Publishing Service

Polishing & Checking

Journal of Zhejiang University SCIENCE C

ISSN 1869-1951(Print), 1869-196x(Online), Monthly

A blind watermarking algorithm for 3D mesh models based on vertex curvature

Abstract: We propose a robust blind watermarking algorithm for three-dimensional (3D) mesh models based on vertex curvature to maintain good robustness and improve visual masking in 3D mesh models. In the embedding process, by using the local window of vertex, the root mean square curvature is calculated for every vertex of the 3D mesh model and an ordered set of fluctuation values is obtained. According to the ordered fluctuation values, the vertices are separated into bins. In each bin the fluctuation values are normalized. Finally, the mean of the root mean square curvature fluctuation values of the vertices in each bin is modulated to embed watermark information. In watermark detection, the algorithm uses a blind watermark extraction technique to extract the watermark information. The experimental results show that the algorithm has a very good performance for visual masking of the embedded model and that it can resist a variety of common attacks such as vertex rearrangement, rotation, translating, uniform scaling, noise, smoothing, quantization, and simplification.

Key words: Three-dimensional mesh model, Visual masking, Root mean square curvature, Blind watermarking, Attack resisting

Chinese Summary  <40> 基于模型顶点曲率的三维网格盲水印算法

研究目的:三维网格模型具有不规则性、无序性和复杂多样的攻击手段等特点,用数字水印技术作为三维模型版权保护的手段,是近年来多媒体数字信息安全领域的一个研究热点。本文在总结已有算法的基础上,结合均方根曲率波动值的概念,提出一种基于模型顶点曲率的三维网格盲水印算法,以提高水印嵌入的视觉掩蔽性和鲁棒性。
创新要点:在保持三维模型数字水印算法较高鲁棒性的前提下,结合均方根曲率波动值的理念,提出一个掩蔽性效果较好的三维模型盲水印算法。本文算法是个实用的算法,不仅能为三维模型的版权保护提供有效的数字认证,而且能较大程度地提高3D模型的保真性。
方法提亮:以三维网格模型的顶点均方根曲率这个局部特征作为嵌入基元,采用局部窗口方法计算波动值并确定顶点调制的程度,同时结合排序、单位化和分块等操作的灵活应用,形成本文提出的盲水印算法。该算法有效地提高了水印嵌入后的视觉掩蔽效果,更好地保持了水印算法的鲁棒性。
重要结论:本文针对保持算法较高鲁棒性同时提高三维模型水印嵌入的视觉掩蔽效果问题,结合均方根曲率和局部窗口的理念,提出一种三维网格模型的盲水印算法。对比实验表明,该算法对三维模型嵌入的水印信息具有较好的掩蔽性,并且能够有效抵抗顶点重排、旋转、平移、均匀缩放、噪声、光顺、量化、简化攻击等常见的三维模型水印攻击。

关键词组:三维网格模型;视觉掩蔽;均方根曲率;盲水印;抵抗攻击


Share this article to: More

Go to Contents

References:

<Show All>

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





DOI:

10.1631/jzus.C1300306

CLC number:

TP391.41

Download Full Text:

Click Here

Downloaded:

4857

Download summary:

<Click Here> 

Downloaded:

1880

Clicked:

8977

Cited:

17

On-line Access:

2014-05-06

Received:

2013-10-24

Revision Accepted:

2014-02-14

Crosschecked:

2014-04-11

Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952276; Fax: +86-571-87952331; E-mail: jzus@zju.edu.cn
Copyright © 2000~ Journal of Zhejiang University-SCIENCE