期刊文献+

一种基于局部坐标系的3维模型盲水印算法 被引量:2

A Blind 3D Model Watermarking Algorithm Based on Local Coordinate System
下载PDF
导出
摘要 3维模型数字水印是目前数字水印研究的热点之一,鲁棒性和盲检测是3维模型数字水印的难点所在。为了增强3维模型数字水印的鲁棒性、实现盲检测并使检测结果具有可读性,提出了一种基于局部坐标系的3维模型数字水印算法,算法把可读的字符串作为水印信息,通过改变三角网格顶点在其一环邻居所确定的局部坐标系中的位置实现水印的嵌入。该算法在检测水印时,不需要原始模型,而且可以抵抗平移、旋转、缩放、剪切和顶点乱序等攻击。实验结果表明,水印算法具有很好的鲁棒性和不可感知性。 Watermarking of 3D models is one of hot research topics in the field of watermarking. The difficulties for 3D model watermarking are robustness and blind detection. To achieve robustness, implement blind detection and make the detection result unambiguous, this paper proposes a new blind 3 D model watermarking algorithm for triangular meshes. The scheme embeds the watermark, which is readable character string rather than meaningless pseudo-sequence, by modifying the location of vertices in their local coordinate system. The original model is not required for detecting watermarks. Experimental results show that the algorithm has good visual quality and is resilient against attacks such as translation, rotation, scaling, model cropping and vertex permutation.
出处 《中国图象图形学报》 CSCD 北大核心 2007年第2期288-293,共6页 Journal of Image and Graphics
基金 国家自然科学基金项目(60473111) 浙江省自然科学基金项目(M603178)
关键词 数字水印 3维模型 三角网格 版权保护 digital watermarking, 3 D model, triangular mesh, copyright protection
  • 相关文献

参考文献18

  • 1夏煜,郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述[J].计算机研究与发展,2004,41(4):728-736. 被引量:19
  • 2喻志强,叶豪盛,赵荣椿,梁爽,夏晓清.稳健的三角形网格数字水印技术[J].计算机应用,2002,22(9):94-96. 被引量:29
  • 3Ohbuchi R,Masuda H,Aono M.Embedding data in 3D models[A].In:Proceedings of the European Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services'97[C],Darmstadt,Germany,1997:I-10.
  • 4Ohbuchi R,Masuda H,Aono M.Watermarking three-dimensional polygonal models[A].In:Proceedings of the ACM International Conference on Multimedia'97[C],Seattle,USA,1997:261 - 272.
  • 5Benedens O.Geometry-based watermarking of 3D models[J].IEEE Computer Graphics and Applications,1999,.19(1):46 - 55.
  • 6Benedens O.Two high capacity methods for embedding public watermarks into 3D polygonal models[A].In:Proceedings of the Multimedia and Security-Workshop at ACM Multimedia[C],Orlando,Forida,1999:95 - 99.
  • 7Benedens O.Watermarking of 3D-polygon-based models with robustness against mesh simplification[A].In:Proceedings of SPIE[C],San Jose,CA,USA,1999,3657:329 -340.
  • 8Benedens O,Busch C.Towards blind detection of robust watermarks in polygonal models[A].In:Proceedings of EUROGRAPHICS[C],Interlaken,Switzerland,2000,19 (3):C199 - C208.
  • 9Yeung M,Yeo B-L.Fragile watermarking of three-dimensionalobjects[A].In:Proceedings of International Conference on Image Processing[C],Chicago,IL,USA,1998,2:442-446.
  • 10Praun E,Hoppe H,Finkelstein A.Robust mesh watermarking[A].In:Proceedings of SIGGRAPH[C],Los Angeles,CA,USA,1999:69 - 76.

二级参考文献29

  • 1[1]Ryutarou O., Hiroshi M., Masaki A. Watermarking three-dimensional polygonal models through geometric and topological modifications[J].IEEE Journal on Selected Areas in Communication, 1998, 16(4):551-560.
  • 2[2]Oliver B. Geometry-based watermarking of 3D models[J]. IEEEComputer Graphics and Applications, 1999:46-55.
  • 3[3]Praun Yeung, Boon-Lock Yeo. Fragile watermarking of three-dimensional objects[J]. Proceeding of International Conference on Image Processing, vol.2. Los Angeles:IEEE ComputerSociety, 1998: 442-446.
  • 4[4]Emil P., Hugues H., Finkelstein Adam. Robust mesh watermarking[C]. SIGGRAPH′99 Proceedings. New York: ACM Press, 1999.325-334.
  • 5[5]KangKang Yin, Zhigeng Pan, Jiaoying Shi, David Zhang. Robust mesh watermarking based on multiresolution processing[J]. Computers & Graphics, 2001,25:409-420.
  • 6[6]Chen Y., Medioni G. Object modeling by registration of multiple range images[J]. Image and Vision Computing, 1992,10(3):145-155.
  • 7[7]Besl P.J., Mckay N.D. A method for registration of 3-d shapes[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1992,14(2):239-256.
  • 8[8]Faugeras O.D. The representation,recognition, and locating of 3-d objects[J]. International Journal on Robotic Research,1986,5(3):27-52.
  • 9[9]Stan Melax. A Simple, Fast, and Effective Polygon ReductionAlgorithm[J]. Game Developer, 1998, 11: 44-49.
  • 10[1]N F Johnson, S Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 1998, 31(2): 26~34

共引文献46

同被引文献37

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部