Abstract

Fragile watermarking algorithms for 3D models has attracted extensive research attention in recent years. Although many literatures have proposed lots of solutions on this issue, low embedding capacity and inaccurate located tampered region are still presented. Higher embedding capacity can reduce the probability of false alarms for authentication, while accurate tamper localization can detect all the modified vertices with fewer unaltered ones. This study proposes three strategies to enhance the embedding capacity and the detection accuracy of our previous algorithm. First, the modified message-digit substitution table can increase the embedding capacity by 11.5%. Second, the modified embedding ratio generation method can be integrated to raise the embedding capacity by about 47.74%. Finally, the strategy adopting a reduced number of reference vertices for authentication code generation accompanying the above two ones improves the embedding capacity up to 123.74%. Extensive experiments show that the proposed algorithm can achieve superior performance in terms of embedding capacity and tamper localization accuracy. Further, the model distortion between the original and the marked ones is small.

Highlights

  • The rise of Internet changes human behavior significantly

  • Robust watermarking algorithms [2,3,4] can detect copyright information and protect intellectual property rights even when the protected multimedia content is under different malicious attacks

  • Some fragile watermarking algorithms even have the capacity for self-recovery

Read more

Summary

Introduction

The rise of Internet changes human behavior significantly. Multimedia content can be rapidly shared and dispersed all over the world with the advanced network technology. According to the size of the tampered region localization, 3D fragile watermarking algorithms can be classified as either vertex-based or region-based ones. A region-based fragile watermarking algorithm has the ability to detect the modification of the topological relationship between vertices. The proposed algorithm offers three advantages over the previous method, including higher embedding capacity, higher embedding rate, and accurate tamper localization. The proposed algorithm inputs a polygonal model with vertices and its topological information and constructs a vertex neighboring table in the preprocessing process. The local geometrical property concerning the topological relationship is fed into the hash function to obtain the authentication code.

The Proposed Algorithm
Modified Message Grabbing Method
Modified Embedding Ratio Generation Method
Reduced
Experimental
Findings
Conclusions and Future Studies

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.