Multimedia-Sci Forschen

Full Text

Research article
A Survey of the 3D Triangular Mesh Watermarking Techniques

  Nassima Medimegh1*       Samir Belaid2      Naoufel Werghi3   

1MARS Research Unit, UR11ES57, National Engineering School of Monastir, University Monastir, Tunisia
2MARS Research Unit UR11ES57, Faculty of Sciences, Uni- versity of Monastir, Tunisia
3Department of Electrical and Computer Engineering, Khalifa University, Sharjah, UAE

*Corresponding author: Nassima Medimegh, MARS Research Unit, UR11ES57, National Engineering School of Monastir, University Monastir, Tunisia, E-mail: medimegh_nassima@yahoo.fr


Abstract

Research efforts in digital watermarking have been mainly on audio, image and video data. Only recently, 3D watermarking has attracted the attention, due to the increasing proliferation of the 3D object scans and models, and the new trend of 3D imaging and communication witnessed in many areas, such as medicine, architecture and entertainment. In this paper, we present a compilation and description of the current state of the art in 3D triangular mesh watermarking. After a description of the different categories, paradigms, and methods develop so far, we provide a comparative study highlighting their merits and the shortcomings with respect to a set of standard criteria.

Keywords

3D Watermarking; 3D Triangular Mesh; Robust Watermarking; Fragile Watermarking

Introduction

The recent advances of 3D shape acquisition and CAD technology and the widespread of 3D models across a variety of sectors spanning, Manufacturing, Medicine and Entertainment, raised concerns on their ownership protection, integrity verification, content tracing and last but not least about their usage for hiding information. 3D watermarking came as new technology for addressing these issues.

3D object models include parametric surfaces, cloud of 3D points, and polygonal mesh. This last is the most supported format. In this type of model, the surface is composed of a set of polygons stitched together to form the model shape. The mesh is encoded essentially of the polygons vertices’s coordinates and the vertices connectivity within each polygon. But other topological information can also be derived such as the polygons connectivity or adjacency. Triangular mesh is the most commonly used mesh because of its simplicity and flexibility. Contrary to other polygons, triangle is the only polygon in which vertices are guaranteed to be coplanar.

3D triangular mesh watermarking is the process of embedding information into the mesh model. In addition the watermark term is employed in ownership protection, content labeling, authentication, and distribution channel tracing. The embedded data is also referred by the term payload in steganography applications, when the goal is to use the 3D mesh model as a medium for carrying secret information.

There are two major issues that make 3D triangular mesh models watermarking quite problematic com- pared to other media watermarking such as image and audio, namely: (1) 3D triangular mesh models lack an ordered structure that would allow a systematic analysis of model’s surface, and (2) between the complexity and richness of 3D models in one hand, and the in- creasing number of meshes manipulation graphic tools in another hand, it becomes impossible to anticipate all attacks.

A variety of paradigms, methods and techniques have been developed to address the aforementioned challenges. This variety followed the same categorization found in its 2D counterpart. So 3D watermarking falls into two categories, namely, fragile and robust. Fragile watermarking, aims to inform about attempts for altering a model. Whereas robust watermarking is meant to endure and survive malicious mesh alterations, referred conventionally by the term attacks. These attacks can be categorized into geometric attacks that include geometric transformation, scaling, smoothing, topological attacks (mesh simplification, subdivision and remeshing). Other type of attacks targets the structure of the integrity of the model, such as cropping.

In fragile or robust watermarking, data embedding can be applied in the spatial or the spectral domain. In the former the data is embedded by altering locally or globally the geometry or the topology of the model surface. Whereas the latter involves the modification of a certain components of a spectral transform coefficients. Data embedding can also be qualified to be blind or non-blind, depending whether or not the original digital content is required to extract the embedded data

Watermarking methods can also be categorized as deterministic or statistical. Methods from the first category employ a set of constraints for embedding messages while the second category extract the message by using a statistical test and performing statistical changes in distributions of measurements from the object’s mesh. This category was not mentioned in the previous surveys [1,2].

The rest of the paper will be organized as follows: In Watermarking Methods section, we will go through a detailed review of the current 3D watermarking works. Then in Comparative Study section we draw a comparative study. Finally, we terminate the paper with concluding remarks and future research directions.

Watermarking Methods

As mentioned previously, watermarking methods can be segmented into robust methods and fragile methods according to the application purposes. These can be also classified into different sub-categories depending on the nature of the model alterations.

$$Corr = {{\sum\nolimits_{n = 0}^{N - 1} {\left( {{\omega _n} - \bar \omega } \right)\left( {\omega _n^' - \bar \omega '} \right)} } \over {\sqrt {\sum\nolimits_{n = 0}^{N - 1} {{{\left( {{\omega _n} - \bar \omega } \right)}^2}\, \times \,\sum\nolimits_{n = 0}^{N - 1} {{{\left( {{{\omega '}_n} - \bar \omega '} \right)}^2}} } } }}$$
Robust methods

A robust method is designed to protect the copyright. These methods can be classified into spatial methods and spectral methods.

Spatial methods: These methods act either on the geometry or the topology of the model. The geometry included the vertices, the facets and the normals. The topology encompasses connectivity features. The elementary entity carrying the watermark data is referred by the watermark primitive. Many methods operate on the triangular facet as a watermark primitive. Benedens [3] proposed a technique based on the Extended Gaussian Image. In the same context Kwon et al. [4] proposed a semiblind technique that employed rather a local version of the EGI. The EGI has been augmented by an imaginary component by Lee et Kwon [5,6], and dubbed it, the CEGI. They claimed the same level of invisibility than Benedenss methods [3], in addition to its robustness against remeshing, simplification, cropping and noising.

Recently, Jing et al. [7] proposed a non-blind method using the average of normal to establish a new coordinates system. The signature is inserted into the selected vertices according to area of the two adjacent rings and in function of the curvature of the facets.

In another method, Benedens [8] proposed algorithm, dubbed vertex flood, whereby the distance to the center of mass of reference triangles is changed to encode the watermark bits. In a similar approach Yu et al. [9] inserted a bit by modifying the distance between a group of vertices and the center of mass of the mesh. The set of vertices are grouped according to a secret key. The method is non-blind and robust to simplification, noising as well as to some attack combination. However this method can produce a significant local geometry alteration as noticed by Zoran and Zeljka [10] whom proposed an improved variant in which the verticess displacement is moderated. Kuo et al. [11] introduced the moment-preserving method [12], in which groups of neighboring facets are selected and classified using some specific geometric moments in order to hold the embedded bits. Recently, Rolland-Neviere X et al. [13] generalized a framework for 3Dmesh watermarking. A method consists of modifying the vertex positions along the radial directions.

Other type of methods used particular special volumes for inserting data bits. Harte et al. [14] presented a blind watermarking scheme in which the embedded vertices are confined within ellipsoid or rectangular volumes. The embedding is performed by a vertex displacement function of their neighborhood and the bit to be inserted. Figure 1 depicts the insertion of 110 in three areas of the mesh using the method of Harte et al. [14]. He and Li [15] proposed to embed the watermark by modifying the location of vertices within their related space. Eshraghi and Samavati [16] followed this paradigm and suggested to displace the vertices in their tangent space.

Among the techniques that modify the geometry, there are also the statistical methods which extract the watermark using a statistical test. Some works performed data embedding using spherical coordinates (ρ,θ,ϕ) as was firstly proposed by Zafeiriou et al. [17]. In this work, he proposed the Principal Object Axis (POA) method whereby the major axis of the object is aligned with the z axis, and the data is embedded by moving the ρ component of the vertex the along the radial axis. This method is robust to similarity transforms. In a second method, dubbed Sectional Principal Object Axis (SPOA), he restricted the displacements to set vertices having the coordinate θ within specific ranges in order to achieve robustness against mesh simplifications. A similar method was proposed by Kalivas et al. [18]. Another research [19] has explored the spherical coordinates system, where only the vertex norm of each point is modified. The embedding function is based on the Spread Transform Dither Modulation (STDM). The perceptual modulation controls the amount of quantization distortion, depends on both the roughness and the curvature at vi . This method is not robust to reordering and simplification attacks.

Cho et al. [20] proposed a blind statistical method. In this work, either the mean or the variance of normalized distributions of vertex norms is changed according to the watermark code. This method show excellent robustness against most common mesh attacks, such as additive noise, smoothing and mesh simplification. However, these algorithms produce visible artifacts such as ripples on the 3D object surface. Al-face et al. [21] have applied locally the method of Cho et al. [20]. The algorithm consists of detecting robust shape feature points which are then used for embedding a watermark in a local neighborhood. Some optimizations however should be developed to improve the watermarking system.

Hu et al. [22] proposed a similar histogram-based method for watermarking 3D polygonal meshes by using quadratic programming. This method is more resistant to Gaussian noise, compared with Cho’s method.

Luo and Bors [23] used the Quadratic Selective vertex placement scheme in order to find the best location of each vertex after modifying the statistics of the distances. In [24] they proposed a new statistical 3D water- marking method based on embedding into geodesic distance distribution calculated using the Fast Marching method (FMM). Nakazawa et al. [25] presented a new blind watermarking method. They firstly segmented the 3D triangular mesh using the mesh saliency based on the surface curvature. Then, they embedded the watermarks to the regions by statistically modulating the vertex norms. In the same context, Zhan et al. [26] proposed a blind watermarking algorithm based on vertex curvature. The watermark is embedded into vertex bins by modulating the mean fluctuation values of the bins. Generally this method has better robustness and better visual masking then Cho et al. [19].

Bors and Luo [27] proposed a new statistical approach to 3D watermarking by minimizing the 3D object surface distortion. They used the Levenberg Marquardt optimization method for vertices represented in spherical coordinates.

Topological methods proceed with data embedding by altering the connectivity and other topologic features of the mesh. Mao et al. [28] suggested subdividing triangles and inserting the data in the newly formed vertices. This method is robust to affine transformation. The triangle flood algorithm [8] of Benedend generates a unique path in the mesh, based on topological and geometric information, along which the data is inserted.

Spectral methods: Basically, spectral methods embed the data in certain coefficients of harmonic or multiscale transform. These methods have been developed to address attacks other than non-similarity transforms, such as simplification, remeshing, etc. Inspired by the Laplacian matrix-based mesh compression of Karni and Gotsman [29], several methods used the Laplacian coefficients for data embedding in different variants. Ohbuchi et al. [30] applied this paradigm to mesh model. They applied eigenvalue decomposition of a Laplacian matrix derived from mesh connectivity; they embed the watermark by modifying the coefficients amplitudes. Their method is robust to smoothing, moderate noise addition and cropping. So did Abdellah et al. [31], however, with a non-blind technique. These methods are robust to smoothing and some attack combination. Murotani and Segihara [32] methods embedded the watermark in the singular spectral coefficients, reducing thus the dimension of the matrix. The method is not robust to connectivity changes however.

Cayre et al. [33] developed the first blind method employing piece-wise Laplacian decomposition. The message is inserted repeatedly on the low and medium frequency to ensure robustness. Alface et al. [34] proposed to segment the 3D object patch in order to reduce embedding complexity by using the same process of Cayre [35]. This method also suffers from the problem of low strength. Recently, Yang and Ivrissimtzis [36] proposed blind watermarking algorithm by changing the Laplace coordinates.

Liu et al. [37] proposed the use of the Fourier-Like Manifold Harmonics Transform (MHT). This transform is invariant to the resolution and embedding, thus making it immune to mesh simplification and noiseaddition. Wang et al. [38] proposed a robust and blind algorithm based on MHT. In contrast to the Lius method where only 5 bits are inserted, the method of Wang is capable to insert 16 bits. Another method based on MHT, Wang et al. [39] proposed a robust non blind watermarking algorithm for two-manifold mesh by combining manifold harmonic basis and elliptic curve digital signature algorithm. They segmented a 3D mesh into patches and embedded the watermark into the low frequency spectral coefficient of each patch. The algorithm improves the visual quality of the watermarked mesh.

Wu and Kobbelt [40] proposed a robust and fast spectral watermarking scheme for large meshes using a new orthogonal basis functions based on radial basis function. In order to enhance further the robustness against attacks, Praun et al. [41] developed a method based on the principles of spread-spectrum watermarking, previously employed in images, sound, and video. The spread-spectrum method [41] embeds the watermark at multiple scales into the perceptually salient features of the model. It has proven to be robust against a much broad range of attacks.

Multi-scale methods used mostly the wavelet trans- form (WT). Here data bits are inserted in the WT coefficients. Kanai et al. [42] non-blind method was among the first attempts in this category. They used the multi-resolution decomposition of Eck et al. [43].

Ucchedu et al. [44] presented a novel algorithm, whereby vertices at a given resolution-level and the related coefficients at the same level are used for bit insertion. Kim et al. [45] addressed multi-resolution watermarking of irregular mesh with the so-called irregular wavelet analysis scheme. Yin et al. [46] rather employed Burt-Adelson pyramid decomposition [47]. Hoppe et al. [48] proposed a mulit-resolution framework based on the edge-collapsing operator. Driven by the goal of achieving trade-off between imperceptibility and robustness, Motwani et al. [49] proposed WT-based watermarking using Fuzzy logic to set optimal amplitude of the watermark. Seoud et al. [50] introduced a robust watermarking method based on a spherical wavelet transformation. They applied the watermarking to 3D compressed model using a multilayer feed-forward neural network (MLFF).

Other authors such as [51-52] found advantages (increasing the capacity and enhancing the robustness) in using the spherical variants of the multi-resolution analysis such as [51] whom used spherical wavelet transform and, [52] whom adopted a spherical parameterization, and [53] who proposed the concept of Oblate Spheroidal Harmonics. Chen et al. [54] developed a non-blind watermarking method based on BNBW (biorthogonal non Uniform B-Spline Wavelets). The signature is inserted by modifying vectors of wavelet coefficients according to the bit of the signature.

Recently, Tamane et al. [55] have proposed a blind algorithm. This method inserted the optimization parameter and signature encoded by the transformation of Arnold, in the coe_cients of mid-band DCT after applying Haar transform on the 3D model. It is robust against attacks: rotation, translation, noise addition, cropping, smoothing. Xiaoqing F et al. [56] presented a new robust and blind 3D mesh watermarks algorithm. They embedded two kinds of watermarks into mesh model. The first one is inserted into DCT (Discrete Cosine Transform) frequency domain in some feature patches which are achieved using watershed segmentation. The second watermark is based on redundancy information of 3D model, such as vertex coordinates and vertex order. This algorithm cannot resist to simplification and re-meshing.

Fragile methods

Fragile watermarking is used for checking the authenticity and the integrity of 3D mesh model. In this context the watermark is meant to be sensitive to the least amount of mesh modifications as well as to indicate the locations of such modification in the mesh. As for robust watermarking, methods in the category can be segmented into spatial and spectral methods.

Spatial methods: Yeung and Yeo [57,58] pioneered the firrst fragile watermarking of 3D models for verification purposes by extending a 2D image watermarking to 3D. They proposed the idea of moving the vertices to new positions so that each vertex has the same value for two different and predefined hash functions. Attacks can then be revealed by the presence of vertices that do not comply with this condition. In this method the hash functions requires a predefined order of the vertices within the 1-ring neighborhood, otherwise the scheme become vulnerable to the causality problem.

Ohbuchi et al. [59] method embeds the data on a facet quadruples across the whole mesh. The quadruple facets must satisfy similarity conditions, dubbed, Triangle Similarity Quadruple (TSQ), used to recall them when the embedded information is retrieved. Each quadruple store quadruple of symbols composed of marker, subscript and two information data. These are embedded in the dimensionless features of the triangles (e.g. edge ratios), thus modifying the vertices’ positions. To avoid the causality problem the facet quadruples should not be connected to each other. To set the insertion area, they used the Macro Primitive Embedding configuration (MEP). In Figure 2, we have example of MEP. This configuration consists of a central triangle that is used to store the key by changing the size {e14/e24, h4 /e12} and then change the V1 V2 V3 peaks, one of his neighbors contains the index inserted into the pair {e02/e01, h0 / e12} and the other two remaining neighbors are used to record data values in pairs. The message is inserted in all the MEPs in the same way. To detect the message, simply find the MEPs and extract the index and the inserted data. The mesh can contain more MEPs in order to insert a lot of data as shown in the example of Figure 3.

Lin et al. [60] approached the causality problem by proposing a rearrangement of the vertices harmless to the embedded watermark and making the two hash functions depending only of the position of the current vertex. Chou et al. [61] proposed a watermarking mechanism in which one of the hash functions is dependent of the mean of the 1-ring vertex neighborhood.

High capacity steganographic methods, where the integrity of the hidden data is a requirement, can be also classified as fragile. In these methods vertex are altered to embed data bits. The larger the number of bits, the higher will be the capacity of the method. Cayre and Macq [35] proposed a two-stage blind method where first the select a candidate stripe of triangles, then they perform bit embedding by projecting a triangle summit on the opposite edge segmented into two equal intervals. A facet is assigned the bit 0 or 1 depending on which segment the projection occurred as shown in Figure 4. The synchronization used some local (e.g. largest facet) or global (e.g. facet intersecting the largest principal axes) geometrical features.

In the same context, Werghi et al. [62] proposed a new method. They apply the method of Cayre and Macq [35] on a sequence of facets selected using the ORF structure [63] (Ordered Rings Facets).

Bors [64] proposed a blind watermarking method that locally embeds a string of bits on a set of vertices selected and ordered based on a certain distortion visibility criterion. The vertices associated to 0 (respectively 1) are shifted outside (respectively inside) a bounding volume. He proposed two variants, in the first the bounding volume is an ellipsoid defined by principal axes of the covariance matrix computed over the set 1- ring neighborhood. The second used abounded parallel planes. Here the vertex is moved along or opposite to the plane’s normal depending of the bit value assigned to it. Wu and Chueng [65] developed an algorithm similar to the vertex Flood [8] by quantifying the distance between a facet and a center of mesh. Cheng and Wang [66] changed the position of the vertex in order to have a high capacity method. Huang et al. [67] proposed a new scheme fragile watermarking based on spherical coordinates.

Recently, Bata et al. [68] proposed a secure watermarking scheme based on LDPC codes. The proposed scheme consist on combining sparse quantized index modulation (QIM) for data hiding with run- length modulated low-density parity-check (LDPC) codes for recovering deleted watermark bits.

A fragile method acting on the mesh connectivity, dubbed Triangle Strip Peeling Symbol sequence (TSPS), was also introduced by Ohbuchi et al. [59]. The method consists in cutting out a stripe from the mesh except from one attaching edge that marks the start of the stripe. Figure 5 is an example of stripe. The stripe is formed by repeatedly appending adjacent facets trough a path encoded in the message data. The stripe can be shaped as a meaningful pattern that becomes visible when the mesh undergoes global connectivity alteration. However in this method the watermark cannot spread over the whole mesh, this reduces its capabilities for integrity authentication.

Spectral methods: In the frequency space, geometrical wavelettransform has been an attractive tool. Here the watermark is inserted by altering the wavelet-transform coefficients computed at each facet or by altering the facets at given wavelet-transform resolution to equate predefined functions. Cho et al. [69] followed the latter paradigm by embedding the watermark data in facets of the lower resolution of the wavelet transform. This method suffers, however, from the causality transform. The method of Wang et al. [70] rather than alter the module and the orientation of the one-level WT coefficients to keep a same watermark symbol across the whole facets. This scheme has been also extended to multi-resolution levels [71].

Comparative Study

A watermarking algorithm should meet several requirements, on the top of them comes the robustness to as much as possible types of attacks and good watermark invisibility. We will discuss them in the following sections.

Distortion evaluation

Naturally, the watermarking process should verify a good visual imperceptibility of the watermark by reducing distortion effects caused by the watermark to the minimum. Mesh distortion is evaluated with the Metro method [72] which consists to calculate the Hausdorff Distance HD between the original mesh model and watermarked one. To measure the HD the following formula is used:

HD = max{h(M1 ), h(M2 )}           (1)

Where M1 = (V,V ’) and M2 = (V ’, V), (V and V ’ rep resent respectively the original mesh and watermarked mesh).

h(M1 )=max{min(d(a,V’))}, a in V ,

h(M2 )=max{min(d(b,V))}, b in V’.

Robustness measurement

The robustness indicates how resistant the watermarking scheme when the mesh object is subjected to attacks. The most common robustness measurements are the Bit Error Rate (BER) and the correlation between the inserted watermark bit and the extracted one. To validate the robustness of the algorithm, the correlation is introduced to measure the similarity between the extracted watermark sequence and the original watermark sequence:

 

 

 

References
  1. Chou CM, Tseng DC (2007) Technologies for 3D Model Watermarking: A Survey. IJCSNS International Journal of Computer Science and Network Security 7: 328-334. [Ref.]
  2. Wang K, Lavoue G, Denis F, Baskurt A (2008) A Comprehensive Survey on Three-Dimensional Mesh Watermarking. IEEE Transactions on Multimedia 10. [Ref.]
  3. Benedens O (1999) Geometry-Based Watermarking of 3D Models. IEEE Computer Graphics and Applications 46-55. [Ref.]
  4. Kwon KR, Kwon SG, Lee SH, Kim TS, Lee KI (2003) Watermarking for 3D Polygonal Meshes Using Normal Vector Distributions of each Patch. International Conference on Image Processing. ICIP. Proceedings 2: 499-502. [Ref.]
  5. Lee SH, Kwon KR (2007) A Watermarking for 3D Mesh Using the Patch CEGIs. Digital Signal Processing 396-413. [Ref.]
  6. Lee JW, Lee SH, Kwon KR, Lee KI (2005) Complex EGI Based 3D Mesh Watermarking. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E88: 1512- 1519. [Ref.]
  7. Jing L, Yinghui W, Wenjuan H, Ye L (2014) A New Watermarking Method of 3D Mesh Model. TELKOMNIKA Indonesian Journal of Electrical Engineering 1610-1617. [Ref.]
  8. Benedens O (1999) Two High Capacity Methods for Embedding Public Watermarks into 3D Polygonal Models. Proceedings of the Multimedia and Security Workshop at ACM Multimedia, Orlando, FL 95-96. [Ref.]
  9. Yu Z, Ip HHS, Kwok LF (2003) A Robust Watermarking Scheme for 3D Triangular Mesh Models. Pattern Recognition 36: 2603-2614. [Ref.]
  10. Ruinovi Z, Mihajlovi Z (2005) Robust Watermarking for 3D Objects. Proceeding of the MIPRO 2005: Hypermedia and GRID systems, Opatija, Croatia 271-276. [Ref.]
  11. Kuo CT, Wu DC, Cheng SC (2009) 3D Triangular Mesh Watermarking for Copyright Protection Using Moment-Preserving. International Conference on Intelligent Information Hiding and Multimedia Signal Processing 136-139. [Ref.]
  12. Cheng SC, Wu TL (2005) Subpixel Edge Detection of Color Images by Principal Axis Analysis and Moment- Preserving Principle. Pattern Recognition 38: 527-537. [Ref.]
  13. Rolland-Neviere X, Doerr G, Alliez P (2014) Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework. IEEE Transactions on Information Forensics and Security. [Ref.]
  14. Harte T, Bors A (2002) Watermarking 3d models. Proceedings of International Conference on Image Processing 3: 661-664. [Ref.]
  15. Guang HW, Yan L (2009) A Local Space Based Watermarking Algorithm for Three Dimensional Meshes. International Symposium on Computer Network and Multimedia Technology 1-4. [Ref.]
  16. Eshraghi M, Samavati F (2007) 3D Watermarking Robust to Accessible Attacks. Proceedings of the First International Conference on Immersive Telecommunications. [Ref.]
  17. Zafeiriou S, Tefas A, Pitas I (2005) Blind Robust Watermarking Schemes for Copyright Protection of 3D Mesh Objects. IEEE Trans Vis Comput Graph 11: 596-607. [Ref.]
  18. Kalivas A, Tefas A, Pitas I (2003) Watermarking of 3D Models using Principal Component Analysis. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing 5: 676-679. [Ref.]
  19. Darazi R, Hu R, Macq B (2010) Applying spread transform dither modulation for 3D-mesh watermarking by using perceptual models. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing 1742-1745. [Ref.]
  20. Cho JW, Prost R, Jung HY (2007) An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing 55: 142-155. [Ref.]
  21. Alface PR, Macq B, Cayre F (2007) Blind and robust watermarking of 3d models: how to withstand the cropping attack? IEEE International Conference on Image Processing 465-468. [Ref.]
  22. Hu R, Alface PR, Macq B (2009) Constrained optimisation of 3d polygonal mesh watermarking by quadratic programming. IEEE International Conference on Acoustics, Speech and Signal Processing 1501-1504. [Ref.]
  23. Luo M, Bors AG (2009) Shape watermarking based on minimizing the quadric error metric. IEEE International Conference on Shape Modeling and Applications 103-110. [Ref.]
  24. Luo M, Bors AG (2011) Surface-Preserving Robust Watermarking of 3-D Shapes. IEEE Trans Image Process 20: 2813-2826. [Ref.]
  25. Nakazawa S, Kasahara S, Takahashi S (2010) A Visually Enhanced Approach to Watermarking 3D Models. Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 110-113. [Ref.]
  26. Zhan YZ, Li YT, Wang XY, Oian Y (2014) A blind watermarking algorithm for 3D mesh models based on vertex curvature. J Zhejiang Univ-Sci C (Comput Electron) 15: 351-362. [Ref.]
  27. Bors AG, Luo M (2013) Optimized 3D Watermarking for Minimal Surface Distortion. IEEE Trans Image Process 1822-1835. [Ref.]
  28. Mao X, Shiba M, Imamiya A (2001) Watermarking 3D Geometric Models through Triangle Subdivision. Proceedings of the SPIE 4314: 253-260. [Ref.]
  29. Karni Z, Gotsman C (2000) Spectral compression of mesh geometry. Proceedings of the 27th annual conference on Computer graphics and interactive techniques 279-286. [Ref.]
  30. Ohbuchi R, Mukaiyama A, Takahashi S (2002) A Frequency Domain Approach to Watermarking 3D Shapes. Computer Graphics Forum 21: 373-382. [Ref.]
  31. Abdallah EE, Hamza AB, Bhattacharya P (2007) Spectral Graph Theoretic Approach to 3D Mesh Watermarking. Proceedings of Graphics Interface 327-334. [Ref.]
  32. Murotani K, Sugihara K (2003) Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis. Proceedings of the IMA International Conference on the Mathematics of Surfaces 85-98. [Ref.]
  33. Cayre F, Alface PR, Schmitt F, Macq B, Maitre H (2003) Application of Spectral Decomposition to Compression and Watermarking of 3D Triangle Mesh Geometry. Signal Processing 18: 309-319. [Ref.]
  34. Alface PR, Macq B (2005) Blind watermarking of 3d meshes using robust feature points detection. IEEE International Conference on Image Processing 693-696. [Ref.]
  35. Cayre F, Macq B (2003) Data hiding on 3-D triangle meshes. IEEE Transactions on Signal Processing 51: 939-949. [Ref.]
  36. Yang Y, Ivrissimtzis I (2010) Polygonal mesh watermarking using Laplacian coordinates. Euro graphics Symposium on Geometry Processing 29: 1585-1593. [Ref.]
  37. Liu Y, Prabhakaran B, Guo X (2008) A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces. 10th ACM Workshop on Multimedia and Security 43-52. [Ref.]
  38. Wang K, Luo M, Bors A, Denis F (2009) Blind and robust mesh watermarking using manifold harmonics. IEEE International Conference on Image Processing 3657-3660. [Ref.]
  39. Wang J, Feng J, Miao Y (2012) A robust confirmable watermarking algorithm for 3D mesh based on manifold harmonics analysis. Vis Comput 28: 1049-1062. [Ref.]
  40. Wu J, Kobbelt L (2005) Efficient Spectral Watermarking of Large Meshes with Orthogonal Basis Functions. Visual Comput 21: 848-857. [Ref.]
  41. Praun E, Hoppe H, Finkelstein A (1999) Robust Mesh Watermarking. Proceedings of the 26th annual conference on Computer graphics and interactive techniques 49-56. [Ref.]
  42. Kanai S, Date H, Kishinami T (1998) Digital Watermarking for 3D Polygons Using Multiresolution Wavelet Decomposition. Proceedings of the International Workshop on Geometric Modeling: Fundamentals and Applications 296-307. [Ref.]
  43. Eck M, DeRose TD, Duchamp T, Hoppe H, Lounsbery M, et al. (1995) Multiresolution Analysis of Arbitrary Meshes. Proceedings of the 22nd annual conference on Computer graphics and interactive techniques 95: 173-180. [Ref.]
  44. Uccheddu F, Corsini M, Barni M (2004) Wavelet based Blind Watermarking of 3D Models. Proceedings of the 2004 workshop on Multimedia and security 143-154. [Ref.]
  45. Kim MS, Valette S, H. Jung Y, Prost R (2005) Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis. Proceedings of the International Workshop on Digital Watermarking 313-324. [Ref.]
  46. Yin K, Pan Z, Shi J, Zhang D (2001) Robust Mesh Watermarking Based on Multiresolution Processing. Computers and Graphics 25: 409-420. [Ref.]
  47. Guskov I, Sweldens W, Schroder P (1999) Multiresolution signal processing for meshes. Proceedings of the ACM SIGGRAPH Conference on Computer Graphics 99:325-334. [Ref.]
  48. Hoppe H (1996) Progressive Mesh. Proceedings of the 23rd annual conference on Computer graphics and interactive techniques 99-108. [Ref.]
  49. Motwani M, Beke N, Bhoite A, Apte P, Harris FC (2007) Adaptive Fuzzy Watermarking for 3D Models. Conference on Computational Intelligence and Multimedia Applications 4: 49-53. [Ref.]
  50. El-seoud SA, Rumman NA, Tajeddin IATF, Hatatneh KF, Gutl C (2013) Robust Digital Watermarking for Compressed 3D Models based on Polygonal Representation. International Journal of Computer Applications 61:114. [Ref.]
  51. Jin JQ, Dai MY, Bao HJ, Peng QS (2004) Watermarking on 3D Mesh Based on Spherical Wavelet Transform. J Zhejiang Univ Sci 5: 251- 258. [Ref.]
  52. Li L, Zhang D, Pan Z, Shi J, Zhou K, et al. (2004) Watermarking 3D Mesh by Spherical Parameterization. Computers and Graphics 28: 981-989. [Ref.]
  53. Konstantinides JM, Mademlis A, Daras P (2009) Blind Robust 3D Mesh Watermarking Based on Oblate Spheroidal Harmonics. IEEE Transactions on Multimedia 11: 23-38. [Ref.]
  54. Chen L, Kong X, Weng B, Yao Z, Pan R (2011) A novel robust mesh watermarking based on BNBW 1-9 [Ref.]
  55. Tamane SC, Deshmukh RR, Jadhavpatil V (2013) Optimization of blind 3D model watermarking using wavelets and DCT. 4th International Conference on Intelligent Systems Modelling & Simulation (ISMS) 270-275. [Ref.]
  56. Xiaoqing F, Wenyu Z, Yanan L (2014) Double watermarks of 3D mesh model based on feature segmentation and redundancy information. Multimedia Tools and Applications 68: 497-515. [Ref.]
  57. Yeung MM, Yeo BL (1998) Fragile watermarking of three dimensional objects. Proceedings of International Conference on Image Processing ICIP 2: 442-446. [Ref.]
  58. Yeo B, Yeung MM (1999) Watermarking 3D objects for verification. IEEE Computer Graphics and Applications 19: 36-45. [Ref.]
  59. Ohbuchi R, Masuda H, Aono M (1998) Data Embedding Algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models. Computer Communications 21:1344-1354. [Ref.]
  60. Lin HS, Liao HM, Lu C, Lin J (2005) Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Transactions on Multimedia 7: 997-1006. [Ref.]
  61. Chou CM, Tseng DC (2006) A public fragile watermarking scheme for 3D model authentication. Computer-Aided Design 38: 1154-1165. [Ref.]
  62. Werghi N, Medimegh N, Gazzah S (2013) Data embedding of 3D triangular mesh models using ordered ring facets. SSD 1-6. [Ref.]
  63. Werghi N, Rahayem M, Kjellander J (2012) An ordered topological representation of 3D triangular mesh facial surface: Concept and applications. EURASIP Journal on Advances in Signal Processing 144. [Ref.]
  64. Bors AG (2006) Watermarking mesh-based representations of 3-D objects using local moments. IEEE Trans Image Process 15: 687-701. [Ref.]
  65. Wu HT, Chueng YM (2005) A fragile watermarking scheme for 3D meshes. Proceedings of the 7th workshop on Multimedia and security 117-124. [Ref.]
  66. Cheng YM, Wang CM (2006) A high-capacity stegano graphic approach for 3D polygonal meshes. The Visual Comput 22: 845-855. [Ref.]
  67. Huang CC, Yang YW, Fan CM, Wang JT (2013) A Spherical Coordinate Based Fragile Watermarking Scheme for 3D Models. International Conference on Industrial, IEA/AIE 566-571. [Ref.]
  68. Bata V, Bane V (2013) Simplification Resilient LDPC-Coded Sparse-QIM Watermarking for 3D Meshes. IEEE Transactions on Multimedia. [Ref.]
  69. Cho WH, Lee ME, Lim H, Park SY (2005) Watermarking technique for authentication of 3-D polygonal meshes. Proc. of the International Workshop on Digital Watermarking 259-270. [Ref.]
  70. Wang K, Lavoue G, Denis F, Baskurt A (2008) A fragile watermarking scheme for authentication of semi-regular meshes. Proceedings of the Eurographics 08. [Ref.]
  71. Wang K, Lavoue G, Denis F, Baskurt A (2007) Hierarchical blind watermarking of 3D triangular meshes. IEEE International Conference on Multimedia and Expo 1235-1238. [Ref.]
  72. Cignoni P, Rocchini C, Scopigno R (1998) Metro: Measuring error on simplied surfaces. Computer Graphic Forum 17: 167-174. [Ref.]

Download Provisional PDF Here

 

Article Information

Article Type: Research Article

Citation: Löschner J, Baldini G, Kounelis I, Neisse R (2015) The Use of Policy Regulated Frameworks to Secure Mobile Commerce. Int J Multimed 1(1): doi: http://dx.doi.org/10.16966/ijm.101

Copyright: © 2015 Löschner J, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited

Publication history: 

  • Received date: 29 May, 2015

  • Accepted date: 13 July, 2015

  • Published date: 17 July, 2015
  •