Skip to main content

Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation

  • Conference paper
Transactions on Data Hiding and Multimedia Security VII

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 7110))

  • 462 Accesses

Abstract

The technique of independent component analysis (ICA) has been utilized in digital image and audio watermarking. In this paper, it is applied to improve the security of 3D geometry watermarking by using the ICA de-mixing matrix for transformation. An orthogonal transformation (OT) matrix is further employed so that another watermarking scheme is generated. With the same embedding method, the two watermarking schemes are implemented on the test models. The experimental results show that they have similar performance in imperceptibility and capacity. As both of them have the properties of blind extraction and security, the OT-based scheme can be regarded as a simplified version of the ICA-based one with less computational cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, New York (2001)

    Google Scholar 

  2. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)

    Google Scholar 

  3. Comon, P.: Independent Component Analysis - A New Concept? Signal Processing 36(3), 287–314 (1994)

    Article  MATH  Google Scholar 

  4. Hyvarinen, A., Oja, E.: Independent Component Analysis: Algorithms and Applications. Neural Networks 13(4-5), 411–430 (2000)

    Article  Google Scholar 

  5. Hyvarinen, A., Oja, E.: A Fast Fixed-Point Algorithm for Independent Component Analysis. Neural Computation 9(7), 1483–1492 (1997)

    Article  Google Scholar 

  6. González-Serrano, F.J., Molina-Bulla, H.Y., Murillo-Fuentes, J.J.: Independent Component Analysis Applied to Digital Watermarking. In: International Conference on Acoustic, Speech and Signal Processing (ICASSP), vol. 3, pp. 1997–2000 (2001)

    Google Scholar 

  7. Bounkong, S., Toch, B., Saad, D., Lowe, D.: ICA for Watermarking Digital Images. Journal of Machine Learning Research 4(7-8), 1471–1498 (2003)

    Google Scholar 

  8. Toch, B., Lowe, D., Saad, D.: Watermarking of Audio Signals Using Independent Component Analysis. In: Proceeding of the 3th International Conference on WEB Delivering of Music, pp. 71–74 (2003)

    Google Scholar 

  9. Yu, D., Sattar, F., Ma, K.-K.: Watermark Detection and Extraction Using Independent Component Analysis Method. EURASIP Journal on Applied Signal Processing 2002(1), 92–104, doi:10.1155/S111086570200046X

    Google Scholar 

  10. Szu, H., Noel, S., Yim, S.-B., Willey, J., Landa, J.: Multimedia Authenticity Protection with ICA Watermarking and Digital Bacteria Vaccination. Neural Networks, Special Issue for International Joint Conference on Neural Networks 16(5-6), 907–914 (2003)

    Google Scholar 

  11. Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  12. Ohbuchi, R., Masuda, H., Aono, M.: Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications. IEEE Journal of Selected Areas in Communications 16(4), 551–560 (1998)

    Article  Google Scholar 

  13. Benedens, O.: Geometry-Based Watermarking of 3-D Models. IEEE Computer Graphics and Application, Special Issue on Image Security 19(1), 46–55 (1999)

    Article  Google Scholar 

  14. Praun, E., Hoppe, H., Finkelstein, A.: Robust Mesh Watermarking. In: Proceedings of ACM SIGGRAPH, pp. 69–76 (1999)

    Google Scholar 

  15. Yeo, B.L., Yeung, M.M.: Watermarking 3-D Objects for Verification. IEEE Computer Graphics and Application 19(1), 36–45 (1999)

    Article  Google Scholar 

  16. Cayre, F., Macq, B.: Data Hiding on 3-D Triangle Meshes. IEEE Transactions on Signal Processing 51(4), 939–949 (2003)

    Article  MathSciNet  Google Scholar 

  17. Cayre, F., Devillers, O., Schmitt, F., Maitre, H.: Watermarking 3D Triangle Meshes for Authentication and Integrity. INRIA Research Report RR-5223 (2004)

    Google Scholar 

  18. Uccheddu, F., Corsini, M., Barni, M.: Wavelet-Based Blind Watermarking of 3d Models. In: Proceedings of ACM Multimedia & Security Workshop, Magdeburg, Germany, pp. 143–154 (2004)

    Google Scholar 

  19. Zafeiriou, S., Tefas, A., Pitas, I.: Blind Robust Watermarking Schemes for Copyright Protection of 3D Mesh Objects. IEEE Transactions on Visualization and Computer Graphics 11(5), 596–607 (2005)

    Article  Google Scholar 

  20. Ohbuchi, R., Mukaiyama, A., Takahashi, S.: A Frequency Domain Approach to Watermarking 3D Shapes. Computer Graphics Forum 21(3), 373–382 (2002)

    Article  Google Scholar 

  21. Bors, A.G.: Watermarking Mesh-Based Representations of 3-D Objects Using Local Moments. IEEE Transactions on Image Processing 15(3), 687–701 (2006)

    Article  MathSciNet  Google Scholar 

  22. Wu, H.T., Cheung, Y.M.: A High-Capacity Data Hiding Method for Polygonal Meshes. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 188–200. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  23. Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, Ht., Cheung, Ym. (2012). Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security VII. Lecture Notes in Computer Science, vol 7110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28693-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28693-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28692-6

  • Online ISBN: 978-3-642-28693-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics