Polygonal mesh watermarking using Laplacian coordinates

Size: px
Start display at page:

Download "Polygonal mesh watermarking using Laplacian coordinates"

Transcription

1 Eurographics Symposium on Geometry Processing 1 Olga Sorkine and Bruno Lévy (Guest Editors) Volume 9 (1), Number 5 Polygonal mesh watermarking using Laplacian coordinates Y. Yang and I. Ivrissimtzis School of Engineering and Computing Sciences, Durham University, UK Abstract We propose a watermarking algorithm for polygonal meshes based on the modification of the Laplacian coordinates. More specifically, we first compute the Laplacian coordinates (x, y, z) of the mesh vertices, then construct the histogram of the lengths of the (x,y,z) vectors, and finally, insert the watermark by altering the shape of that histogram. The watermark extraction is carried out blindly, with no reference to the host model. The proposed method is more robust than several existing high capacity watermarking algorithms. In particular, it is able to resist attacks such as translations, rotations, uniform scaling and vertex reordering, due to the invariance of the histogram of the Laplacian vector lengths under such transformations. Compared to the existing robust watermarking methods, our experiments show that the proposed method can better resist common mesh editing attacks, due to the good behaviour of the Laplacian coordinates under such operations. Categories and Subject Descriptors (according to ACM CCS): I.3.5 [Computer Graphics]: Computational Geometry and Object Modeling Curve, surface, solid and object representations 1. Introduction A digital watermark is a digital signal embedded into a digital medium, such as text, audio, image or video, to protect it from unauthorized use or alteration. Several important applications, such as proof of ownership, or copy control, require robust watermarks, that is, watermarks that are able to resist unintentional or malicious attacks to remove them. As the mesh geometry has much higher carrying capacity than the connectivity, a typical watermarking algorithm for 3D polygonal meshes embeds the watermark into the geometry, altering the positions of the vertices. Then, theoretical arguments or experiments are used to demonstrate the robustness of the algorithm against common attacks, such as geometric transformations, addition of noise and mesh smoothing. In contrast, in this paper we are primarily concerned with the robustness of the watermark against editing attacks that change the global shape of the mesh. We believe that, in many cases, the assumption of a mesh editing attack is more realistic than the assumption of a noise addition, or a smoothing attack. Indeed, even if the attacker can use smoothing or noise addition to remove the watermark without degrading the visual quality of the model, still they would probably want to alter the global shape of the model through mesh editing in order to, either disguise the appropriation of the model, or to create a model fit for their purpose. The algorithm we propose is based on Laplacian coordinates. In particular, the signal is embedded into the histogram of the lengths of the vectors (x,y,z), where (x,y,z) are the Laplacian coordinates. We notice that the lengths of the Laplacian coordinates, unlike the Laplacian coordinates themselves, are invariant under both translation and rotation. The use of histograms means that the method is also invariant under uniform scaling and vertex reordering. Finally, experiments show that the use of Laplacian coordinates makes the proposed method resillient against mesh editing attacks. The main contributions of the paper are: A new polygonal mesh watermarking algorithm based on Laplacian coordinates. A demonstration that the algorithm is robust against editing operations altering the global shape of the mesh. The rest of this paper is organized as follows. Section reviews the relevant literature. Section 3 presents the preliminaries and the basic ideas of the proposed watermarking scheme. Watermark embedding and extraction methods are described in detail in Section 4 and Section 5, respectively. Published by Blackwell Publishing, 96 Garsington Road, Oxford OX4 DQ, UK and 35 Main Street, Malden, MA 148, USA.

2 The experimental results are presented and discussed in Section 6 and finally, we briefly conclude in Section 7.. Related Work Given their immediate practical applications, watermarking algorithms have been developed for objects of various dimensions, including text documents [LT7], audios [BPN1], digital images [RP5] and video [NM8]. The research interest into the watermarking of 3D models is relatively newer; however, several watermarking [AM5, WH9], or closely related steganographic algorithms [CLYL9, SWK8] have already been proposed. Similarly to image watermarking, 3D mesh watermarking methods work either in the spatial domain [YY99] [LLLL5] [YIK3] [CPJ7] [Bor6], or in the frequency domain [OMT] [PHF99] [UCB4] [YPSZ1]. In one of the earliest approaches, Yeo et al. [YY99] verify 3D meshes with the use of a watermarking method which perturbs each vertex to ensure that two predefined hash functions have the same value on it. Verification is achieved by a comparison of the values computed by the two hash functions. One drawback of this method is the causality problem, caused by its heavy dependence on the order of traversal of the vertices. Lin et al. [LLLL5] address this issue using vertex-orderindependent hash functions. Yu et al. [YIK3] embed the watermark by altering the distance between the vertices and the center of the host 3D model. Cho et al. [CPJ7] propose an algorithm based on the modification of the mean value and variance of the distribution of vertex norms. Bors [Bor6] uses a neighborhood localized measure to find vertices that give small embedding distortion and then watermarks these vertices by local geometric perturbations. Another category of robust 3D mesh watermarking methods is based on frequency analysis. Using the mesh spectral analysis proposed by Karni et al. [KG], Ohbuchi et al. [OMT] modify the shape of the mesh to insert the watermark into the low frequencies. Praun et al. [PHF99] embed the watermark into the perceptually significant features of the 3D model, which are identified by Hoppe s multiresolution decomposition [Hop96]. The watermarking algorithms by Uccheddu et al. [UCB4] and Yin et al. [YPSZ1] use the multiresolution analysis in [LDW97] and [GSS99], respectively. A general survey of 3D mesh watermarking can be found in [WLDB8]. Steganographic methods also embed a digital signal into a carrier digital object. Their purpose is to hide information into a host in such a way that an eavesdropper cannot detect the existence of the hidden message [CMB 8]. They are closely related to watermarking, and similar techniques apply. However, due to the different domains of application, steganographic methods favor large embedding capacity, usually at the expense of robustness, while watermarking schemes are evaluated principally on their robustness. Chao et al. [CLYL9] propose a steganographic method based on small perturbations of the vertices of the 3D models. The method achieves high embedding capacity with low embedding distortion, but it is not able to withstand malicious attacks. Cayre et al. [CM3] propose a blind data hiding scheme which considers each triangle as a two-state (i.e., or 1) geometric object, depending on the position of the projection of a vertex onto its opposite edge. The theoretical capacity of this method is one bit per vertex. Motivated by this idea, Wang et al. [WC5] increases the embedding capacity and reduces the distortion by using a multi-level embedding procedure. Their work was extended in [CW7], achieving higher embedding capacity and lower visual degradation. The extended method takes into account the surface texture information (i.e., rough or smooth), making it an adaptive algorithm. As pointed out in [CLYL9], the previous 3D steganographic approaches are not robust and they can even be attacked by distortionless operations, such as translations or vertex reordering. In contrast, watermarking methods are generally robust against distortionless attacks, while some of them can resist mesh processing operations such as smoothing, or noise addition. However, they can not successfully resist mesh editing operations that change the global shape of the mesh. 3. The Watermarking Algorithm In this section we introduce the basic notation and terminology and then give an overview of the proposed algorithm. The details of the implementation of the watermark embedding and extraction will be discussed in the next two sections Preliminaries Let M be a polygonal mesh model with N vertices and let V and E denote the sets of vertices and edges of M, respectively. Let v i be the vertex indexed by i, its position described in Cartesian coordinates by [x i y i z i ] (written as a row vector). The 1-ring neighbor of the vertex v i is denoted by N (v i ) = v j (v i,v j ) E,1 i, j N }. (1) For each vertex v i, the vectors of the Laplacian coordinates L i = [x i y i z i] are the rows of the matrix x 1 y 1 z 1 x y z L = M. ().. x N y N z N where M is the Kirchhoff matrix [Bol98]) N (v i ) if i = j M i, j = 1 if v j N (i) 1 i, j N otherwise (3)

3 In d e x o f e a c h b in, B k (a) In d e x o f e a c h b in, B k Figure 1: Histograms of the lengths of the vectors of the Laplacian coordinates of the Rabbit model with (a) K = and (b) K = 5 bins. The use of a different discrete Laplacian, as for example the one used for mesh editing in [SCOL 4], would lead to a watermarking algorithm of comparable performance. The Cartesian coordinates of the vertices are obtained from the Laplacian coordinates by M 1 L. For numerical stability, as M may be not invertible, we update the M in Eq. 3 by M i, j ε if i = j M i, j = (4) M i, j otherwise 1 i, j N where ε > is a small real number. The proposed watermarking method embeds the watermark into the histogram of the lengths of the Laplacian coordinate vectors d i = L i = x i + y i + z i 1 i N (5) These lengths are then classified into K bins B k, according to B k = d i d min + δ(k 1) d i < d min + δk} (6) with 1 i N and 1 k K. The d min and d max are the minimum and maximum elements of d = d 1,d,,d N } and δ = dmax d min K is the size of the bin. We also assume that d max B K. The histogram of d is produced by counting the number of elements in each bin B k. Two examples for the Rabbit model for the values of K = and K = 5 are shown in Fig. 1. The figure indicates that many bins are empty. 3.. Overview of The Algorithm We assume that the watermark is a bitstring. Each bit (w j = 1 or +1) is inserted into a pair of bins (B k1,b k ) with k 1 k. However, in order to ensure exact watermark extraction, some pairs of bins will not be used. A pair of bins (B k1,b k ) is valid if it satisfies (b) (7) f (B k1,b k ) = B k1 B k = B k1 + B k n thr (8) with k 1 k and X denoting the number of elements of X. Here, n thr is an embedding threshold. A pair of bins that is not valid is called invalid. The proposed method does not utilize the bins B 1 and B K, and thus, (B k,b 1 ) and (B k,b K ) are always invalid. As it will become apparent later, this requirement ensures that the watermark can be extracted with no reference to the original model. Assuming that (B k1,b k ) is valid, we insert one watermark bit w j into this pair by, if necessary, moving some elements from B k1 into B k or vice-versa, such that ˆB k1 < ˆB k if w j = 1 (9) ˆB k1 ˆB k if w j = +1 where ˆB k1 and ˆB k are the k 1 -th and k -th bins after the watermarking operation. To move an element d i from one bin to another, we either enlarge or reduce its value so as to push it to the other bin. Notice that no element movement operation is applied when B k1 < B k and w j = 1, or B k1 B k and w j = +1. Finally, the watermark bit w j is extracted from the pair of bins ( ˆB k1, ˆB k ) 1 if ˆB w j = k1 < ˆB k (1) +1 if ˆB k1 ˆB k 4. Watermark Embedding In order to embed the watermark, we first alter the set of Laplacian lengths d, computing a new set ˆd ˆd = ˆ d 1, ˆ d,, ˆ d N } (11) carrying the watermark. Then, through a minimization process, a set of Laplacian vectors ˆL with lengths ˆd is realized, and eventually the corresponding Cartesian coordinates are computed The Computation of ˆd As the bins B 1 and B K are excluded from the embedding process, and as we need one pair of bins to embed one message bit, if K is odd we need to exclude one more bin from the embedding process (here we chose B K 1 ). Thus, the maximum index of a bin used for watermarking is K ˆK = + 1 (1) For any d i inside the bins B 1, B K or B K 1 (when K is odd), we have dˆ i = d i, that is, no changes are made. For the rest of the bins, in order to reduce the embedding distortion and hence improve the visual quality of the marked mesh, the watermark bits are inserted into pairs of adjacent bins (B k1,b k ) with k = k That gives a set of ( ˆK 1)/ candidate bin pairs (B,B 3 ),(B 4,B 5 ),...,(B ˆK 1,B ˆK ).

4 For any such pair, if f (B k,b k+1 ) < n thr, then the pair is invalid and we do not embed a watermark bit, that is, ˆ d i = d i. If f (B k,b k+1 ) n thr, then the pair is valid and the watermarking process depends on the relation between B k, B k+1 and the bit w j. Without loss of generality we assume that w j = +1, as the case w j = 1 is completely analogous. We separate two cases: Case 1: If B k B k+1, then no alteration of the Laplacian lengths is required, and thus, dˆ i = d i. Case : If B k < B k+1, then we have to transfer some elements from B k+1 to B k. We order the elements of B k+1 in ascending order d i1 d i d i Bk+1 (13) and update the first n elements in Eq. 13 by dˆ d if d i d i1,d i,...,d in } i = (14) d i if d i (B k+1 d i1,d i,...,d in }) B k where d = di B k d i B k if B k > (15) d min + δ(k 1) if B k = is the average value of elements in B k if B k is non-empty, or the average of the lower limits of B k and B k+1, if B k is empty. Notice that by transferring the smallest elements of B k+1 into B k, we keep the distortion of the mesh to a minimum. The number n of points transferred from B k+1 to B k is given by f (Bk,B B k+1 k+1 ) 1 f (Bk,B + k+1 ) 1 (16) n robust where the parameter n robust controls the tradeoff between robustness of the watermark and distortion of the mesh. If the number of points to be transferred, as computed by Eq. 16, exceeds the number of points in B k+1, then we just transfer all the contents of B k+1 into B k. 4.. Distortion Minimization and Watermarked Mesh Generation Next we compute a set of Laplacian coordinates ˆL realizing the computed set of lengths ˆd. This is an undetermined problem and we solve it by minimizing the distance between the Laplacian coordinates before and after watermarking. For computational efficiency we minimize that distance at each vertex separately, that is, we minimize ˆL i L i = ( ˆx i x i) + (ŷ i y i) + (ẑ i z i) (17) subject to ˆx i + ŷ i + ẑ i = dˆ i (18) In d e x fo r e a c h b in, B k (a) In d e x fo r e a c h b in, B k (c) In d e x fo r e a c h b in, B k (b) In d e x fo r e a c h b in, B k Figure : Histogram changes as a result of watermarking the Horse and Rabbit models with K = 3 bins. (a) non-watermarked histogram of Horse, (b) watermarked histogram of Horse, (c) non-watermarked histogram of Rabbit and (d) watermarked histogram of Rabbit. From Eq. 17 and Eq. 18, we observe that this minimization problem is equivalent to finding a point ( ˆx i,ŷ i,ẑ i) on a sphere S of radius dˆ i centered at the origin that is closest to the given point (x i,y i,z i). This means that ( ˆx i,ŷ i,ẑ i) is the projection of (x i,y i,z i) on S. As S is centered at the origin, the projection of (x i,y i,z i) on it is given by ˆx i = ŷ i = ẑ i = x i d ˆ i x i + y i + z i y id ˆ i x i + y i + z i z id ˆ i x i + y i + z i (d) (19) Finally, the Cartesian coordinates of the watermarked model ˆM are computed from its Laplacian coordinates by M 1 ˆL. Fig. shows the alteration of the histograms of the Horse and Rabbit models with K = 3 bins. A comparison between the non-watermarked and the watermarked histograms indicates that their global shapes are similar. 5. Watermark Extraction Given a watermarked polygonal mesh model ˆM in Cartesian coordinates, the watermark extraction is very simple and can

5 be carried out blindly, with no reference to the original mesh M. First, we obtain the 1-ring neighbors of each marked vertex ˆv i and construct the weighted Laplacian matrix M using Eq. 3 and Eq. 4. After calculating the watermarked Laplacian coordinates, we compute the lengths ˆd of the coordinate vectors. Then, we classify the elements in ˆd into K bins ˆB k,1 k K, using Eq. 6 and Eq. 7. Since the first and the last bins B 1 and B K have not been altered by the watermarking process, the minimum dˆ min and maximum dˆ max of ˆd (after watermarking) are equal to the minimum d min and maximum d max of d (before watermarking). That is, given the total number of bins K, the step size δ used in the watermark extraction process is the same as the step size used in the watermark embedding process. This is an efficient solution to the non-synchronization problem. However, dˆ min and maximum dˆ max may change significantly when the watermarked mesh ˆM has suffered from malicious attacks. If this is the case, we form the bins using only those dˆ i that satisfy d min dˆ i d max and Eq. 7. In the next step, we disregard the bins ˆB 1 and ˆB k (k > ˆK), which do not carry watermark, and form the pairs ( ˆB, ˆB 3 ),( ˆB 4, ˆB 5 ),, ( ˆB ˆK 1, ˆB ˆK ). From the embedding process, we know that only pairs (B k,b k+1 ) satisfying f (B k,b k+1 ) n thr have been used as watermark carriers. Based on the equation f (B k,b k+1 ) = f ( ˆB k, ˆB k+1 ) () which is a consequence of the embedding strategy that swaps vertices inside pairs of bins only, we can find the pairs that carry watermark by checking if f ( ˆB k, ˆB k+1 ) n thr (1) That means that we do not need the knowledge of the original mesh M to compute the pairs of bins that carry watermark. Finally, each embedded watermark bit w j is sequentially extracted from each pair ( ˆB k, ˆB k+1 ) by +1 if ˆB w j = k ˆB k+1 1 if ˆB k < ˆB k+1 6. Experimental Results The proposed method has been implemented on Matlab using Gabriel Peyré s code [Pey8]. The 3D mesh models used in the experiments, namely, the Bunny, Rabbit, Horse, Dragon, Elephant, Hand and Hank, are shown in Fig. 3. The watermark bits are produced randomly with uniform distribution, using the Matlab function randint. The parameter ε in Eq. 4 that ensures the invertibility of the Laplacian matrix M is fixed at ε =.1. In our Matlab implementation, Table 1: Parameter setting and experimental results. C is the embedding capacity of the model in bits. In each test, the number of actually changed bins is C. Model N K n thr n robust C Bunny Rabbit Horse Dragon Elephant Hand Hank which is not optimized for time efficiency, it takes few minutes (for instance, approximately one minute for the Bunny model) to watermark the test meshes on a PC running on an Intel Core Duo T657.1 GHz processor with GB memory. The parameters used in the experiment are reported in Tab. 1. Notice that the parameters n thr and K need to be passed to the watermark extraction algorithm. In a real installation framework, we can avoid the necessity of passing n thr and K to the extraction algorithm by always fixing n thr at a constant and using a K proportional to N, that is, K = N/N c, where N c is a constant. In most experiments, n thr = 46 and the parameter K was computed this way with N c = Evaluation of the Visual Degradation A first desirable characteristic of a watermarking method is the transparency of the watermark. That is, we expect the embedded watermarks to be imperceptible. Our first experiment evaluates the visual impact of the mesh alterations caused by watermarking. Fig. 4, Fig. 5 and Fig. 6 show the test models after watermarking. We found that it is fairly difficult to observe any undesirable artifacts on the watermarked models, even upon close inspection. In addition, the watermarked models shown in Fig. 4, Fig. 5 and Fig. 6 and the corresponding originals shown in Fig. 3 are visually indistinguishable. We conclude that the proposed watermarking method is capable of preserving the visual quality and the global shape of the cover mesh models. 6.. Evaluation of Robustness A watermarking method should be capable of surviving unintentional or malicious attacks, preventing the removal of the embedded watermark by an adversary. To evaluate the robustness of the proposed method, we apply the attack to the watermarked model and attempt to extract the watermark

6 (a) (b) (c) (d) (e) (f) (g) Figure 3: Original mesh models used in the experiments. (a) Bunny, (b) Rabbit, (c) Horse, (d) Dragon, (e) Elephant, (f) Hand, and (g) Hank. (a) (b) (c) (d) (e) Figure 4: Watermarked mesh models. (a) Bunny, (b) Rabbit, (c) Horse, (d) Dragon, and (e) Elephant. (a) (b) (c) Figure 5: Illustration of the watermarked Hand and its deformed versions. (a) watermarked Hand, (b) deformation of (a), and (c) deformation of (a). (a) (b) (c) Figure 7: Illustration of Cho et al. s [CPJ7] watermarked Hank and its deformed versions. (a) watermarked Hank, (b) deformation of (a), and (c) deformation of (a). (a) (b) (c) Figure 6: Illustration of the watermarked Hank and its deformed versions. (a) watermarked Hank, (b) deformation of (a), and (c) deformation of (a). from the attacked model. The standard measures of robustness are the normalized correlation (NC) and the correct detection rate (CDR), which are obtained by a comparison between the original watermark string and the extracted one. In this paper, two types of attacks were conducted: distortionfree geometric transformations and mesh editing operations. Note that we do not measure the robustness against some other common attacks, such as noise addition and cropping, as the visual alterations resulted from such operations are usually at an unacceptable level. As expected, the watermark is perfectly robust against vertex reordering and geometric transformations, including translation, rotation and uniform scaling. This is because the watermark carrier, that is, the histogram of the lengths of

7 Table : Evaluation of the robustness of the proposed algorithm against mesh editing operations. Model NC CDR Fig. 5 (b) Fig. 5 (c) the Laplacian coordinate vectors, is invariant under these operations, except uniform scaling. Although uniform scaling may deform the histogram, the watermark survives because both embedding and extraction are based on relationships between histogram bins that are invariant under uniform scaling. Regarding vicious attacks, we only consider mesh editing operations that are likely to be applied to the 3D models in practice. We carried out such operations using the popular Character Rigging tool of the well-known 3D editing software Blender.49 [ble]. Some instances of the mesh models undergoing deformation are shown in Fig. 5 and Fig. 6. In both examples, the shapes of the deformed models are meaningful and can still be used in practical applications. Tab. lists the robustness results under mesh editing for the two models. We notice that we obtain high values of NC and CDR, even for severely edited models. The reason is that even though the mesh editing operations modify the global shape of the models, the watermark carrier, i.e., the histogram of the lengths of the Laplacian coordinates vectors, is almost unchanged. We conclude that we are able to correctly extract most of the embedded watermark bits, and hence, the proposed watermarking method offers satisfactory resistance against editing attacks Embedding Capacity The data in the second and fourth columns of Tab. 1 imply that, for each of the test models, the embedding capacity does not attain its theoretical maximum (K )/, indicating that the proposed method cannot embed a watermark bit into every bin pair. This happens because many bins are empty, and because some bin pairs do not meet the embedding condition in Eq. 8, see also Fig. 1 and Fig.. Regarding the real embedding capacity of the method, the two crucial parameters are the number of bins K and the embedding threshold n thr. Fig. 8 (a) shows the embedding capacity for variable K and fixed n thr = 6. As expected, the embedding capacity increases monotonically with K, as a larger K means that more bin pairs are available for watermarking. Fig. 8 (b) shows the embedding capacity for variable n thr and fixed K = 1. As expected, the embedding capacity decreases monotonically with n thr, as a greater n thr means that more bin pairs become invalid Comparison and Discussion We compared the proposed method with existing watermarking and steganographic algorithms. The results of the evaluation are summarized in Tab. 3. We notice that steganographic methods have higher embedding capacity but weaker robustness compared to the watermarking ones. In fact, steganographic methods are quite sensitive to mesh alterations and even a slight processing could cause the complete removal of the embedded message. Consequently, they are not appropriate for applications such as digital content protection and authentication. By contrast, watermarking methods show higher levels of robustness, at the expense of their embedding capacity. We claim that the proposed method outperforms other schemes in terms of robustness under common shapechanging editing operations. The reason is that the watermark primitives used by previous schemes, for example, the vertex norms used by Cho et al. [CPJ7], are sensitive to changes of the global shape. In contrast, the histogram of the lengths of the Laplacian vectors is less sensitive to such operations. Tab. 4 summarizes the experimental comparison between the proposed method and Cho et al. s method [CPJ7], regarding robustness to mesh editing. We implemented Cho et al. s watermark algorithm that alters the distribution of vertex norms, defined as the distances between the vertices and the center of the mesh model. In the experiment, the same bit string was embedded to the Hank model using Cho et al. s and our method, respectively. For Cho et al. s algorithm, we set the watermark strength factor α =.4 and the bin number to 3, while for our algorithm we used the parameter values listed in Tab. 1. Then, using Blender, we deformed Cho s and ours watermarked models, trying to obtain edited models with the same appearance, see Fig. 6 and Fig. 7. Tab. 4 shows that our approach achieves higher NC and CDR values, and hence, it is more robust. The Ohbuchi et al. [OMT] method is weakly resistant against mesh editing attacks because the watermark is embedded in the low frequencies of the spectrum of the Laplacian. However, variants of their method using medium or high frequencies as watermark carriers could be more resistant to mesh editing attacks. Moreover, their method outperforms ours in that it is robust against a wider range of attacks, including mesh simplification and remeshing. On the other hand, their method is a non-blind scheme and requires the original mesh for watermark extraction. That makes it unsuitable for a range of practical applications where such information can not be provided to the extraction algorithm. 7. Conclusion We propose a watermarking algorithm for polygonal meshes based on the histogram of the lengths of Laplacian coordinate vectors. The watermark extraction is carried out

8 E m b e d d in g c a p a c ity (b its ) B u n n y R a b b it H o rs e D ra g o n E le p h a n t E m b e d d in g c a p a c ity (b its ) B u n n y R a b b it H o rs e D ra g o n E le p h a n t B in n u m b e r K (a) E m b e d d in g th re s h o ld n th r (b) Figure 8: Embedding capacity versus (a) number of bins K, with fixed embedding threshold n thr = 6 and (b) embedding threshold n thr, with fixed K = 1. In both cases, n robust = 5. Table 3: Comparison with previously proposed methods. Method Steganography Watermarking Cayre s Wang s Chao s Zafeirio s Cho s Ohbuchi s Ours Domain spatial spatial spatial spatial spatial frequency spatial Capacity v 3 v 3n layers v w w w w Extraction method blind blind blind blind blind non-blind blind Similarity transformation Vertex reordering Mesh editing Here, v and w represent the numbers of the mesh vertices and watermark bits, respectively; the symbols and indicate that the method can weakly survive and can survive attacks, respectively; n layers is an embedding parameter. The previous approaches used for comparison include those by Cayre et al. [CM3], Wang et al. [WC5], Chao et al. [CLYL9], Zafeiriou et al. [ZTP5], Cho et al. [CPJ7] and Ohbuchi et al. [OMT]. Table 4: Performance comparison between ours and Cho et al. s [CPJ7] methods. Model Method NC CDR Fig. 6 (b) Proposed Fig. 7 (b) Cho s Fig. 6 (c) Proposed Fig. 7 (c) Cho s.19.6 blindly without reference to the original model. The proposed method is robust against translation, rotation, uniform scaling and vertex reordering as a result of using primitives that are invariant under these operations to carry the watermark. Most importantly, the proposed method is robust under common mesh editing operations that change the global shape of the mesh. We believe that mesh editing is the logical choice of a malicious attacker aiming at the unauthorized use of copyrighted material, and thus, the research on watermarking methods that are robust against such attacks can have immediate practical implications. The main limitation of the proposed watermarking technique is its weak resistance against other attacks, such as mesh simplification, remeshing and topological changes. Such operations may change the Laplacian coordinates significantly, and consequently alter the watermark carrier, i.e., the histogram of the lengths of the Laplacian coordinate vectors, to the extent that the embedded watermark is destroyed. As a direction for future research, we propose watermarking methods based on local coordinates other than the Laplacian. Mean value coordinates and harmonic coordinates have also demonstrated good behavior under mesh editing operations and thus, they are good candidates as potential watermark carriers.

9 References [AM5] ALFACE P. R., MACQ B.: Blind watermarking of 3d meshes using robust feature points detection. In IEEE International Conference on Image Processing (5), vol. 1, pp [ble] 7 [Bol98] BOLLOBÁS B.: Modern graph theory. Springer Verlag, [Bor6] BORS A. G.: Watermarking mesh-based representations of 3-d objects using local moments. IEEE Transactions on Image Processing 15, 3 (6), [BPN1] BASSIA P., PITAS I., NIKOLAIDIS N.: Robust audio watermarking in the time domain. IEEE Transactions on multimedia 3, (1), [CLYL9] CHAO M.-W., LIN C.-H., YU C.-W., LEE T.-Y.: A high capacity 3d steganography algorithm. IEEE Transactions on Visualization and Computer Graphics 15, (9), , 8 [CM3] CAYRE F., MACQ B.: Data hiding on 3-d triangle meshes. IEEE Transactions on Signal Processing 51, 4 (3), , 8 [CMB 8] COX I. J., MILLER M. L., BLOOM J. A., FRIDRICH J., KALKER T.: Digital watermarking and steganography. Morgan Kaufmann, 8. [CPJ7] CHO J.-W., PROST R., JUNG H.-Y.: An oblivious watermarking for 3-d polygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing 55, 1 (7), , 6, 7, 8 [CW7] CHENG Y.-M., WANG C.-M.: An adaptive steganographic algorithm for 3d polygonal meshes. The Visual Computer 3, 9 (7), [GSS99] GUSKOV I., SWELDENS W., SCHRÖDER P.: Multiresolution signal processing for meshes. In SIGGRAPH 99 (1999), ACM Press, pp [Hop96] HOPPE H.: Progressive mesh. In SIGGRAPH 96 (1996), vol. 96, pp [KG] KARNI Z., GOTSMAN C.: Spectral compression of mesh geometry. In SIGGRAPH (), ACM Press, pp [LDW97] LOUNSBERY M., DEROSE T. D., WARREN J.: Multiresolution analysis for surfaces of arbitrary topological type. ACM Trans. Graph. 16, 1 (1997), [LLLL5] LIN H.-Y., LIAO H.-Y., LU C.-S., LIN J.-C.: Fragile watermarking for authenticating 3-d polygonal meshes. IEEE Transactions on Multimedia 7, 6 (5), [LT7] LIU T.-Y., TSAI W.-H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 1 (7), 4 3. [NM8] NOORKAMI M., MERSEREAU R. M.: Digital video watermarking in p-frames with controlled video bit-rate increase. IEEE Transactions on Information Forensics and Security 3, 3 (8), [OMT] OHBUCHI R., MUKAIYAMA A., TAKAHASHI S.: A frequency-domain approach to watermarking 3d shapes. Computer Graphics Forum 1, 3 (), , 7, 8 [Pey8] PEYRÉ G.: peyre/, 8. 5 [PHF99] PRAUN E., HOPPE H., FINKELSTEIN A.: Robust mesh watermarking. In SIGGRAPH 99 (1999), ACM Press, pp [RP5] ROBERT A., PICARD J.: On the use of masking models for image and audio watermarking. IEEE Transactions on Multimedia 7, 4 (5), [SCOL 4] SORKINE O., COHEN-OR D., LIPMAN Y., ALEXA M., RÖSSL C., SEIDEL H.-P.: Laplacian surface editing. In Symposium on Geometry Processing (4), EG Press, pp [SWK8] SALMAN M., WORRALL S., KONDOZ A.: An efficient steganographic algorithm for 3-d models. In International Conference on Signal Processing (8), pp [UCB4] UCCHEDDU F., CORSINI M., BARNI M.: Waveletbased blind watermarking of 3d models. In Workshop on multimedia and security (Magdeburg, Germany, 4), ACM Press, pp [WC5] WANG C.-M., CHENG Y.-M.: An efficient information hiding algorithm for polygon models. Computer Graphics Forum 4 (5), , 8 [WH9] WANG Y.-P., HU S.-M.: A new watermarking method for 3d models based on integral invariants. IEEE Transactions on Visualization and Computer Graphics 15, (9), [WLDB8] WANG K., LAVOUE G., DENIS F., BASKURT A.: A comprehensive survey on three-dimensional mesh watermarking. IEEE Transactions on Multimedia 1, 8 (8), [YIK3] YU Z., IP H. H. S., KWOK L. F.: A robust watermarking scheme for 3d triangular mesh models. Pattern Recognition 36, 11 (3), [YPSZ1] YIN K., PAN Z., SHI J., ZHANG D.: Robust mesh watermarking based on multiresolution processing. Computers & Graphics 5, 3 (1), [YY99] YEO B. L., YEUNG M. M.: Watermarking 3d objects for verification. Computer Graphics and Applications 19, 1 (1999), [ZTP5] ZAFEIRIOU S., TEFAS A., PITAS I.: Blind robust watermarking schemes for copyright protection of 3d mesh objects. IEEE Transactions on Visualization and Computer Graphics 11, 5 (5),

A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES. Department of Computer Science, Yale University

A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES. Department of Computer Science, Yale University A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES Ying Yang Ruggero Pintus, Holly Rushmeier Ioannis Ivrissimtzis Department of Computer Science, Yale University CRS4, Italy School of Engineering and Computing

More information

3-D D Digital Watermarking

3-D D Digital Watermarking CORESA 2007, Montpellier 3-D D Digital Watermarking Adrian G. Bors University of York Computer Science Department YORK Y010 5DD, UK adrian.bors@cs.york.ac.uk 9 November 2007 Outline Overview of 3D watermarking

More information

Adaptive Fuzzy Watermarking for 3D Models

Adaptive Fuzzy Watermarking for 3D Models International Conference on Computational Intelligence and Multimedia Applications 2007 Adaptive Fuzzy Watermarking for 3D Models Mukesh Motwani.*, Nikhil Beke +, Abhijit Bhoite +, Pushkar Apte +, Frederick

More information

Local patch blind spectral watermarking method for 3D graphics

Local patch blind spectral watermarking method for 3D graphics Local patch blind spectral watermarking method for 3D graphics Ming Luo 1, Kai Wang 2, Adrian G. Bors 1, and Guillaume Lavoué 2 1 Department of Computer Science, University of York, York YO10 5DD, UK 2

More information

A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function

A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 1, January 2017 A 3D Mesh Watermarking Based on Improved Vertex Grouping and

More information

Piecewise Permutation Steganography for 3D Humanoid Mesh Models

Piecewise Permutation Steganography for 3D Humanoid Mesh Models Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw

More information

Spectral Graph-Theoretic Approach to 3D Mesh Watermarking

Spectral Graph-Theoretic Approach to 3D Mesh Watermarking Spectral Graph-Theoretic Approach to 3D Mesh Watermarking Emad E. Abdallah Department of Computer Science Concordia University, Montreal, Canada ee abdal@cs.concordia.ca A. Ben Hamza and Prabir Bhattacharya

More information

Blind watermarking of 3D shapes using localized constraints

Blind watermarking of 3D shapes using localized constraints Blind watermarking of 3D shapes using localized constraints Adrian G. Bors Dept. of Computer Science, University of York, York YO DD, U.K. E-mail: adrian.bors@cs.york.ac.uk Abstract This paper develops

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Arab Journal of Nuclear Sciences and Applications

Arab Journal of Nuclear Sciences and Applications Arab J. Nucl. Sci. Appl., Vol. 51, 4, 62-71 (2018) Arab Journal of Nuclear Sciences and Applications ISSN 1110-0451 Web site: ajnsa.journals.ekb.eg (ESNSA) Non-Blind Robust 3D Object Watermarking Scheme

More information

Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation

Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, and Atilla Baskurt 1 1 LIRIS, UMR 5205 CNRS, INSA-Lyon, F-69621 Villeurbanne,

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER /$ IEEE

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER /$ IEEE IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER 2008 1513 A Comprehensive Survey on Three-Dimensional Mesh Watermarking Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract

More information

A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces

A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces Yang Liu Dept. of Computer Science University of Texas at Dallas Richardson, TX 75080, USA yxl072100@utdallas.edu Balakrishnan Prabhakaran

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Enhanced Watermarking Scheme for 3D Mesh Models

Enhanced Watermarking Scheme for 3D Mesh Models Enhanced Watermarking Scheme for 3D Mesh Models Lamiaa Basyoni College of Computing and Information Technology Arab Academy of Science and Technology Cairo, Egypt lamiaa.basyoni@gmail.com H. I. Saleh Radiation

More information

Vertex Shuffling : A Novel Information Hiding on 3D Model

Vertex Shuffling : A Novel Information Hiding on 3D Model Vertex Shuffling : A Novel Information Hiding on 3D Model Cong-Kai Lin, Charlie Irawan Tan, and Wen-Kai Tai Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan,

More information

Speech Modulation for Image Watermarking

Speech Modulation for Image Watermarking Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden

More information

A Benchmark for 3D Mesh Watermarking

A Benchmark for 3D Mesh Watermarking IEEE INTERNATIONAL CONFERENCE ON SHAPE MODELING AND APPLICATIONS (SMI) 2010 1 A Benchmark for 3D Mesh Watermarking Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1, and Xiyan He 3 1,2

More information

Parameterization of Triangular Meshes with Virtual Boundaries

Parameterization of Triangular Meshes with Virtual Boundaries Parameterization of Triangular Meshes with Virtual Boundaries Yunjin Lee 1;Λ Hyoung Seok Kim 2;y Seungyong Lee 1;z 1 Department of Computer Science and Engineering Pohang University of Science and Technology

More information

Spectral Watermarking for Parameterized Surfaces

Spectral Watermarking for Parameterized Surfaces 1 Spectral Watermarking for Parameterized Surfaces Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo Abstract This paper presents a blind spectral 2-way watermarking framework for 3D models with parametric

More information

Authentication of 3-D Polygonal Meshes

Authentication of 3-D Polygonal Meshes Authentication of 3-D Polygonal Meshes Hsueh-Yi Lin 1, Hong-Yuan Mark Liao 2, Chun-Shien Lu 2, and Ja-Chen Lin 1 1 Department of Computer and Information Science, National Chiao-Tung University, 1001 Ta

More information

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction Journal of Physics: Conference Series PAPER OPEN ACCESS Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction To cite this article: I Mardhiyah et al 2016 J. Phys.: Conf. Ser. 725

More information

A Benchmark for 3D Mesh Watermarking

A Benchmark for 3D Mesh Watermarking 2010 Shape Modeling International Conference A Benchmark for 3D Mesh Watermarking Kai WANG 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1 Université de Lyon, CNRS INSA-Lyon 1 / Université Lyon

More information

An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms

An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho 1, 2, Rémy Prost 1 and Ho-Youl Jung 2* 1 CREATIS, CNRS #5515, Inserm U630 INSA-UCB Villeurbanne, France

More information

142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007

142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho, Rémy Prost, and Ho-Youl Jung

More information

Wavelet-Based Blind Watermarking of 3D Models

Wavelet-Based Blind Watermarking of 3D Models Wavelet-Based Blind Watermarking of 3D Models F. Uccheddu Department of Electronic and Telecommunications University of Florence Via S. Marta 3 50139, Firenze, Italy uccheddu@lci.det.unifi.it M. Corsini

More information

A Multiresolutional Approach for Facial Motion Retargetting Using Subdivision Wavelets

A Multiresolutional Approach for Facial Motion Retargetting Using Subdivision Wavelets A Multiresolutional Approach for Facial Motion Retargetting Using Subdivision Wavelets Kyungha Min and Moon-Ryul Jung Dept. of Media Technology, Graduate School of Media Communications, Sogang Univ., Seoul,

More information

Accepted Manuscript. Optimization approach for 3D model watermarking by linear binary programming. Yu-Ping Wang, Shi-Min Hu

Accepted Manuscript. Optimization approach for 3D model watermarking by linear binary programming. Yu-Ping Wang, Shi-Min Hu Accepted Manuscript Optimization approach for 3D model watermarking by linear binary programming Yu-Ping Wang, Shi-Min Hu PII: S0167-8396(10)00024-5 DOI: 10.1016/j.cagd.2010.02.003 Reference: COMAID 1208

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence A Robust Video Hash Scheme Based on 1 2D-DCT Temporal Maximum Occurrence Qian Chen, Jun Tian, and Dapeng Wu Abstract In this paper, we propose a video hash scheme that utilizes image hash and spatio-temporal

More information

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING Ajeet Pratap Singh 1, Sachin Kumar 2 1,2 Department of ECE, ASET, Amity University, Lucknow, U.P., (India) ABSTRACT The

More information

A New Spatial q-log Domain for Image Watermarking

A New Spatial q-log Domain for Image Watermarking 1 Ta Minh Thanh, 2 Pham Thanh Hiep, 3 Ta Minh Tam 1 Department of Network Security, Le Quy Don Technical University, 100 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam. E-mail: taminhjp@gmail.com 2 Le Quy Don

More information

BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC

BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC 1 Prof. Sharvari C. Tamane, 2 Dr. Ratnadeep R. Deshmukh, 1 MGM s Jawaharlal Nehru Engineering College sharvaree73@yahoo.com

More information

Combined Hashing/Watermarking Method for Image Authentication

Combined Hashing/Watermarking Method for Image Authentication Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Geometric Modeling and Processing

Geometric Modeling and Processing Geometric Modeling and Processing Tutorial of 3DIM&PVT 2011 (Hangzhou, China) May 16, 2011 6. Mesh Simplification Problems High resolution meshes becoming increasingly available 3D active scanners Computer

More information

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function. Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)

More information

Technologies for 3D Model Watermarking: A Survey

Technologies for 3D Model Watermarking: A Survey 328 Technologies for 3D Model Watermarking: A Surey Chang-Min Chou 1, 2 and Din-Chang Tseng 1 1 Institute of Computer Science and Information Engineering, National Central Uniersity, Taiwan 320. 2 Department

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

3-Dimensional Object Modeling with Mesh Simplification Based Resolution Adjustment

3-Dimensional Object Modeling with Mesh Simplification Based Resolution Adjustment 3-Dimensional Object Modeling with Mesh Simplification Based Resolution Adjustment Özgür ULUCAY Sarp ERTÜRK University of Kocaeli Electronics & Communication Engineering Department 41040 Izmit, Kocaeli

More information

Large Mesh Deformation Using the Volumetric Graph Laplacian

Large Mesh Deformation Using the Volumetric Graph Laplacian Large Mesh Deformation Using the Volumetric Graph Laplacian Kun Zhou1 Jin Huang2 John Snyder3 Xinguo Liu1 Hujun Bao2 Baining Guo1 Heung-Yeung Shum1 1 Microsoft Research Asia 2 Zhejiang University 3 Microsoft

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks

Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Neslihan Kose, Jean-Luc Dugelay Multimedia Department EURECOM Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr

More information

A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS

A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS Saoussen Ben Jabra and Ezzeddine Zagrouba Institut Supérieur d informatique, Abou Raihane Bayrouni, 2080 l Ariana, Tunisia. Saoussen.bj@laposte.net, ezzeddine.zagrouba@fsm.rnu.tn

More information

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

Robust Watermark Algorithm using Genetic Algorithm

Robust Watermark Algorithm using Genetic Algorithm JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China

More information

Spectral Compression of Mesh Geometry

Spectral Compression of Mesh Geometry Spectral Compression of Mesh Geometry Zachi Karni, Craig Gotsman SIGGRAPH 2000 1 Introduction Thus far, topology coding drove geometry coding. Geometric data contains far more information (15 vs. 3 bits/vertex).

More information

Robust Blind Watermarking Mechanism For Motion Data Streams

Robust Blind Watermarking Mechanism For Motion Data Streams Robust Blind Watermarking Mechanism For Motion Data Streams Parag Agarwal Ketaki Adi B. Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson, TX

More information

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

RECENT advances in 3D acquisition technologies, 3D graphics rendering and geometric modeling have boosted

RECENT advances in 3D acquisition technologies, 3D graphics rendering and geometric modeling have boosted RESEARCH REPORT OF LIRIS 1 Robust and Blind Watermarking of Polygonal Meshes Based on Volume Moments Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract This paper describes a robust

More information

Image retrieval based on region shape similarity

Image retrieval based on region shape similarity Image retrieval based on region shape similarity Cheng Chang Liu Wenyin Hongjiang Zhang Microsoft Research China, 49 Zhichun Road, Beijing 8, China {wyliu, hjzhang}@microsoft.com ABSTRACT This paper presents

More information

Spectral Coding of Three-Dimensional Mesh Geometry Information Using Dual Graph

Spectral Coding of Three-Dimensional Mesh Geometry Information Using Dual Graph Spectral Coding of Three-Dimensional Mesh Geometry Information Using Dual Graph Sung-Yeol Kim, Seung-Uk Yoon, and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oryong-dong, Buk-gu, Gwangju,

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

arxiv: v1 [cs.mm] 9 Aug 2017

arxiv: v1 [cs.mm] 9 Aug 2017 Robust Video Watermarking against H.264 and H.265 Compression Attacks Nematollah Zarmehi 1* and Mohammad Javad Barikbin 2 1 Advanced Communication Research Institute, Electrical Engineering Department,

More information

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition Nilay Mistry 1, Dhruv Dave 2 1 Computer Department, KSV University L.D.R.P Institute of Technology

More information

DIGITAL watermarking has been studied over many years

DIGITAL watermarking has been studied over many years IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 15, NO. 2, MARCH/APRIL 2009 285 A New Watermarking Method for 3D Models Based on Integral Invariants Yu-Ping Wang and Shi-Min Hu, Member,

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition

A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition Jian Wang 1, Ron Healy 2, Joe Timoney 3 Computer Science Department NUI Maynooth, Co. Kildare, Ireland jwang@cs.nuim.ie

More information

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS Shiva Zaboli

More information

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316

More information

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking Amin Banitalebi-Dehkordi1, Mehdi Banitalebi-Dehkordi2, Jamshid Abouei3, and Said Nader-Esfahani4 1 Department

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

3-D Morphing by Direct Mapping between Mesh Models Using Self-organizing Deformable Model

3-D Morphing by Direct Mapping between Mesh Models Using Self-organizing Deformable Model 3-D Morphing by Direct Mapping between Mesh Models Using Self-organizing Deformable Model Shun Matsui Ken ichi Morooka Hiroshi Nagahashi Tokyo Institute of Technology Kyushu University Tokyo Institute

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

Texturing and Deforming Meshes with Casual Images. I-Chao Shen Yi-Hau Wang Yu-Mei Chen Bing-Yu Chen. National Taiwan University

Texturing and Deforming Meshes with Casual Images. I-Chao Shen Yi-Hau Wang Yu-Mei Chen Bing-Yu Chen. National Taiwan University Volume xx (200y), Number z, pp. 1 6 Texturing and Deforming Meshes with Casual Images I-Chao Shen Yi-Hau Wang Yu-Mei Chen Bing-Yu Chen National Taiwan University arxiv:1809.03144v1 [cs.gr] 10 Sep 2018

More information

A Robust High Capacity Affine-Transformation-Invariant Scheme for Watermarking 3D Geometric Models

A Robust High Capacity Affine-Transformation-Invariant Scheme for Watermarking 3D Geometric Models 1 A Robust High Capacity Affine-Transformation-Invariant Scheme for Watermarking 3D Geometric Models XIFENG GAO, Department of Computer Science, University of Houston CAIMING ZHANG, YAN HUANG, School of

More information

A NEW FRAGILE MESH WATERMARKING ALGORITHM FOR AUTHENTICATION

A NEW FRAGILE MESH WATERMARKING ALGORITHM FOR AUTHENTICATION A NEW FRAGILE MESH WATERMARKING ALGORITHM FOR AUTHENTICATION Hao-Tian Wu and Yiu-Ming Cheung Department of Computer Science, Hong Kong Baptist University, Hong Kong, China Abstract: Key words: In this

More information

Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding

Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding Reinhard Huber 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria 2 Department

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

Analysis of feature-based geometry invariant watermarking

Analysis of feature-based geometry invariant watermarking Header for SPIE use Analysis of feature-based geometry invariant watermarking Mehmet U. Celik *a, Eli Saber b, Gaurav Sharma b, A.Murat Tekalp a a University of Rochester, Rochester, NY, 14627-0126 b Xerox

More information

Multiresolution Remeshing Using Weighted Centroidal Voronoi Diagram

Multiresolution Remeshing Using Weighted Centroidal Voronoi Diagram Multiresolution Remeshing Using Weighted Centroidal Voronoi Diagram Chao-Hung Lin 1, Chung-Ren Yan 2, Ji-Hsen Hsu 2, and Tong-Yee Lee 2 1 Dept. of Geomatics, National Cheng Kung University, Taiwan 2 Dept.

More information

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,

More information

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD Digital Watermarking using Fuzzy Logic approach based on DWT and SVD T.Sridevi Associate Professor CBIT Hyderabad,India S Sameena Fatima,Ph.D Professor, OU, Hyderabad,India ABSTRACT Digital image watermarking

More information

WATERMARKING FOR 3D POLYGONS USING WAVELET TRANSFORM AND MODIFIED TRAVELING SALESMAN PROBLEM

WATERMARKING FOR 3D POLYGONS USING WAVELET TRANSFORM AND MODIFIED TRAVELING SALESMAN PROBLEM Journal of the Operations Research Society of Japan 2009, Vol. 52, No. 4, 402-416 WATERMARKING FOR 3D POLYGONS USING WAVELET TRANSFORM AND MODIFIED TRAVELING SALESMAN PROBLEM Shinichi Murata Yasunari Yoshitomi

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

Multibit Embedding Algorithm for Steganography of Palette-Based Images

Multibit Embedding Algorithm for Steganography of Palette-Based Images Multibit Embedding Algorithm for Steganography of Palette-Based Images Shoko Imaizumi and Kei Ozawa Graduate School of Advanced Integration Science, Chiba University 1 33 Yayoicho, Inage-ku, Chiba-shi,

More information

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES Mrs. R.J. Shelke, Dept of Electronics Engineering, Walchand Institute of Technology, Solapur 43002, India ABSTRACT Dr. Mrs. S.S. Apte,

More information

Comparison of wavelet based watermarking techniques Using SVD

Comparison of wavelet based watermarking techniques Using SVD Comparison of wavelet based watermarking techniques Using SVD Prof.T.Sudha Department of Computer Science Vikrama Simhapuri University Nellore. Email- thatimakula_sudha@yahoo.com Ms. K. Sunitha Head, P.G

More information

Watermark Embedder Optimization for 3D Mesh Objects using Classification Based Approach

Watermark Embedder Optimization for 3D Mesh Objects using Classification Based Approach 2010 International Conference on Signal Acquisition and Processing Watermark Embedder Optimization for 3D Mesh Objects using Classification Based Approach Rakhi C. Motwani, Mukesh C. Motwani, Bobby D.

More information

Robust Lossless Data Hiding. Outline

Robust Lossless Data Hiding. Outline Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

WATERMARKING FOR LIGHT FIELD RENDERING 1

WATERMARKING FOR LIGHT FIELD RENDERING 1 ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

QR Code Watermarking Algorithm based on Wavelet Transform

QR Code Watermarking Algorithm based on Wavelet Transform 2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Hêmin Golpîra 1, Habibollah Danyali 1, 2 1- Department of Electrical Engineering, University of Kurdistan, Sanandaj,

More information

Robust Shape Retrieval Using Maximum Likelihood Theory

Robust Shape Retrieval Using Maximum Likelihood Theory Robust Shape Retrieval Using Maximum Likelihood Theory Naif Alajlan 1, Paul Fieguth 2, and Mohamed Kamel 1 1 PAMI Lab, E & CE Dept., UW, Waterloo, ON, N2L 3G1, Canada. naif, mkamel@pami.uwaterloo.ca 2

More information

Using Semi-Regular 4 8 Meshes for Subdivision Surfaces

Using Semi-Regular 4 8 Meshes for Subdivision Surfaces Using Semi-Regular 8 Meshes for Subdivision Surfaces Luiz Velho IMPA Instituto de Matemática Pura e Aplicada Abstract. Semi-regular 8 meshes are refinable triangulated quadrangulations. They provide a

More information

Watermarking of Image Using Priority Based On Algorithms

Watermarking of Image Using Priority Based On Algorithms This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com Watermarking of Image Using Priority Based On Algorithms B.Aarthi,

More information

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features 1 Kum Sharanamma, 2 Krishnapriya Sharma 1,2 SIR MVIT Abstract- To describe the image features the Local binary pattern (LBP)

More information

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Triangular Mesh Segmentation Based On Surface Normal

Triangular Mesh Segmentation Based On Surface Normal ACCV2002: The 5th Asian Conference on Computer Vision, 23--25 January 2002, Melbourne, Australia. Triangular Mesh Segmentation Based On Surface Normal Dong Hwan Kim School of Electrical Eng. Seoul Nat

More information