Skip to main content

2013 | OriginalPaper | Buchkapitel

53. Analysis of 3 Dimensional Object Watermarking Techniques

verfasst von : Deepika Khare, Sumita Verma, Ravindra Gupta, Gajendra Singh Chandel

Erschienen in: Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the explosive growth of Internet and the development of digital content designing and processing techniques, many valuable materials can be represented in digital forms for exhibition and access via Internet. Due to the characteristics of easy duplication and modification of digital contents, it is necessary to develop a variety of watermarking techniques for various protection purposes such as ownership claiming and authentication. In this survey paper, we examine 3D model watermarking technologies developed over the last decade. We classify various algorithms into two classes: robust watermarking and fragile watermarking.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Maurer U (2004) New approaches to digital evidence. Proc IEEE 92(6):933–947CrossRef Maurer U (2004) New approaches to digital evidence. Proc IEEE 92(6):933–947CrossRef
2.
Zurück zum Zitat Wells TO (2000) Electronic and digital signatures: in search of a standard. IT Prof 2(3):24–30CrossRef Wells TO (2000) Electronic and digital signatures: in search of a standard. IT Prof 2(3):24–30CrossRef
3.
Zurück zum Zitat Beth T, Gollman D (1989) Algorithm engineering for public key algorithms. IEEE J Select Areas Commun 7(4):458–466CrossRef Beth T, Gollman D (1989) Algorithm engineering for public key algorithms. IEEE J Select Areas Commun 7(4):458–466CrossRef
4.
Zurück zum Zitat Diffie W, Hellman ME (1979) Privacy and authentication: an introduction to cryptography. Proc IEEE 67(3):397–427CrossRef Diffie W, Hellman ME (1979) Privacy and authentication: an introduction to cryptography. Proc IEEE 67(3):397–427CrossRef
6.
7.
Zurück zum Zitat Praun E, Hoppe H, Finkelstein A (1999) Robust mesh watermarking. In: ACM SIGGRAPH, Los Angeles, CA, Aug 8–13, 1999, pp 49–56 Praun E, Hoppe H, Finkelstein A (1999) Robust mesh watermarking. In: ACM SIGGRAPH, Los Angeles, CA, Aug 8–13, 1999, pp 49–56
8.
Zurück zum Zitat Hoppe H (1996) Progressive meshes. In: ACM SIGGRAPH, New Orleans, LA, Aug 4–9, 1996, pp. 99–108 Hoppe H (1996) Progressive meshes. In: ACM SIGGRAPH, New Orleans, LA, Aug 4–9, 1996, pp. 99–108
9.
Zurück zum Zitat Johnson AE, Hebert M (1999) Using spin-images for efficient multiple model recognition in cluttered 3-D scenes. IEEE Trans Pattern Anal Mach Intell 21:433–449 Johnson AE, Hebert M (1999) Using spin-images for efficient multiple model recognition in cluttered 3-D scenes. IEEE Trans Pattern Anal Mach Intell 21:433–449
10.
Zurück zum Zitat Xie L, Arce GR (2001) A class of authentication digital watermarks for secure multimedia communication. IEEE Trans Image Process 10(11):1754–1764 Xie L, Arce GR (2001) A class of authentication digital watermarks for secure multimedia communication. IEEE Trans Image Process 10(11):1754–1764
11.
Zurück zum Zitat Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791 Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791
12.
Zurück zum Zitat Ohbuchi R, Masuda H, Aono M (1998) Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models. Comput Commun 21(15):1344–1354CrossRef Ohbuchi R, Masuda H, Aono M (1998) Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models. Comput Commun 21(15):1344–1354CrossRef
13.
Zurück zum Zitat Ohbuchi R, Masuda H, Aono M (1998) Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J Select Areas Commun 16(4):551–560CrossRef Ohbuchi R, Masuda H, Aono M (1998) Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J Select Areas Commun 16(4):551–560CrossRef
14.
Zurück zum Zitat Ohbuchi R, Takahashi S, Miyazawa T, Mukaiyama A (2001) Watermarking 3D polygonal meshes in the mesh spectral domain. In: Proceedings of the graphics interface, Ottawa, Ontario, June 7–9, 2001, pp 9–17 Ohbuchi R, Takahashi S, Miyazawa T, Mukaiyama A (2001) Watermarking 3D polygonal meshes in the mesh spectral domain. In: Proceedings of the graphics interface, Ottawa, Ontario, June 7–9, 2001, pp 9–17
15.
Zurück zum Zitat Ohbuchi R, Mukaiyama A, Takahashi S (2002) A frequency-domain approach to watermarking 3D shapes. Comput Graph Forum 21(3):373–382 Ohbuchi R, Mukaiyama A, Takahashi S (2002) A frequency-domain approach to watermarking 3D shapes. Comput Graph Forum 21(3):373–382
16.
Zurück zum Zitat Benedens O (1999) Geometry-based watermarking of 3-D models. IEEE Comput Graph Appl 19(1):46–55CrossRef Benedens O (1999) Geometry-based watermarking of 3-D models. IEEE Comput Graph Appl 19(1):46–55CrossRef
Metadaten
Titel
Analysis of 3 Dimensional Object Watermarking Techniques
verfasst von
Deepika Khare
Sumita Verma
Ravindra Gupta
Gajendra Singh Chandel
Copyright-Jahr
2013
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-3363-7_53

Neuer Inhalt