watermarked mesh model may lead the embedded watermark to change. As a result, unauthorized modifications of the mesh model can be detected and classified.