Robust Mesh Watermarking Emil Praun Hugues Hoppe Adam Finkelstein.

Slides:



Advertisements
Similar presentations
Robust Mesh Watermarking
Advertisements

Image Registration  Mapping of Evolution. Registration Goals Assume the correspondences are known Find such f() and g() such that the images are best.
Efficient access to TIN Regular square grid TIN Efficient access to TIN Let q := (x, y) be a point. We want to estimate an elevation at a point q: 1. should.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
November 12, 2013Computer Vision Lecture 12: Texture 1Signature Another popular method of representing shape is called the signature. In order to compute.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Chapter 3 Image Enhancement in the Spatial Domain.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Extended Gaussian Images
Chapter 8 Content-Based Image Retrieval. Query By Keyword: Some textual attributes (keywords) should be maintained for each image. The image can be indexed.
1Ellen L. Walker Edges Humans easily understand “line drawings” as pictures.
Instructor: Mircea Nicolescu Lecture 13 CS 485 / 685 Computer Vision.
Registration of two scanned range images using k-d tree accelerated ICP algorithm By Xiaodong Yan Dec
x – independent variable (input)
A New Force-Directed Graph Drawing Method Based on Edge- Edge Repulsion Chun-Cheng Lin and Hsu-Chen Yen Department of Electrical Engineering, National.
Detecting and Tracking Moving Objects for Video Surveillance Isaac Cohen and Gerard Medioni University of Southern California.
Shape Modeling International 2007 – University of Utah, School of Computing Robust Smooth Feature Extraction from Point Clouds Joel Daniels ¹ Linh Ha ¹.
Robust Motion Watermarking based on Multiresolution Analysis EUROGRAPHICS 2000 Speaker: 彭任右, GAME Lab Date: 4/18/2005.
Topological Surgery Progressive Forest Split Papers by Gabriel Taubin et al Presented by João Comba.
CSE554SimplificationSlide 1 CSE 554 Lecture 7: Simplification Fall 2014.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
כמה מהתעשייה? מבנה הקורס השתנה Computer vision.
Zoltan Szego †*, Yoshihiro Kanamori ‡, Tomoyuki Nishita † † The University of Tokyo, *Google Japan Inc., ‡ University of Tsukuba.
Digital Watermarking Parag Agarwal
CSE 185 Introduction to Computer Vision
Chapter 10: Image Segmentation
CSE554Laplacian DeformationSlide 1 CSE 554 Lecture 8: Laplacian Deformation Fall 2012.
Lecture 19 Representation and description II
Surface Simplification Using Quadric Error Metrics Michael Garland Paul S. Heckbert.
SVCL Automatic detection of object based Region-of-Interest for image compression Sunhyoung Han.
CSE554AlignmentSlide 1 CSE 554 Lecture 5: Alignment Fall 2011.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Mesh Watermarking based on 2D Transferred Domain Jongyun Jun Tae-Joon Kim CS548 Term Project Presentation 2010/05/13.
HP-PURDUE-CONFIDENTIAL Final Exam May 16th 2008 Slide No.1 Outline Motivations Analytical Model of Skew Effect and its Compensation in Banding and MTF.
Digital Image Processing CCS331 Relationships of Pixel 1.
Line detection Assume there is a binary image, we use F(ά,X)=0 as the parametric equation of a curve with a vector of parameters ά=[α 1, …, α m ] and X=[x.
EDGE DETECTION IN COMPUTER VISION SYSTEMS PRESENTATION BY : ATUL CHOPRA JUNE EE-6358 COMPUTER VISION UNIVERSITY OF TEXAS AT ARLINGTON.
Forward-Scan Sonar Tomographic Reconstruction PHD Filter Multiple Target Tracking Bayesian Multiple Target Tracking in Forward Scan Sonar.
3D polygonal meshes watermarking using normal vector distributions Suk-Hawn Lee, Tae-su Kim, Byung-Ju Kim, Seong-Geun Kwon.
Feature based deformable registration of neuroimages using interest point and feature selection Leonid Teverovskiy Center for Automated Learning and Discovery.
CSE554SimplificationSlide 1 CSE 554 Lecture 7: Simplification Fall 2013.
CS654: Digital Image Analysis Lecture 25: Hough Transform Slide credits: Guillermo Sapiro, Mubarak Shah, Derek Hoiem.
CSE554Fairing and simplificationSlide 1 CSE 554 Lecture 6: Fairing and Simplification Fall 2012.
Detection of Image Alterations Using Semi-fragile Watermarks
CVPR2013 Poster Detecting and Naming Actors in Movies using Generative Appearance Models.
Spectral Sequencing Based on Graph Distance Rong Liu, Hao Zhang, Oliver van Kaick {lrong, haoz, cs.sfu.ca {lrong, haoz, cs.sfu.ca.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Using simplified meshes for crude registration of two partially overlapping range images Mercedes R.G.Márquez Wu Shin-Ting State University of Matogrosso.
Analyzing Expression Data: Clustering and Stats Chapter 16.
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
Robust Watermarking of 3D Mesh Models. Introduction in this paper, it proposes an algorithm that extracts 2D image from the 3D model and embed watermark.
MDL Principle Applied to Dendrites and Spines Extraction in 3D Confocal Images 1. Introduction: Important aspects of cognitive function are correlated.
Mesh Resampling Wolfgang Knoll, Reinhard Russ, Cornelia Hasil 1 Institute of Computer Graphics and Algorithms Vienna University of Technology.
1 Overview representing region in 2 ways in terms of its external characteristics (its boundary)  focus on shape characteristics in terms of its internal.
Machine Vision Edge Detection Techniques ENT 273 Lecture 6 Hema C.R.
Introduction to Scale Space and Deep Structure. Importance of Scale Painting by Dali Objects exist at certain ranges of scale. It is not known a priory.
Instructor: Mircea Nicolescu Lecture 5 CS 485 / 685 Computer Vision.
3D mesh watermarking Wu Dan Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
11/25/03 3D Model Acquisition by Tracking 2D Wireframes Presenter: Jing Han Shiau M. Brown, T. Drummond and R. Cipolla Department of Engineering University.
Bitmap Image Vectorization using Potrace Algorithm
Watermarking with Side Information
Feature description and matching
CSE 554 Lecture 9: Laplacian Deformation
Multi-modality image registration using mutual information based on gradient vector flow Yujun Guo May 1,2006.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Spread Spectrum Watermarking
Wavelet transform application – edge detection
Presentation transcript:

Robust Mesh Watermarking Emil Praun Hugues Hoppe Adam Finkelstein

Background (1) The field of steganography addresses the problem of hiding information within digital documents. 1. The information, called the embedded object, 2. is inserted into the original document, called the cover object, 3. to produce a stego object.

According to their resilience, watermarks can be fragile or robust. Fragile watermarks are used for authentication and for localization of modifications. Robust watermarks are designed to survive (remain detectable) through most attacks. Another application of watermarking is tracing distribution channels. In this case, the document is provided to each recipient with a distinct watermark, referred to as a fingerprint, which encodes enough data bits to uniquely identify the recipient. Background (2)

Previous watermarking methods (1) To date, the most robust watermarking schemes for images, video, and sound are based on the spread spectrum method of Cox et al. [4], which embeds the watermark in the most perceptually salient features of the data. A randomly chosen watermark w = { w 1... w m } is inserted by scaling the m largest coefficients by small perturbations (1 + α wi).

Previous watermarking methods (2) 1. Yeung and Yeo [25] present a scheme for fragile watermarking. 2. Ohbuchi et al. [15] introduce several schemes for watermarking polygonal models.

Approach of this Paper They develop a technique derived from progressive meshes to construct a multiresolution set of scalar basis function Φ = ( φ 1... φ m ) over the mesh. The watermarking scheme should perturb vertices without changing the mesh connectivity. Therefore they define the basis functions on the original set of vertices in the mesh, instead of on a resampled set as in other multiresolution schemes. The basis functions Φ are used to insert and extract the watermark w in a given mesh.

Progressive mesh To simplify the given mesh through a sequence of restricted edge collapse operations.

Surface basis functions For each coefficient w i of the watermark, we construct a scalar 1. basis function 2. j over the mesh vertices v j, 3. and associate with it a global displacement direction di.

To measure the geometric “ magnitude ” geometric “ magnitude ” h of a vertex split operation as follows. 1. They predict the position of the vertex using the centroid of its immediate neighbors. 2. They compute a surface normal based on these neighbors. 3. h is computed as the dot product between the surface normal and the difference between the actual and predicted positions.

They select the m vertex splits with the largest geometric magnitude h, and construct their associated basis functions the magnitude h i is used later to scale the contribution of the watermark coefficient w i.

Define c i and B i Because they use restricted edge collapses, each vertex split i of a vertex c i is naturally associated with a neighborhood in the original mesh. the edges define the boundary B i of the neighborhood in the original mesh.

Computing a “radius” function (1) In each neighborhood we construct a basis function by mapping a radially symmetric function to this region. define a “ radius ” function on the vertices v j such that 1. it is 0 at the center vertex ci, 2. is 1 on and outside the boundary B, 3. and varies linearly in between. (next slide)

Computing a “radius” function (2) More precisely, for vertices v j in the neighborhood: where d(v, S) is the length of the shortest path between v and any vertex in the set S. The cost of each edge equals its length, and the search is constrained within the interior of the boundary Bi.

Computing a “radius” function (Finally) 1. Hat: 2. Derby: 3. Sombrero:

Watermarking process 1. Watermark vector w = (w 1... w m )T. 2. w i are real numbers sampled from a Gaussian distribution with mean 0 and variance 1. The result is used to seed a cryptographic random number generator, that produces the watermark with the required length.

Embedded Watermark (1) Each basis function i has a scalar effect φi j at each vertex j and a global displacement direction di. For each of the three spatial coordinates X, Y, and Z:

They can express the insertion process as a single equation : The original document v, along with the watermark w are stored and kept secret, and the watermarked document v is published. Embedded Watermark (2)

Extracted Watermark They extract a watermark from these residuals by solving the sparse linear least squares system:

They compare the inserted and extracted watermarks using a statistical analysis. Since they are expected to have a normal distribution with mean 0 and deviation 1, we discard coefficients whose absolute value exceeds a given threshold. Analyzing Extracted Watermark(1)

They then compute the linear correlation between the remaining coefficients and their corresponding values in the inserted watermark: Analyzing Extracted Watermark(2)

They compute the probability P fp that the correlation of w* with a randomly generated watermark would be as high as the observed ρ, using Student ’ s t-test. If a yes/no answer is required, we compare P fp with a given threshold P thresh : to answer yes iff P fp < P thresh. Analyzing Extracted Watermark (Finally)

Registration To apply a similarity transform: the object is translated, rotated, and scaled uniformly. They use the algorithm by Chen and Medioni [3], but we allow one additional degree of freedom: uniform scaling of the mesh. Sometimes user intervention is required to provide the initial alignment, especially for cropped objects or for objects with strong symmetries.

Resampling (1) As part of the attack, the topology of the mesh may have changed. Example: 1. number and order of vertices. 2. the number, order and connectivity of the faces.

A very simple answer to the question can be obtained by pairing each original mesh vertex with the closest point on the attacked surface. If the residual is larger than a given threshold, we assume that the object has been cropped, and the vertex has no corresponding point. Resampling (2)

Resampling (3) We implement this as an energy-minimization, which we solve using a conjugate gradient method. E deform measures the deformation of the original mesh. E dist measures the distance between the meshes. E flip is a term that penalizes surface flipping. c d and c f give relative weights to the terms. Empirically we have found that c d = and c f = give a reasonable tradeoff.

Contributions of this paper 1. Constructing a set of scalar basis functions over the mesh vertices. 2. adapt the spread-spectrum principles to embed information into the basis functions corresponding to perceptually significant features of the model. 3. Resampling a suspect mesh.

The test results in this section were obtained using a watermark length of m=50 coefficients, an energy scale factor =0.01, and the sombrero basis function. We determined the value =0.01 experimentally, as providing reasonable robustness while still leaving the watermark imperceptible, as demonstrated in Figures 1b and 4. At levels above =0.03 the watermark became noticeable. Parameter settings

Results (1) The second and third columns specify if the registration and/or resampling. Row B (the reorder attack). Rows C-E demonstrate the resilience of the watermark under the addition of white noise. Row F shows the results of applying 10 iterations of the Taubin smoothing filter [23] to the vertex coordinates.

Results (2) The simplification scheme used for rows H. Row I is based on full edge collapse operations, which replace a mesh edge with a vertex at an optimized location.

Results (3) Row J addresses to the addition of a second watermark. The crop attack presented in row K consists of discarding all vertices in the right third of the object’s bounding box.

Table 2 compares the three choices of basis function. The letters preceding the attacks are the same as in Table 1. Results (4)

Results (5) Table 3 shows some typical running times for various steps in the watermark insertion and extraction processes. We have not tried to optimize for execution time in this work.

Figure 6: ROC curves for noise attack on the fandisk model. The same data appears in both plots; the bottom one uses a log scale on the X axis. For the worst noise, if we choose a decision threshold of 0.1% false positives, we “lose” the watermark about one third of the time. Appendix A. Receiver operating characteristic