A Pca and Perturb Based Fragile Watermarking Scheme for 3d Models

نویسندگان

  • Jen-Tse Wang
  • Peng-Cheng Wang
  • Shyr-Shen Yu
چکیده

In this paper, a new fragile watermarking scheme that enables the verification of 3D models for detecting unauthorized alterations is presented. The principal component analysis (PCA) is adopted to produce the PCA coordinate system and make the system robust to similarity transformation attacks. Before watermark embedding, the coordinates of illegitimate intervals are slightly perturbed to ensure all intervals legitimate. In order to control distortion, a special quantization technique is proposed to watermark a legitimate interval. Experimental results show that 100% vertices of the cover model can be embedded and extracted in the proposed method. Moreover, the distortion of the stego model is insignificant and under controlled by quantization step setting. Finally, the proposed method is immune to the causality, convergence and embedding holes problems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A High Verification Capacity Reversible Fragile Watermarking Scheme for 3d Models

The protection and authentication problems for three dimensional (3D) models have become more and more important. The capability of accurately verifying, locating, and recovering any tampered vertex is one of the most important issues. Published fragile watermarking 3D model schemes have a main drawback, the synchronization problem. To increase the capacity of verification and overcome this dra...

متن کامل

A numerically stable fragile watermarking scheme for authenticating 3D models

This paper analyzes the numerically instable problem in the current 3D fragile watermarking schemes. Some existing fragile watermarking schemes apply the floating-point arithmetic to embed the watermarks. However, these schemes fail to work properly due to the numerically instable problem, which is common in the floating-point arithmetic. This paper proposes a numerically stable fragile waterma...

متن کامل

Robust multiplicative video watermarking using statistical modeling

The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...

متن کامل

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

Authentication of 3-D Polygonal Meshes

Designing a powerful fragile watermarking technique for authenticating 3-D polygonal meshes is a very difficult task. Yeo and Yeung [17] were first to propose a fragile watermarking method to perform authentication of 3-D polygonal meshes. Although their method can authenticate the integrity of 3-D polygonal meshes, it is unable to distinguish malicious attacks from incidental data processings....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010