Security analysis of radial-based 3D watermarking systems

To be relevant in copyright protection scenarios, watermarking systems need to provide appropriate levels of security. This paper investigates the security of a popular 3D watermarking method that alters the histogram of distances between the vertices of a surface mesh and its center of mass using a quadratic programming formulation.We study two conventional security mechanisms, namely (i) obfuscating the support of the content used for watermarking and (ii) relying on random projections to obfuscate the watermarking subspace. The different attacks surveyed throughout the paper clearly highlight the limitations of this family of 3D watermarking systems with respect to security.

[1]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[2]  Benoit M. Macq,et al.  Constrained optimisation of 3D polygonal mesh watermarking by quadratic programming , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[3]  2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, Atlanta, GA, USA, December 3-5, 2014 , 2014, WIFS.

[4]  Teddy Furon,et al.  A New Measure of Watermarking Security: The Effective Key Length , 2013, IEEE Transactions on Information Forensics and Security.

[5]  Atilla Baskurt,et al.  Robust and blind mesh watermarking based on volume moments , 2011, Comput. Graph..

[6]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[7]  Adrian G. Bors,et al.  Optimized 3D Watermarking for Minimal Surface Distortion , 2013, IEEE Transactions on Image Processing.

[8]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[9]  Rémy Prost,et al.  An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms , 2007, IEEE Transactions on Signal Processing.

[10]  Ingemar J. Cox,et al.  Watermarking Is Not Cryptography , 2006, IWDW.

[11]  Touradj Ebrahimi,et al.  Perceptually driven 3D distance metrics with application to watermarking , 2006, SPIE Optics + Photonics.

[12]  Pierre Alliez,et al.  Spread transform and roughness-based shaping to improve 3D watermarking based on quadratic programming , 2014, 2014 IEEE International Conference on Image Processing (ICIP).