A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models

This study proposes a low-complexity region-based authentication algorithm for three-dimensional (3D) polygonal models, based on local geometrical property evaluation. A vertex traversal scheme with a secret key is adopted to classify each vertex into one of two categories: embeddable vertices and reference vertices. An embeddable vertex is one with an authentication code embedded. The algorithm then uses reference vertices to calculate local geometrical properties for the corresponding embeddable vertices. For each embeddable vertex, we feed the number of reference vertices and local properties into a hash function to generate the authentication code. The embeddable vertex is then embedded with the authentication code, which is based on a simple message-digit substitution scheme. The proposed algorithm is of low complexity and distortion-controllable and possesses a higher and more adaptive embedding capacity and a higher embedding rate than most existing region-based authentication algorithms for 3D polygonal models. The experimental results demonstrate the feasibility of the proposed algorithm.

[1]  Shyr-Shen Yu,et al.  Hamming Code Based Watermarking Scheme for 3D Model Verification , 2014, 2014 International Symposium on Computer, Consumer and Control.

[3]  Chung-Ming Wang,et al.  Reversible Data Hiding for Point-Sampled Geometry , 2007, J. Inf. Sci. Eng..

[4]  Yuan-Yu Tsai An adaptive steganographic algorithm for 3D polygonal models using vertex decimation , 2012, Multimedia Tools and Applications.

[5]  Chin-Chen Chang,et al.  A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..

[6]  Jun-Hai Yong,et al.  A numerically stable fragile watermarking scheme for authenticating 3D models , 2008, Comput. Aided Des..

[7]  Shyr-Shen Yu,et al.  A HIGH VERIFICATION CAPACITY REVERSIBLE FRAGILE WATERMARKING SCHEME FOR 3D MODELS , 2011 .

[8]  Yu-Chen Hu,et al.  A novel reversible image authentication scheme for digital images , 2014, Signal Process..

[9]  Che-Wei Lee,et al.  A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding , 2013, Signal Process..

[10]  Din-Chang Tseng,et al.  Affine-Transformation-Invariant Public Fragile Watermarking for 3D Model Authentication , 2009, IEEE Computer Graphics and Applications.

[11]  Paolo Cignoni,et al.  Metro: Measuring Error on Simplified Surfaces , 1998, Comput. Graph. Forum.

[12]  Ya-Wen Yang,et al.  A Spherical Coordinate Based Fragile Watermarking Scheme for 3D Models , 2013, IEA/AIE.

[13]  Boon-Lock Yeo,et al.  Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.

[14]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[15]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[16]  T. Y. Chen,et al.  ADAPTIVE AUTHENTICATION SCHEMES FOR 3D MESH MODELS , 2009 .

[17]  G. Charith K. Abhayaratne,et al.  Scalable watermark extraction for real-time authentication of JPEG 2000 images , 2011, Journal of Real-Time Image Processing.