Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models

Three-dimensional (3D) graphics is about to become a full-fledged multimedia data type, prompted by the increasing popularity of virtual reality modeling language (VRML) [15]and imminent standardization of MPEG-4 [16]. This paper presents several algorithms for embedding data in triangular meshes, arguably the most important component in both VRML and MPEG-4 in defining arbitrary shapes. A topology-modifying algorithm described in this paper embeds bit string in connectivity of triangles, while another algorithm cuts out patterns from a mesh. Yet another algorithm modifies texture coordinate, a non-geometrical quantity, for embedding. Watermarks embedded in 3D graphics contents could be used as a tool in managing intellectual property and other issues associated with these contents.

[1]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[3]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[4]  Gerald Farin,et al.  Curves and surfaces for computer aided geometric design , 1990 .

[5]  Hiroshi Masuda,et al.  Watermarking three-dimensional polygonal models through geometric and topological modifications , 1998, IEEE J. Sel. Areas Commun..

[6]  Hiroshi Masuda,et al.  Embedding Data in 3D Models , 1997, IDMS.

[7]  Birgit Pfitzmann,et al.  Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.

[8]  Minerva M. Yeung,et al.  Digital watermarking for high-quality imaging , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[9]  Hiroshi Masuda,et al.  Watermaking three-dimensional polygonal models , 1997, MULTIMEDIA '97.

[10]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[11]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[12]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[13]  Gabriel Taubin,et al.  Geometric compression through topological surgery , 1998, TOGS.

[14]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[15]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[16]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[17]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[18]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[19]  Minerva M. Yeung,et al.  Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.

[20]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..