A Pca and Perturb Based Fragile Watermarking Scheme for 3d Models
نویسندگان
چکیده
In this paper, a new fragile watermarking scheme that enables the verification of 3D models for detecting unauthorized alterations is presented. The principal component analysis (PCA) is adopted to produce the PCA coordinate system and make the system robust to similarity transformation attacks. Before watermark embedding, the coordinates of illegitimate intervals are slightly perturbed to ensure all intervals legitimate. In order to control distortion, a special quantization technique is proposed to watermark a legitimate interval. Experimental results show that 100% vertices of the cover model can be embedded and extracted in the proposed method. Moreover, the distortion of the stego model is insignificant and under controlled by quantization step setting. Finally, the proposed method is immune to the causality, convergence and embedding holes problems.
منابع مشابه
A High Verification Capacity Reversible Fragile Watermarking Scheme for 3d Models
The protection and authentication problems for three dimensional (3D) models have become more and more important. The capability of accurately verifying, locating, and recovering any tampered vertex is one of the most important issues. Published fragile watermarking 3D model schemes have a main drawback, the synchronization problem. To increase the capacity of verification and overcome this dra...
متن کاملA numerically stable fragile watermarking scheme for authenticating 3D models
This paper analyzes the numerically instable problem in the current 3D fragile watermarking schemes. Some existing fragile watermarking schemes apply the floating-point arithmetic to embed the watermarks. However, these schemes fail to work properly due to the numerically instable problem, which is common in the floating-point arithmetic. This paper proposes a numerically stable fragile waterma...
متن کاملRobust multiplicative video watermarking using statistical modeling
The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملAuthentication of 3-D Polygonal Meshes
Designing a powerful fragile watermarking technique for authenticating 3-D polygonal meshes is a very difficult task. Yeo and Yeung [17] were first to propose a fragile watermarking method to perform authentication of 3-D polygonal meshes. Although their method can authenticate the integrity of 3-D polygonal meshes, it is unable to distinguish malicious attacks from incidental data processings....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010