期刊文献+

数字博物馆文物三维模型基于谱分析的数字水印技术 被引量:3

Spectral Analysis Based Watermarking Algorithm for 3D Mesh of Cultural Heritage in Digital Museum
下载PDF
导出
摘要 提出了一种保护数字博物馆文物三维网格模型版权的鲁棒非盲水印算法。采用谱分析的方法将三维模型的空间信息和颜色信息转换到谱空间,使得水印能量能够在模型上得到充分的扩散,使算法针对各种变换均有较强鲁棒性;采用模型分片技术,在模型子块上独立嵌入和提取水印,提高了运算效率和整体鲁棒性,并使算法获得抵御剪裁攻击的能力;采用基于薄板样条函数的待测模型标准化方法,获得抵抗重建网格拓扑关系攻击和仿射变换攻击的能力;采用QR-code技术对水印信息进行高效方便的编码和解码,QR-code基于Reed-Solomon的容错机制提高了算法的鲁棒性。实验结果证明添加水印后的三维模型有着较好视觉质量,同时对三维模型的仿射变换、坐标点随机噪声、模型光滑、重新网格化、模型裁剪都有较好的鲁棒性。 A robust non-blind watermarking algorithm for 3D mesh of cultural heritage in digital museum was proposed based on spectral analysis to protect the copyright. The algorithm employed spectral analysis to modify mesh shapes and color in their transformed domain and the energy of watermark would diffuse all over the mesh, and in result it attributed global robustness to algorithm. The algorithm employed mesh partitioning to improve computational efficiency and the global robustness especially mesh resection. The algorithm employed watermarked mesh standardization based on TPS(thin-plate spine) transformation to improve the robustness of remesh and affine transformation. The algorithm employed QR-code to code and decode the information of watermark. The distortion correction technology of QR-code improved algorithm global robustness. Experiment shows that the visual quality of watermarked mesh is good. Experiment also shows that algorithm is robust to affine transformation, random noise, mesh smoothing, resmesh, and partial resection.
出处 《系统仿真学报》 CAS CSCD 北大核心 2014年第9期2136-2141,共6页 Journal of System Simulation
基金 国家科技支撑计划(2012BAH33F04)
关键词 数字博物馆 版权保护 三维数字水印 谱分析 QR-code digital museum copyright protection 3d watermarking spectral analysis QR-code
  • 相关文献

参考文献14

  • 1Ohbuchi R, Masuda H, Aono M. Watermaking three-dimensional polygonal models [C]// Proceedings of the fifth ACM international conference on Multimedia. USA: ACM, 1997:261-272.
  • 2潘志庚,孙树森,李黎.三维模型数字水印综述[J].计算机辅助设计与图形学学报,2006,18(8):1103-1110. 被引量:25
  • 3刘晓宁,周明全,耿国华,樊亚春.三维几何模型数字水印综述[J].计算机应用与软件,2007,24(6):14-16. 被引量:6
  • 4Kanai S, Date H, Kishinami T. Digital watermarking for 3D polygons using multiresolution wavelet decomposition [C]// Proc. Sixth IFIP WG. Tokyo, Japan, 1998, 5: 296-307.
  • 5Uccheddu F, Corsini M, Barni M. Wavelet-based blind watermarking of 3D models [C]// Proceedings of the 2004 workshop on Multimedia and security. USA: ACM, 2004: 143-154.
  • 6Praun E, Hoppe H, Finkelstein A. Robust mesh watermarking [C]// Proceedings of the 26th amlual conference on Computer graphics and interactive techniques. USA: ACM Press/Addison-Wesley Publishing Co., 1999: 49-56.
  • 7Yin K, Pan Z, Shi J, et al. Robust mesh watermarking based on multiresolution processing [J]. Computers & graphics (S0097-8493), 2001, 25(3): 409-420.
  • 8Ohbuchi R, Takahashi S, Miyazawa T, et al. Watermarking 3d polygonal meshes in the mesh spectral domain [C]// Graphics Interface 2001. USA: AK Peters, 2001: 9-17.
  • 9Cayre F, Rondan-Alface P, Schrnitt F, et al. Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry [J]. Signal Processing: Image Communication (S0923-5965), 2003, 18(4): 309-319.
  • 10Li L, Zhang D, Pan Z, et al. Watermarking 3D mesh by spherical parameterization [J]. Computers & Graphics, 2004, 28(6): 981-989.

二级参考文献82

  • 1Cox I J, Miller M L, Bloom J A, et al. Digital watermarking and steganography. 2nd ed [M]. San Francisco.. Morgan Kaufmann, 2008.
  • 2Hartung F, Kutter M. Multimedia watermarking techniques [J]. Proceedings of the IEEE, 1999, 87(7) : 1079-1107.
  • 3Wang Y P, Hu S M. A new watermarking method for 3D models based on integral invariants [J]. IEEE Transaction on Visualization and Computer Graphics, 2009, 15(2): 285-294.
  • 4Wang Y P, Hu S M. Optimization approach for 3D model watermarking by linear binary programming [J]. Computer Aided Geometric Design, 2010, 27(5) : 395-404.
  • 5Wang W B, Zheng G Q, Yong J H, et al. A numerically stable fragile watermarking scheme for authenticating 3D models [J]. Computer-Aided Design, 2008, 40(5): 634-645.
  • 6Xiang S J, Kim H J, Huang J W, Audio watermarking robust against time-scale modification and MP3 compression [J]. Signal Processing, 2008, 88(10): 2372-2387.
  • 7Ohbuehi R, Masuda H, Aono M. Watermarking three-dimensional polygonal meshes [C] //Proceedings of ACM Multimedia. New York: ACM Press, 1997:261-272.
  • 8Benedens O. Two high capacity methods for embedding public watermarks into 3D polygonal models [C] //Proceedings of Multimedia and Security Workshop at ACM Multimedia. New York: ACM Press, 1999:95-99.
  • 9Ohbuchi R, Masuda H, Aono M. Watermarking three-dimensional polygonal models through geometric and topological modifications [J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 551-560.
  • 10Benedens O. Geometry-based watermarking of 3D models [J].IEEE Computer Graphics and Applications, 1999, 19 (1) : 46-55.

共引文献34

同被引文献31

  • 1Lu C. Multipurpose watermarking for image authentication and protection [J]. Image Processing, IEEE Transactions (S1057-7149), 2001, 10(10): 1579-1592.
  • 2Zhang C, Cheng L. Multipurpose Watermarking Based on Multiscale Curvelet Transform [J]. IEEE Transactions on Information Forensics and Security (S1556-6013), 2008, 3(4): 611-619.
  • 3J Fridrich. A Hybrid watermark for tamper detection in digital images [C]//ISSPA'99Conf., Brisbane, Australia. USA: IEEE, 1999: 301-304.
  • 4何涨桔.多功能数字图像水印算法研究[D].杭州:杭州电子科技大学,2014.
  • 5Lu Z. Multipurpose image watermarking algorithm based on multistage vector quantization [J]. Image Processing, IEEE Transactions (S1057-7149), 2005, 14(6): 822-831.
  • 6J J Eggers, J K Su, B Girod. Robustness of a Blind Image Watermarking Schem [C]// Proceedings of IEEE International Conference on Image Processing, Vancouver, Canada, USA: IEEE, 2000.
  • 7Eggers J J, Girod B. Blind watermarking applied to image authentication [C]// Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 01). USA: IEEE, 2001, 1977-1980.
  • 8ISO/IEC JTC 1/SC 29 (2009-05-07). "ISO/IEC JTC 1/SC 29/WG 1 - Coding of Still Pictures (SC 29/WG 1 Structure)" [S]. Retrieved 2009-11-11.
  • 9Zhao H. Algorithm of digital image watermarking technique combined with HVS [C]//'Proc. 3rd IEEE Int Computer Science and Information Technology (ICCS1T) Conf. USA: IEEE, 2010, 774-777.
  • 10Brian Chen, Gregory W. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding [J]. IEEE Transaction on Information Theory (S0018-9448), 2001, 47(4): 1423-1443.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部