3D mesh watermarking Wu Dan 2008.12.17. Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Extended Gaussian Images
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
Watermarking 3D Polygonal Meshes in the Mesh Spectral Domain Ryutarou Ohbuchi, Shigeo Takahashi, Takahiko Miyazawa, Akio Mukaiyama.
Parametrizing Triangulated Meshes Chalana Bezawada Kernel Group PRISM 3DK – 3DK – September 15, 2000.
Watermarking For Image Authentication Presented by San-Hao Wang.
Watermarking 3D Polygonal Meshes 報告者:梁晉坤 指導教授:楊士萱博士 日期:
Chapter 4: Straight Line Drawing Ronald Kieft. Contents Introduction Algorithm 1: Shift Method Algorithm 2: Realizer Method Other parts of chapter 4 Questions?
Digital Watermarking Parag Agarwal
Lecture 19 Representation and description II
A public fragile watermarking scheme for 3D model authentication Chang-Min Chou, Din-Chang Tseng Computer-Aided Design Vol. 38 (Nov. 2006) 1154–1165 Reporter:
4/15/04© University of Wisconsin, CS559 Spring 2004 Last Time More modeling: –Hierarchical modeling –Instancing and Parametric Instancing –Constructive.
TEMPLATE BASED SHAPE DESCRIPTOR Raif Rustamov Department of Mathematics and Computer Science Drew University, Madison, NJ, USA.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
1 Adding charts anywhere Assume a cow is a sphere Cindy Grimm and John Hughes, “Parameterizing n-holed tori”, Mathematics of Surfaces X, 2003 Cindy Grimm,
EE663 Image Processing Dr. Samir H. Abdul-Jauwad Electrical Engineering Department King Fahd University of Petroleum & Minerals.
Geometry-Based Watermarking of 3D Models Oliver Benedens.
EECS 274 Computer Vision Segmentation by Clustering II.
3D polygonal meshes watermarking using normal vector distributions Suk-Hawn Lee, Tae-su Kim, Byung-Ju Kim, Seong-Geun Kwon.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Copyright © 2010 Siemens Medical Solutions USA, Inc. All rights reserved. Hierarchical Segmentation and Identification of Thoracic Vertebra Using Learning-based.
Subdivision Schemes Basic idea: Start with something coarse, and refine it into smaller pieces for rendering –We have seen how subdivision may be used.
An Efficient Information Hiding Algorithm for Polygon Models EUROGRAPHICS 2005 Chung-Ming Wang and Yu-Ming Cheng Reporter: T. Y. Chen 9 March 2007.
Reversible watermarking Wu Dan Introduction What?
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
CSC508 Convolution Operators. CSC508 Convolution Arguably the most fundamental operation of computer vision It’s a neighborhood operator –Similar to the.
Spectral Sequencing Based on Graph Distance Rong Liu, Hao Zhang, Oliver van Kaick {lrong, haoz, cs.sfu.ca {lrong, haoz, cs.sfu.ca.
Duy & Piotr. How to reconstruct a high quality image with the least amount of samples per pixel the least amount of resources And preserving the image.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Reversible Data Hiding for Point-Sampled Geometry JOURNAL OF INFORMATION SCIENCE AND ENGINEERING Vol. 23, pp , 2007 PENG-CHENG WANG AND CHUNG-MING.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Chapter III Rasterization
Rendering Pipeline Fall, D Polygon Rendering Many applications use rendering of 3D polygons with direct illumination.
Robust Watermarking of 3D Mesh Models. Introduction in this paper, it proposes an algorithm that extracts 2D image from the 3D model and embed watermark.
Outline ● Introduction – What is the problem ● Generate stochastic textures ● Improve realism ● High level approach - Don't just jump into details – Why.
Unstructured Volume Rendering. Grid Types uniformrectilinearregularcurvilinear Structured Grids: regularirregularhybridcurved Unstructured Grids:
Watermarking 3D Geometric Models Through Triangle Subdivision Mao et al. Proc. Of SPIE (2001)
Outline ● Introduction – What is the problem ● Generate stochastic textures ● Improve realism ● High level approach - Don't just jump into details – Why.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
(k, n)-Image Reversible Data Hiding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Author:Puneet Maheshwari, Parag Agarwal, Balakrishnan Prabhakaran
We propose a method which can be used to reduce high dimensional data sets into simplicial complexes with far fewer points which can capture topological.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Parag Agarwal Digital Watermarking Parag Agarwal
Source: Pattern Recognition Letters, Article In Press, 2007
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Authors: J.J. Murillo-Fuentes
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

3D mesh watermarking Wu Dan

Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an adjacency matrix.) Spectral analysis: eigenvector W i. Project vi onto the normalized eigenvector e i: (si,ti,ui)

Towards Blind Detection of Robust Watermarks in Polygonal Models Oliver Benedens and Christoph Busch, EG 2000

Watermarking algorithms VFA (vertex flood algorithm) high capacity but fragile AIE (affine invariant embedding) NBE (normal bin encoding) robust

VFA com be the center of mass of the start triangle with edge points Each set covers an interval of length W. This interval is subdivided as follows:

AIE Nielson norm:

AIE

Embedding process: embedding primitive :

NBE subdivided the Gaussian sphere into NB non overlapping bins. Each bin is uniquely defined by a bin center normal and a boundary angle f. Based on a secret key, we generate two disjunct sets of bin indices,

NBE consider the angle difference Xi j of a normal to the according center normal as a statistical sample.

result NBE+AIE+VFA

result

A public fragile watermarking scheme for 3D model authentication Chang-Min Chou, Din-Chang Tseng CAD 38 (2006)

Main idea x1 is used to indicate if v is a mark vertex (i.e., v is a watermark embedded vertex), x2 is used for embedding watermark wi, and x3 is used for embedding h(wi ), where h is a predefined hash function

embedding

embedding The causality problem and the convergence problem: an adjusting vertex.

extraction

Distortion control

results

An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho, R é my Prost, and Ho-Youl Jung IEEE TRANSACTIONS ON SIGNAL PROCESSING,

Main idea

METHOD I Watermark embedding 1. Cartesian coordinates are converted into spherical coordinates. 2. vertex norms are divided into distinct bins with equal range.

METHOD I Watermark embedding 1. Cartesian coordinates are converted into spherical coordinates. 2. vertex norms are divided into distinct bins with equal range. 3. After embedding, depending on the vertex norms belonging to the n bin are mapped into the normalized range of [0,1] by

METHOD I How to shift the mean to the desired level through modifying the value of vertex norms while staying within the proper range.

METHOD I Watermark embedding 4. the mean of each bin is changed. (The real vertex norm distribution in each bin is neither continuous nor uniform.)

METHOD I 5. Transformed vertex norms of each bin are mapped onto the original range. 6. the watermark embedding process is completed by combining all of the bins and converting the spherical coordinates to Cartesian coordinates.

METHOD I Watermark extraction

METHOD II Watermark embedding

results Mrms:

results

A new watermarking method for 3D model based on integral invariant Yu-Ping Wang and Shi-Min Hu April 2008

INTEGRAL INVARIANTS

How to compute integral invariants the area of a spherical triangle is:

How to compute integral invariants the volume invariant is:

Algorithm flow

Watermarking for 3D model Changing the area invariant

Watermarking for 3D model Changing the volume invariant

Watermarking a model Insertion 1. First, we choose a monochrome image as the watermark image. we transform it with an Arnold transformation. 2. we place balls centered on the model vertices, making sure that none of them intersect each other. 3. we change each invariant value (treated as floating point numbers) by modifying its bit notation,

Watermarking a model Insertion 4. We change the area invariants to embed the scrambled number and change the volume invariants to embed the watermark image. 5. By changing the invariants of each neighbor ball, the insertion process is accomplished.

Watermarking a model extraction 1. prepare an output image the same size as the watermarked image. 2. we compute the invariants and check the inserted bits. 3. If the assumed sequence number is in the range of the expected sequence number, we test whether the assumed part of the watermark image is the same as the real watermark image part. 4. since the watermark image is first scrambled, the output image after descrambling may lose some random pixels yet still show the information representing the copyright

Watermarking a model

results

Reversible Watermarking of 3D Mesh Models by Prediction-error Expansion Hao-tian Wu, Jean-Luc Dugelay