CFP last date
22 April 2024
Reseach Article

Double Security Watermarking Algorithm for 3D Model using IEEE-754 Floating Point Arithmetic

by Hitendra Garg, Suneeta Agrawal, Gopalji Varshney
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 9
Year of Publication: 2012
Authors: Hitendra Garg, Suneeta Agrawal, Gopalji Varshney
10.5120/6937-9302

Hitendra Garg, Suneeta Agrawal, Gopalji Varshney . Double Security Watermarking Algorithm for 3D Model using IEEE-754 Floating Point Arithmetic. International Journal of Computer Applications. 46, 9 ( May 2012), 18-22. DOI=10.5120/6937-9302

@article{ 10.5120/6937-9302,
author = { Hitendra Garg, Suneeta Agrawal, Gopalji Varshney },
title = { Double Security Watermarking Algorithm for 3D Model using IEEE-754 Floating Point Arithmetic },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 9 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number9/6937-9302/ },
doi = { 10.5120/6937-9302 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:39:18.594631+05:30
%A Hitendra Garg
%A Suneeta Agrawal
%A Gopalji Varshney
%T Double Security Watermarking Algorithm for 3D Model using IEEE-754 Floating Point Arithmetic
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 9
%P 18-22
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the fragile watermarking scheme authenticate the user but unable to locate the region of tampering. The objective of proposed scheme is not only maintaining the quality of watermark 3D object at its acceptable level but also identify the region of tampering. During the process of watermarking embedding the normal distance of each vertex from center of mass is calculated and marked vertices are converted into IEEE-754 floating point representation in double precision. Cryptographic hash function is applied to find the mark vertices. The watermark is inserted in each of the segments of 3D model so that authentication may be done through any of the segment. Fragile watermarking technique is used for authentication in case of multiple user claims for the single object. It is very important to protect and authenticate the 3D model.

References
  1. Chang-Min Chou , Din-Chang Teeng " A public fragile watermarking scheme for 3-D model authentication " ELSEVIER , Computer-Aided Design 38(2006) 1154-1165.
  2. Ohbuchi R, Hiroshi Masuda, Masakionom " Watermarking Three-Dimensional Polygonal Models Through Geometric and opological Modifications" IEEE J Sel Areas Common 1998;16:551-60.
  3. Ohbuchi R, Hiroshi Masuda, MasakiAono". Watermarking Three-Dimensional Polygonal Models" ACM Multimedia 1997-0-89791- 991-2/97/11.
  4. Mao X, Shiba M and Imamiya A" Watermarking 3D geometric models through triangle subdivision "Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III (ed. Wong PW and Delp EJ), 4314, 253–260.
  5. Wagner et al. "Robust watermarking of polygonal meshes ". Geometric Modeling and Processing, 2000 Hong Kong.
  6. Yin K, Pan Z, Shi J and Zhang "Robust mesh watermarking based on multiresolution processing. " Computers & Graphics D2001 25, 409–420.
  7. Jeonghee J, Lee SK and Ho YS "A three-dimensional watermarking algorithm using the DCT transform of triangle strips" Digital Watermarking Second International Workshop, IWDW,Berlin. 2003.
  8. Mitrea M, Zaharia T and Preteux F 2004 Spread spectrum robust watermarking for NURBS surfaces. WSEAS Transactions on Communications 3(2), 734–740.
  9. Paun E , Hoppe H, Finkestein A " Tobust mesh Watermarking" In ACM siggraph proc 1999.
  10. Hoppe H " Progressive mesh" In ACM siggraph proc 1996
  11. Yeo BL , Yeung MM " Watermarking 3D object for verification" IEEE Computer Graph Appl 1999;19:36-45
  12. Besl P. and McKay N. (1992) "A method for registration of 3D shapes" IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 18 (14), pp. 239–128.
  13. Chen Y. and Medioni G. (1992) "Object modelling by registration of multiple range images" Image and Vision Computing, April, Vol. 10(3), pp. 145–155.
  14. M. Barni, F. Bartolini, V. Cappellini, M. Corsini, and A. Garzelli : "Digital watermarking of 3D meshes," SPIE proceedings series, SPIE, Bellingham WA, 2004
  15. T. O. Wells, "Electronic and digital signatures: in search of a standard," IT Professional, Vol. 2, Issue 3, pp. 24-30, 2000.
  16. Chou CM , Tseng DC "A Public Fragile Watermarking Scheme for 3D model authentication" Computer-Aided Design 2006;38(11):1154-65
  17. Wei-Bo Wang et al "A numerically stable fragile watermarking scheme for authenticating 3D model" ELSEVIER , Computer-Aided Design 40(2008) 634-645
  18. W. Diffie and M. E. Hellman, "Privacy and authentication:An introduction to cryptography," Proceedings of the IEEE,Vol. 67, Issue 3, pp. 397-427, 1979.
  19. W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Information Theory, Vol. 22, Issue 6, pp. 644-654, 1976.
  20. L. Xie and G. R. Arce, "A class of authentication digital watermarks for secure multimedia communication," IEEE Trans. Image Processing, Vol. 10, No. 11, pp. 1754-1764, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Copyright Protection Hash Function Payload Cover Object