Abstract
The study proposed a vertex-based authentication algorithm based on spatial subdivision. A binary space partitioning tree was employed to subdivide the bounding volume of the input model into voxels. Each vertex could then be encoded into a series of binary digits, denoted as its authentication code, by traversing the constructed tree. Finally, the above authentication code was embedded into the corresponding reference vertex by modulating its position within the located subspace. Extensive experimental results demonstrated that the proposed algorithm provided high embedding capacity and high robustness. Furthermore, the proposed algorithm supported controllable distortion and self-recovery.
Highlights
The rapid development of computer technology and the Internet, has resulted in most information to be stored electronically as digital data
This paper extends the information hiding algorithm of the 3D model based on a BSP tree vertex, the subspace is decomposed into 2m subspaces, and the secret key is employed to number proposed by Tsai et al, to an authentication algorithm
If a vertex is confirmed to have been tampered with, its authentication code is extracted from its corresponding reference vertex, and the BSP tree is used to locate the vertex in a certain subspace to complete self-recovery
Summary
The rapid development of computer technology and the Internet, has resulted in most information to be stored electronically as digital data. Vertex-based fragile watermarking technique accurately detects the tampered vertices but cannot detect changes in topology because of the limitation of the algorithm used. According to the latest survey [16] and our understanding about the 3D authentication algorithm, there are currently eight vertex-based 3D model authentication algorithms [17,18,19,20,21,22,23,24], which are implemented in the spatial domain Despite these algorithms obtaining favorable experimental results, there is still room for improvement. Vertex-based fragile watermarking technique accurately detects the ut cannot detect changes in topology because of the limitation of the algorithm u rding to the latest survey [16] and our understanding about the 3D auth.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have