DocumentCode :
1238888
Title :
Fragile watermarking for authenticating 3-D polygonal meshes
Author :
Lin, Hsueh-Yi Sean ; Liao, Hong-Yuan Mark ; Lu, Chun-Shien ; Ja-Chen Lin
Author_Institution :
Dept. of Comput. & Inf. Sci., Nat. Chiao-Tung Univ., Hsinchu, Taiwan
Volume :
7
Issue :
6
fYear :
2005
Firstpage :
997
Lastpage :
1006
Abstract :
Designing a powerful fragile watermarking technique for authenticating three-dimensional (3-D) polygonal meshes is a very difficult task. Yeo and Yeung were first to propose a fragile watermarking method to perform authentication of 3-D polygonal meshes. Although their method can authenticate the integrity of 3-D polygonal meshes, it cannot be used for localization of changes. In addition, it is unable to distinguish malicious attacks from incidental data processings. In this paper, we trade off the causality problem in Yeo and Yeung´s method for a new fragile watermarking scheme. The proposed scheme can not only achieve localization of malicious modifications in visual inspection, but also is immune to certain incidental data processings (such as quantization of vertex coordinates and vertex reordering). During the process of watermark embedding, a local mesh parameterization approach is employed to perturb the coordinates of invalid vertices while cautiously maintaining the visual appearance of the original model. Since the proposed embedding method is independent of the order of vertices, the hidden watermark is immune to some attacks, such as vertex reordering. In addition, the proposed method can be used to perform region-based tampering detection. The experimental results have shown that the proposed fragile watermarking scheme is indeed powerful.
Keywords :
computational geometry; computer crime; hidden feature removal; mesh generation; message authentication; watermarking; 3D polygonal mesh; embedding method; fragile watermarking technique; hidden watermark; incidental data processing; local mesh parameterization; malicious attack; message authentication; tampering detection; visual inspection; Algorithm design and analysis; Authentication; Data processing; Graphics; Information science; Mesh generation; Protection; Quantization; Robustness; Watermarking; Authentication; fragile watermarking; parameterization; polygonal meshes; tampering detection;
fLanguage :
English
Journal_Title :
Multimedia, IEEE Transactions on
Publisher :
ieee
ISSN :
1520-9210
Type :
jour
DOI :
10.1109/TMM.2005.858412
Filename :
1542077
Link To Document :
بازگشت