Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Double Security Watermarking Algorithm for 3D Model using IEEE-754 Floating Point Arithmetic

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 46 - Number 9
Year of Publication: 2012
Authors:
Hitendra Garg
Suneeta Agrawal
Gopalji Varshney
10.5120/6937-9302

Hitendra Garg, Suneeta Agrawal and Gopalji Varshney. Article: Double Security Watermarking Algorithm for 3D Model using IEEE-754 Floating Point Arithmetic. International Journal of Computer Applications 46(9):18-22, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Hitendra Garg and Suneeta Agrawal and Gopalji Varshney},
	title = {Article: Double Security Watermarking Algorithm for 3D Model using IEEE-754 Floating Point Arithmetic},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {46},
	number = {9},
	pages = {18-22},
	month = {May},
	note = {Full text available}
}

Abstract

Most of the fragile watermarking scheme authenticate the user but unable to locate the region of tampering. The objective of proposed scheme is not only maintaining the quality of watermark 3D object at its acceptable level but also identify the region of tampering. During the process of watermarking embedding the normal distance of each vertex from center of mass is calculated and marked vertices are converted into IEEE-754 floating point representation in double precision. Cryptographic hash function is applied to find the mark vertices. The watermark is inserted in each of the segments of 3D model so that authentication may be done through any of the segment. Fragile watermarking technique is used for authentication in case of multiple user claims for the single object. It is very important to protect and authenticate the 3D model.

References

  • Chang-Min Chou , Din-Chang Teeng " A public fragile watermarking scheme for 3-D model authentication " ELSEVIER , Computer-Aided Design 38(2006) 1154-1165.
  • Ohbuchi R, Hiroshi Masuda, Masakionom " Watermarking Three-Dimensional Polygonal Models Through Geometric and opological Modifications" IEEE J Sel Areas Common 1998;16:551-60.
  • Ohbuchi R, Hiroshi Masuda, MasakiAono". Watermarking Three-Dimensional Polygonal Models" ACM Multimedia 1997-0-89791- 991-2/97/11.
  • Mao X, Shiba M and Imamiya A" Watermarking 3D geometric models through triangle subdivision "Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III (ed. Wong PW and Delp EJ), 4314, 253–260.
  • Wagner et al. "Robust watermarking of polygonal meshes ". Geometric Modeling and Processing, 2000 Hong Kong.
  • Yin K, Pan Z, Shi J and Zhang "Robust mesh watermarking based on multiresolution processing. " Computers & Graphics D2001 25, 409–420.
  • Jeonghee J, Lee SK and Ho YS "A three-dimensional watermarking algorithm using the DCT transform of triangle strips" Digital Watermarking Second International Workshop, IWDW,Berlin. 2003.
  • Mitrea M, Zaharia T and Preteux F 2004 Spread spectrum robust watermarking for NURBS surfaces. WSEAS Transactions on Communications 3(2), 734–740.
  • Paun E , Hoppe H, Finkestein A " Tobust mesh Watermarking" In ACM siggraph proc 1999.
  • Hoppe H " Progressive mesh" In ACM siggraph proc 1996
  • Yeo BL , Yeung MM " Watermarking 3D object for verification" IEEE Computer Graph Appl 1999;19:36-45
  • Besl P. and McKay N. (1992) "A method for registration of 3D shapes" IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 18 (14), pp. 239–128.
  • Chen Y. and Medioni G. (1992) "Object modelling by registration of multiple range images" Image and Vision Computing, April, Vol. 10(3), pp. 145–155.
  • M. Barni, F. Bartolini, V. Cappellini, M. Corsini, and A. Garzelli : "Digital watermarking of 3D meshes," SPIE proceedings series, SPIE, Bellingham WA, 2004
  • T. O. Wells, "Electronic and digital signatures: in search of a standard," IT Professional, Vol. 2, Issue 3, pp. 24-30, 2000.
  • Chou CM , Tseng DC "A Public Fragile Watermarking Scheme for 3D model authentication" Computer-Aided Design 2006;38(11):1154-65
  • Wei-Bo Wang et al "A numerically stable fragile watermarking scheme for authenticating 3D model" ELSEVIER , Computer-Aided Design 40(2008) 634-645
  • W. Diffie and M. E. Hellman, "Privacy and authentication:An introduction to cryptography," Proceedings of the IEEE,Vol. 67, Issue 3, pp. 397-427, 1979.
  • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Information Theory, Vol. 22, Issue 6, pp. 644-654, 1976.
  • L. Xie and G. R. Arce, "A class of authentication digital watermarks for secure multimedia communication," IEEE Trans. Image Processing, Vol. 10, No. 11, pp. 1754-1764, 2001.