Beruflich Dokumente
Kultur Dokumente
W: Watermark
TA: Total Automorphism
ABHS: Arrange the Bits of Hashed Watermark image into a
Sequence
CCV: Clustering the Model with the Connectivity of Vertices
RST: Reconstruct the 3D Model with Star-Topology Elements
EVS: Embedding Vertices Selection
ASKM: Embed the Watermark with Angle Shift Keying
Modulation
c
s between the two sides sharing the embedding
triangle as the feature side and its corresponding
angle as the feature angle.
In the angle shift keying modulation (ASKM),
the angle interval [u
o
, 9u
o
] aie equally divided into
n
10 4 , n = 1, 2, , 5 subintervals shown as in
figure 6. The feature angle is modulated into the
modulated feature angle
i
according to the section
that its original position placed.
1 1
0 0 ) 1 4 ( k
) 2 4 ( k
) 1 4 ( + k
) 2 4 ( + k
) 3 4 ( + k
k 4
Figure 6. The signal constellation of the ASKM
After EVS and ASK, contains the secret
information is then embedded into host 3D model X
at the selected embedding vertex by watermark bits
embedding (WBE). In the watermark bits embedding,
the embedding vertex
c
(x
c
, y
c
, z
c
) is translated to
'
c
(x'
c
, y'
c
, z'
c
) along the feature side
c
s such that
the modulation feature angle equals to
i
. The above
embedding process is repeated for each secret bit in
{m} and its corresponding vertex, then the
watermark embedding is finished.
6. Watermark Extraction Block
The watermark extraction is the inverse
process of a watermark embedding process; it is to
recover the original watermark image from a
watermarked 3D model. Most of The retrieval algorithm
is identical to the embedding process until it reaches the
angle shift keying modulation process described in the
previous section. The flow chart of the watermark
recovering process is shown in figure 7.
N
C C , ,
1
K
N
C C , ,
1
K { }
e
V
{ } m of length
Model D
d Watermarke
3
Key
W
{ } m
H
PN
ITA: Inverse Total Automorphism
AWBI: Arrange the extracted watermark bit sequence into a
2D image
CCV: Clustering the Model with the Connectivity of Vertices
RST: Reconstruct the 3D Model with Star-Topology Elements
EVS: Embedding Vertices Selection
ASKD: Extracting the Watermark with Angle Shift Keying
Demodulation
W:Watermark Extracted from Watermarked 3D Model
Figure 7. The flow chart of the watermark recovering
process.
The watermarked 3D model X is divided into
several sub-models (clusters) C'
1
, C'
2
, , C'
N
according the structure of X. The starting vertex of
each cluster and the reference vertex of X is found.
Then, each cluster is reconstructed with star-
topology elements and candidate watermarked
vertices are collected. In the same time, X is
translated such that the reference vertex is coincide
with the original point of the globe coordinate system,
and then the coordinates of the candidate embedded
vertices are transformed into spherical coordinate.
These candidate embedded vertices are then arranged
into a sequence {'
c
}. The same PN sequence used in
the embedding process is used to selected the
watermarked vertex '
m
from {'
c
} for the ASK
demodulation. In the ASK demodulation, the secret
bit m is extracted from the modulated feature
angle
"
of the selected feature triangle for each
selected star- topology. In the process of the ASK
demodulation the modulated feature angle
"
is
processed to recover the embedded secret bit m
according to the following formula
+ < +
+ <
=
) 3 4 ( ) 1 4 ( , 1
) 1 4 ( ) 1 4 ( , 0
k k if
k k if
m
w
w
(1)
After all the secret bits are extracted from the
ASK demodulation, they are rearranged into the two-
dimensional image H. By passing H through the
inverse toral automorphism (ITA), the recovered
watermark W is obtained.
7. The Quality Analysis Block of
Extracted Watermark
Several 3D models are conducted to simulate under
various conditions to explore the utility and
demonstrate the efficiency of the proposed scheme.
The 3D models Dragon (simple model, 1257 vertices,
and 2730 triangles) and dolphin (285 objects, 32828
vertices, and 61836 triangles) are used in simulation
for demonstrating the performance of the proposed
scheme. The logotype image of NCUT with sizes
8*8 and16*16 are used as watermarks for the host
3D model Dragon, the chess board with size
(8k)*(8k), k= 1, 2, . . ., 9 are used as watermarks for
the host 3D model dolphin. In order to demonstrate
host 3D model possesses excellent imperceptibility
without noticeable degradation, we compare it with
the test 3D models. Figure 8(a) shows the original 3D
model of Dragon. Figure 8(b) is the embedded 3D
model of Dragon with watermark of size16*16.
Figure 9(a) shows the original 3D model of dolphin.
Figure 9(b) is the embedded 3D model of dolphin
with watermark of size 80*80. Figure 8 and Figure 9
show that They are hard to identify the difference
between the watermarked 3D model and the original
3D model.
(a) (b)
Figure 8. The quality of the host 3D model: (a) the
Original 3D model Dragon, (b) the
Watermarked 3D model Dragon with SNR
70.3688.
(a) (b)
Figure 9. The quality of the host 3D model: (a) the
Original 3D model dolphin, (b) the
Watermarked 3D model dolphin with SNR
84.8747.
Imperceptibility is an important factor in
watermarking. We employ the SNR [28] to measure
the degree of transparency in this paper. To measure
the SNR of a watermarked 3D mesh object, the
following formula is used:
SNR = 1u log
10
_
(x
2
+y
2
+z
2
)
N-1
=0
((x
-x
)
2
+(y
-y
)
2
+(z
-z
)
2
)
N-1
=0
] (2)
Where
) , , (
i i i
z y x
and )
~
,
~
,
~
(
i i i
z y x are the coordinates of
vertex v
I
c
before and after the watermark embedding,
respectively. We calculate the SNR for embedded
Bunny and embedded dolphin. They are arranged in
table 1 to show the watermarks perceptibility, and
sketched SNR_ Watermark Size into figure 10 to
describe the change of SNR caused by the watermark
size. The SNR of the watermarked 3D model is
almost reciprocal to the size of watermark. The ratio
of ASKM to watermark size is around 60%, this
means that 60% watermarked vertices have to be
translated when the watermark is embedding into the
3D model.
Table.1: The performance of our scheme for the
test 3D models
3D Model Num. of
Objects
Mesh Vertices Candidate
Vertices
Bunny 1 2915 1494 391
Dolphin 285 61836 32828 13502
3D Model
Size of
Watermark
SNR
Num. of
ASKM
Ratio of
ASKM
Bunny
88 70.3688 39 60.93%
1616 66.2003 148 57.81%
Dolphin
88 93.9051 41 64.06%
1616 85.3686 158 61.74%
2424 85.3661 348 60.41%
3232 85.5171 592 57.81%
4040 85.0077 928 58.00%
4848 84.4162 1391 60.37%
5656 84.5377 1856 59.18%
6464 84.5998 2391 58.39%
7272 84.4468 3135 60.47%
8080 84.8747 3836 59.93%
Figure 10. The performance of our scheme for the
test 3D model dolphin
8. Conclusion
Digital watermarking is a promising method to
discourage unauthorized copying or to attest the
origin of digital data, including audio, video, images,
and 3D models.
MATLAB is a data visualization software
package and programming environment. It has
excellent numerical algorithms, very good graphical
capabilities, and a complete set of object oriented and
graphical user-interface programming tools such that
the problem in MATLAB is solved interactively and
the results displayed graphically. MATLAB also has
superior graphics handling and visualization
capabilities, and has a great GUI (graphical user
interface) development environment for creating
applications. In this paper, we combine several
toolboxes of MATLAB to develop a GUI of 3D
model watermarking system. The present GUI is a
graphical mouse-driven program that allows the user
to create, simulate and analyze 3D model
watermarking systems interactively.
In this proposed, we construct a MATLAB
GUI of 3D model watermarking system to develop a
cluster algorithm based on vertices connectivity and
the 3D model reconstruction with star- topology to
construct a robust watermarking scheme for 3D
model. In our scheme, the center of each star-
topology is selected to be a candidate vertex for
watermark embedding. There are four advantages
compare with other methods: (A) The proposed
MATLAB GUI of 3D model watermarking systemis
a graphical mouse-driven program that allows the
users to create, simulate and analyze the 3D model
watermarking algorithms interactively, easily, and
time saving . (B) The secret image has very high
security owing to using toral automorphism to scatter
the Watermark (C) The result host 3D model after
watermark embedding possesses excellent
imperceptibility without noticeable degradation (D)
All the extracted watermarks from the watermarked
simple or compound 3D models have the same
quality (100 % validity even under the combinational
attacks of rotations, translations, and scaling).
References
[1] L. M. Marvel, C. G. Boncelet, J.r., & C. T. Retter,
Spread Spectrum Image Steganography, IEEE
Trans. on Image Processing, 8 (8),1999,
1075-1083.
[2] W. Y. Chen & C. C. Liu, Multiple-Watermarking
Scheme of the European Article Number Barcode
Using Adaptive Phase Shift Keying Technique,
optical Engineering, 46 (6), 2007, 1- 12.
[3] J. Fridrich, M. Goljan, & R. Du, Deteting LSB
Steganography in Color and Gray-Scale Images,
IEEE trans.on Multimedia, 8 (4), 2001, 22-28.
[4] R. Chandramouli & N. Memon, Anlysis of LSB
Based Image Steganography Techniques,
Proceeding of Image processing, 3, 2001,
1019-1022.
[5] G. Mastronardi, M. Castellano, & F. Marino,
Steganography Effects in Various Formats of
Images, International Workshop on Intelligent
Data Acquistion and Advanced Computing
System: Technology and Applications, 2001,
116-119.
[6] C. C. Liu & W. Y. Chen, Multiple-watermarking
scheme for still images using the discrete cosine
transform and modified code division multiple-
access techniques, Optical Engineering,45 (7),
2006, 1- 12.
[7] W. Y. Chen & C. C. Liu, Robust watermarking
scheme for binary images using a slice-based
large-cluster algorithm with a Hamming Code,
Optical Engineering ,45 (1), 2006, 1-P10.
[8] W. Y. Chen & C. H. Chen, A robust watermarking
scheme using phase shift keying with the
combination of amplitude boost and low
amplitude block selection, Pattern Recognition,
38, 2005, 587-598.
[9] H. M. Chao, & Y. S. Tsai, A Bi-Polar
Multiple-Base Data Hiding Technique on
Information Security and Authentication, IPPR
Conference on Computer Vison, Graphics and
Image Processing, 2000, 307-313.
[10] Z. Zude, A. Qingsong, & Q. Liu, A SVD-based
Digital Watermarking Algorithm for 3D Mesh
Models, The 8th International Conference on
Signal Processing, 4, 2006 , 16-20.
[11] K.-R. Kwon, J. S. Sohn, Y. Huh, & S. H. Lee ,
The Watermarking for 3D CAD Drawing using
Line, ARC, 3D face Components, 2006 IEEE
International Conference on Multimedia and
Expo, 2006, 1361-1364.
[12] Yang, S. G. Li, C. X. Sun, S. H. Xu, & Y. Qun,
A Robust 3D Model Watermarking Scheme
Based on Feature Recognition, Eighth ACIS
International Conference on Software
Engineering, Artificial Intelligence, Networking,
and Parallel/Distributed Computing, 2007, 989
- 993.
[13] Benedens O, Geometry-based watermarking of
3D models, IEEE Computer Graphics and
Applications, 19 (1), 1999, 46-55.
[14] Y. K. Kang, P. Zhigeng, S. Jiaoying, & Z. David,
Robust mesh watermarking based on
multiresolution processing, Computer Graphics,
25, 2001, 409 420.
[15] T. Kanungo, D.M. Mount, N.S. Netanyahu, C.D.
Piatko, R. Silverman, & A.Y. Wu, An efficient
k-means clustering algorithm: analysis and
implementation, IEEE Transactions on Pattern
Analysis and Machine Intelligence, 24 (7), 2002, .
881-892.
[16] M. C. Su & C.H. Chou, A modified version of
the K-means algorithm with a distance based on
cluster symmetry, IEEE Transactions on
Pattern Analysis and Machine Intelligence, 23(6),
2001, 674-680.
[17] C. Dematte, N. Molinari, & J. P. Daurs,
Arbitrarily shaped multiple spatial cluster
detection for case event data, Computational
Statistics and Data Analysis, 51 (8), 2007,
3931-3945.
[18] A. Mattias, G. Joachim, & L. Christos,
Approximate distance oracles for graphs with
dense clusters, Computational Geometry: Theory
and Applications, 37 (3), 2007, 142-154.
[19] Y. Zhang , W. Wang, X. Zhang, & Y. Li, A
cluster validity index for fuzzy clustering,
Information Sciences, 178 (4), 2008, 1205-1218.
[20] W. Q. Xu, and S. W. Golomb, Optimal
interleaving schemes for correcting two
dimensional cluster errors, Discrete Applied
Mathematics, 155 (10), 2007, 1200-1212.
[21]M. H. Eres, G. E. Pound, Z. Jiao, J. L. Wason, F.
Xu, A. J. Keane, & S. J. Cox, Implementation
and utilization of a Grid-enabled problem
solving environment in Matlab, Future
Generation Computer Systems, 21, 2005,
920-929,.
[22] M. M. Teixeira, E. Assuncao, & M. R. Covacic,
Proportional Controllers: Direct Method for
Stability Analysis and MATLAB
Implementation, IEEE Transactions on
Education, 50 (10), 2007, 56-65.
[23] Y. J. Choi, K. McCarthy, & M. J. McCarthy, A
MATLAB graphical user interface program for
tomographic viscometer data processing,
Computers and Electronics in Agriculture, 47,
2005, 59-67.
[24] G. Voyatzis & I. Pitas, Application of Toral
automorphisms in Image Watermarking
Proceedings, International Conference on Image
Processing, 1996, 237-240.
[25] R. Pajarola, & J. Rossignac, Compressed
Progressive Meshes, IEEE Transactions on
Visulization and Computer Graphics, 6 (1),
2000, 79-93.
[26] J. H. Ahn, C.S. Kim, & Y. S. Ho, Predictive
Compression of Geometry, Color and Normal
Data of 3-D Mesh Models, IEEE Transactions
on Circuits and System for Video Technology,
16 (2), 2006, 291-299.
[27] S.P. Mudura, S. V. Babjib, & D. Shikhare,
Advancing fan-front: 3D triangle mesh
compression using fan based traversal, Image
and Vision Computing, 22, 2004, 11651173.
[28]S. Zafeiriou, A. Tefas, & I. Pitas, Blind robust
watermarking schemes for copyright protection
of 3D mesh objects, IEEE Transactions on
Visualization and Computer Graphics,
11(5), 2005,596 607.