A new watermarking method for 3D models based on integral invariants

In this paper, we propose a new semi-fragile watermarking algorithm for the authentication of 3D models based on integral invariants. A watermark image is embedded by modifying the integral invariants of some of the vertices. In order to modify the integral invariants, the positions of a vertex and...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on visualization and computer graphics. - 1996. - 15(2009), 2 vom: 01. März, Seite 285-94
1. Verfasser: Wang, Yu-Ping (VerfasserIn)
Weitere Verfasser: Hu, Shi-Min
Format: Aufsatz
Sprache:English
Veröffentlicht: 2009
Zugriff auf das übergeordnete Werk:IEEE transactions on visualization and computer graphics
Schlagworte:Journal Article Research Support, Non-U.S. Gov't
LEADER 01000naa a22002652 4500
001 NLM186664656
003 DE-627
005 20231223174555.0
007 tu
008 231223s2009 xx ||||| 00| ||eng c
028 5 2 |a pubmed24n0622.xml 
035 |a (DE-627)NLM186664656 
035 |a (NLM)19241642 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Wang, Yu-Ping  |e verfasserin  |4 aut 
245 1 2 |a A new watermarking method for 3D models based on integral invariants 
264 1 |c 2009 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Date Completed 10.08.2009 
500 |a Date Revised 11.11.2019 
500 |a published: Print 
500 |a Citation Status PubMed-not-MEDLINE 
520 |a In this paper, we propose a new semi-fragile watermarking algorithm for the authentication of 3D models based on integral invariants. A watermark image is embedded by modifying the integral invariants of some of the vertices. In order to modify the integral invariants, the positions of a vertex and its neighbors are shifted. To extract the watermark, all the vertices are tested for the embedded information, and this information is combined to recover the watermark image. The number of parts of the watermark image that can be recovered will determine the authentication decision. Experimental tests show that this method is robust against normal use modifications introduced by rigid transformations, format conversions, rounding errors, etc., and can be used to test for malicious attacks such as mesh editing and cropping. An additional contribution of this paper is a new algorithm for computing two kinds of integral invariants 
650 4 |a Journal Article 
650 4 |a Research Support, Non-U.S. Gov't 
700 1 |a Hu, Shi-Min  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on visualization and computer graphics  |d 1996  |g 15(2009), 2 vom: 01. März, Seite 285-94  |w (DE-627)NLM098269445  |x 1941-0506  |7 nnns 
773 1 8 |g volume:15  |g year:2009  |g number:2  |g day:01  |g month:03  |g pages:285-94 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 15  |j 2009  |e 2  |b 01  |c 03  |h 285-94