Skip to main content
Log in

Watermarking techniques for three-dimensional (3D) mesh models: a survey

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Multimedia data play an important role in many areas such as business, medicine, and entertainment. Multimedia contents are often vulnerable to malicious interventions due to the advancement in multimedia innovations. It is, therefore, highly necessary to verify the integrity and authenticity of multimedia content through appropriate security measures. This increases the need to establish a range of watermarking schemes for several security purposes, including copyrights and authentication. Digital watermarking has proven an effective and influential approach for 3D models among various other authentication strategies. In this study, an in-depth review of different types of 3D model representations, watermarking techniques in spectral and spatial domains along with most common attacks that can be applied to them are presented. The paper concludes with a set of observations along with some of the research issues and challenges which are needed to be studied further.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Wyvill, B., Guy, A., Galin, E.: Extending the csg tree. warping, blending and boolean operations in an implicit surface modeling system. In: Computer Graphics Forum, vol. 18-2, pp. 149–158, Wiley Online Library (1999)

  2. Novelline, R.A., Squire, L.F.: Squire’s fundamentals of radiology. La Editorial, UPR (2004)

  3. Kanai, S., Date, H., Kishinami, T., et al.: Digital watermarking for 3d polygons using multiresolution wavelet decomposition. Proc. Sixth IFIP WG 5, 296–307 (1998)

    Google Scholar 

  4. Piegl, L., Tiller, W.: The NURBS book. Springer, New York (2012)

    MATH  Google Scholar 

  5. Mao, B., Ban, Y.: Generalization of 3d building texture using image compression and multiple representation data structure. ISPRS J. Photogramm. Remote. Sens. 79, 68–79 (2013)

    Article  Google Scholar 

  6. Borah, S., Borah, B.: Watermarking techniques for three dimensional (3d) mesh authentication in spatial domain. 3D Research, 9(3), 43 (2018)

  7. Mantiuk, R., Daly, S.J., Myszkowski, K., Seidel, H.-P.: Predicting visible differences in high dynamic range images: model and its calibration. In: Human Vision and Electronic Imaging X, vol. 5666, pp. 204–214, International Society for Optics and Photonics (2005)

  8. Lavoué, G.: A local roughness measure for 3d meshes and its application to visual masking. ACM Trans. Appl. Percept. (TAP) 5(4), 1–23 (2009)

    Article  Google Scholar 

  9. Silva, S.,  Madeira, J.,  Ferreira, C., Santos, B.S.: Comparison of methods for the simplification of mesh models using quality indices and an observer study. In: Human Vision and Electronic Imaging XII, vol. 6492, p. 64921L, International Society for Optics and Photonics (2007)

  10. Váša, L., Rus, J.: Dihedral angle mesh error: a fast perception correlated distortion measure for fixed connectivity triangle meshes. In: Computer Graphics Forum, vol. 31-5, pp. 1715–1724, Wiley Online Library (2012)

  11. Chou, C.-M., Tseng, D.-C.: Affine-transformation-invariant public fragile watermarking for 3d model authentication. IEEE Comput. Graphics Appl. 29(2), 72–79 (2009)

    Article  Google Scholar 

  12. Cho, J.-W., Prost, R., Jung, H.-Y.: An oblivious watermarking for 3-d polygonal meshes using distribution of vertex norms. IEEE Trans. Signal Process. 55(1), 142–155 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  13. AIM@SHAPE project, “Digital shape workbench - shape repository.”

  14. Zhou, Q., Jacobson, A.: Thingi10k: A dataset of 10,000 3d-printing models. arXiv:1605.04797 (2016)

  15. Nader, G., Wang, K., Hétroy-Wheeler, F., Dupont, F.: Just noticeable distortion profile for flat-shaded 3d mesh surfaces. IEEE Trans. Visual Comput. Graphics 22(11), 2423–2436 (2015)

    Article  Google Scholar 

  16. Bors, A.G., Luo, M.: Optimized 3d watermarking for minimal surface distortion. IEEE Trans. Image Process. 22(5), 1822–1835 (2012)

    Article  Google Scholar 

  17. Mun, S.-M., Jang, H.-U., Kim, D.-G., Choi, S., Lee, H.-K.: A robust 3d mesh watermarking scheme against cropping. In: 2015 International Conference on 3D Imaging (IC3D), pp. 1–6, IEEE (2015)

  18. Jang, H.-U., Choi, H.-Y., Son, J., Kim, D., Hou, J.-U., Choi, S., Lee, H.-K.: Cropping-resilient 3d mesh watermarking based on consistent segmentation and mesh steganalysis. Multimed Tools Appl. 77(5), 5685–5712 (2018)

    Article  Google Scholar 

  19. Seo, Y.-S., Joo, S., Jung, H.-Y.: An efficient quantization watermarking on the lowest wavelet subband. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86(8), 2053–2055 (2003)

    Google Scholar 

  20. Field, D.A.: Laplacian smoothing and delaunay triangulations. Commun. Appl. Numer. Methods 4(6), 709–712 (1988)

    Article  MATH  Google Scholar 

  21. Yeo, B.-L., Yeung, M.M.: Watermarking 3d objects for verification. IEEE Comput. Graphics Appl. 19(1), 36–45 (1999)

    Article  Google Scholar 

  22. Lin, H.-Y., Liao, H.-Y., Lu, C.-S., Lin, J.-C.: Fragile watermarking for authenticating 3-d polygonal meshes. IEEE Trans. Multimed. 7(6), 997–1006 (2005)

    Article  Google Scholar 

  23. Wu , H.-T., Cheung, Y.-M.: Public authentication of 3d mesh models. In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI’06), pp. 940–948, IEEE (2006)

  24. Wang, X., Xu, M., Li, Y.: Fast encryption scheme for 3d models based on chaos system. Multimed. Tools Appl. 78(23), 33865–33884 (2019)

    Article  Google Scholar 

  25. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solit. Fract. 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  26. Jin, X., Zhu, S., Xiao, C., Sun, H., Li, X., Zhao, G., Ge, S.: 3d textured model encryption via 3d lu chaotic mapping. Sci. Chin. Inf. Sci. 60(12), 122107 (2017)

    Article  Google Scholar 

  27. Jolfaei, A., Wu, X.-W., Muthukkumarasamy, V.: A 3d object encryption scheme which maintains dimensional and spatial stability. IEEE Trans. Inf. Forensics Secur. 10(2), 409–422 (2014)

    Article  Google Scholar 

  28. Kaminsky, W., Snyder, T., Stone-Sundberg, J., Moeck, P.: One-click preparation of 3d print files (*. stl,*. wrl) from*. cif (crystallographic information framework) data using cif2vrml. Powder Diffr. 29(S2), S42–S47 (2014)

    Article  Google Scholar 

  29. N. A. Hamza, S. H. Jafeer, and A. E. Ali, “Encrypt 3d model using transposition, substitution, folding, and shifting (tsfs),” in 2019 2nd Scientific Conference of Computer Sciences (SCCS), pp. 126–131, IEEE, 2019

  30. M. A. A.-J. A. Mizher, R. Sulaiman, A. M. A. Abdalla, and M. A. A. Mizher, “A simple flexible cryptosystem for meshed 3d objects and images,” Journal of King Saud University-Computer and Information Sciences, 2019

  31. Alfalou, A., Brosseau, C.: Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction. Optics Communications 307, 67–72 (2013)

    Article  Google Scholar 

  32. Elsheh, E., Hamza, A.B.: Secret sharing approaches for 3d object encryption. Expert Syst. Appl. 38(11), 13906–13911 (2011)

    Google Scholar 

  33. M. Éluard, Y. Maetz, and G. Doërr, “Geometry-preserving encryption for 3d meshes,” Actes de COmpression et REprsentation des Signaux Audiovisuels, pp. 7–12, 2013

  34. X. Jin, Z. Wu, C. Song, C. Zhang, and X. Li, “3d point cloud encryption through chaotic mapping,” in Pacific Rim Conference on Multimedia, pp. 119–129, Springer, 2016

  35. A. M. del Rey, “A method to encrypt 3d solid objects based on three-dimensional cellular automata,” in International Conference on Hybrid Artificial Intelligence Systems, pp. 427–438, Springer, 2015

  36. A. M. del Rey, “Chaotic encryption of 3d objects,” in International Work-Conference on the Interplay Between Natural and Artificial Computation, pp. 463–472, Springer, 2017

  37. E. Praun, H. Hoppe, and A. Finkelstein, “Robust mesh watermarking,” in Proceedings of the 26th annual conference on Computer graphics and interactive techniques, pp. 49–56, 1999

  38. F. Uccheddu, M. Corsini, and M. Barni, “Wavelet-based blind watermarking of 3d models,” in Proceedings of the 2004 workshop on Multimedia and security, pp. 143–154, 2004

  39. Ohbuchi, R., Takahashi, S., Miyazawa, T., Mukaiyama, A.: Watermarking 3d polygonal meshes in the mesh spectral domain. Graphics interface 2001, 9–17 (2001)

    Google Scholar 

  40. Abdallah, E.E., Hamza, A.B., Bhattacharya, P.: Spectral graph-theoretic approach to 3d mesh watermarking. Proceedings of graphics interface 2007, 327–334 (2007)

    Google Scholar 

  41. Abdallah, E.E., Hamza, A.B., Bhattacharya, P.: Watermarking 3d models using spectral mesh compression. SIViP 3(4), 375 (2009)

    Article  MATH  Google Scholar 

  42. Y.-q. Ni, B. Liu, and H.-b. Zhang, “A blind watermarking of 3d triangular meshes using geometry image,” in Computer Graphics, Imaging and Visualisation (CGIV 2007), pp. 335–340, IEEE, 2007

  43. K. Wang, G. Lavoué, F. Denis, and A. Baskurt, “Hierarchical blind watermarking of 3d triangular meshes,” in 2007 IEEE International Conference on Multimedia and Expo, pp. 1235–1238, IEEE, 2007

  44. K. Wang, G. Lavoué, F. Denis, and A. Baskurt, “A fragile watermarking scheme for authentication of semi-regular meshes.,” in Eurographics (Short Papers), pp. 5–8, 2008

  45. Konstantinides, J.M., Mademlis, A., Daras, P., Mitkas, P.A., Strintzis, M.G.: Blind robust 3-d mesh watermarking based on oblate spheroidal harmonics. IEEE Trans. Multimedia 11(1), 23–38 (2008)

    Article  Google Scholar 

  46. Zaid, A.O., Hachani, M., Puech, W.: Wavelet-based high-capacity watermarking of 3-d irregular meshes. Multimedia Tools and Applications 74(15), 5897–5915 (2015)

    Article  Google Scholar 

  47. Shapira, L., Shamir, A., Cohen-Or, D.: Consistent mesh partitioning and skeletonisation using the shape diameter function. Vis. Comput. 24(4), 249 (2008)

    Article  Google Scholar 

  48. Medimegh, N., Belaid, S., Atri, M., Werghi, N.: 3d mesh watermarking using salient points. Multimedia Tools and Applications 77(24), 32287–32309 (2018)

    Article  Google Scholar 

  49. Narendra, M., Valarmathi, M., Anbarasi, L.J.: Optimization of 3d triangular mesh watermarking using aco-weber’s law. KSII Transactions on Internet and Information Systems (TIIS) 14(10), 4042–4059 (2020)

  50. Liu, Y., Prabhakaran, B., Guo, X.: Spectral watermarking for parameterized surfaces. IEEE Trans. Inf. Forensics Secur. 7(5), 1459–1471 (2012)

    Article  Google Scholar 

  51. Hou, J.-U., Kim, D.-G., Lee, H.-K.: Blind 3d mesh watermarking for 3d printed model by analyzing layering artifact. IEEE Trans. Inf. Forensics Secur. 12(11), 2712–2725 (2017)

    Article  Google Scholar 

  52. H.-T. Wu and Y.-M. Cheung, “A fragile watermarking scheme for 3d meshes,” in Proceedings of the 7th workshop on Multimedia and security, pp. 117–124, 2005

  53. R. Ohbuchi, H. Masuda, and M. Aono, “Watermaking three-dimensional polygonal models,” in Proceedings of the fifth ACM international conference on Multimedia, pp. 261–272, 1997

  54. O. Benedens, “Geometry-based watermarking of 3d models,” tech. rep., FRAUNHOFER INST FOR COMPUTER GRAPHICS DARMSTADT (GERMANY) VIRTUAL REALITY ..., 1999

  55. M. G. Wagner, “Robust watermarking of polygonal meshes,” in Proceedings Geometric Modeling and Processing 2000. Theory and Applications, pp. 201–208, IEEE, 2000

  56. O. Benedens, “Robust watermarking and affine registration of 3d meshes,” in International Workshop on Information Hiding, pp. 177–195, Springer, 2002

  57. Zafeiriou, S., Tefas, A., Pitas, I.: Blind robust watermarking schemes for copyright protection of 3d mesh objects. IEEE Trans. Visual Comput. Graphics 11(5), 596–607 (2005)

    Article  Google Scholar 

  58. Chou, C.-M., Tseng, D.-C.: A public fragile watermarking scheme for 3d model authentication. Comput. Aided Des. 38(11), 1154–1165 (2006)

    Article  Google Scholar 

  59. P. R. Alface, B. Macq, and F. Cayre, “Blind and robust watermarking of 3d models: How to withstand the cropping attack?,” in 2007 IEEE International Conference on Image Processing, vol. 5, pp. V–465, IEEE, 2007

  60. Wang, W.-B., Zheng, G.-Q., Yong, J.-H., Gu, H.-J.: A numerically stable fragile watermarking scheme for authenticating 3d models. Comput. Aided Des. 40(5), 634–645 (2008)

    Article  Google Scholar 

  61. Ai, Q., Liu, Q., Zhou, Z., Yang, L., Xie, S.: A new digital watermarking scheme for 3d triangular mesh models. Signal Process. 89(11), 2159–2170 (2009)

    Article  MATH  Google Scholar 

  62. Wang, K., Lavoué, G., Denis, F., Baskurt, A.: Robust and blind mesh watermarking based on volume moments. Computers & Graphics 35(1), 1–19 (2011)

    Article  Google Scholar 

  63. Luo, M., Bors, A.G.: Surface-preserving robust watermarking of 3-d shapes. IEEE Trans. Image Process. 20(10), 2813–2826 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  64. L. K. Singh, D. Chaudhry, and G. Varshney, “A novel approach of 3d object watermarking algorithm using vertex normal,” International Journal of Computer Applications, vol. 60, no. 5, 2012

  65. Rolland-Neviere, X., Doërr, G., Alliez, P.: Triangle surface mesh watermarking based on a constrained optimization framework. IEEE Trans. Inf. Forensics Secur. 9(9), 1491–1501 (2014)

    Article  Google Scholar 

  66. A. M. Molaei, H. Ebrahimnezhad, and M. H. Sedaaghi, “Robust and blind 3d mesh watermarking in spatial domain based on faces categorization and sorting,” 3D Research, vol. 7, no. 2, p. 11, 2016

  67. Yang, Y., Pintus, R., Rushmeier, H., Ivrissimtzis, I.: A 3d steganalytic algorithm and steganalysis-resistant watermarking. IEEE Trans. Visual Comput. Graphics 23(2), 1002–1013 (2016)

    Article  Google Scholar 

  68. A. Bhattacharyya, “On a measure of divergence between two multinomial populations,” Sankhyā: the indian journal of statistics, pp. 401–406, 1946

  69. S. Cai and X. Shen, “Octree-based robust watermarking for 3d model.,” Journal of Multimedia, vol. 6, no. 1, 2011

  70. Garg, H., Agarwal, S.: A secure image based watermarking for 3d polygon mesh. Science and Technology 16(4), 287–303 (2013)

    Google Scholar 

  71. Chen, H.-K., Chen, W.-S.: Gpu-accelerated blind and robust 3d mesh watermarking by geometry image. Multimedia Tools and Applications 75(16), 10077–10096 (2016)

    Article  Google Scholar 

  72. Cayre, F., Macq, B.: Data hiding on 3-d triangle meshes. IEEE Trans. Signal Process. 51(4), 939–949 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  73. S. Borah and B. Borah, “Prediction error expansion (pee) based reversible polygon mesh watermarking scheme for regional tamper localization,” Multimedia Tools and Applications, pp. 1–22, 2020

  74. X. Rolland-Neviere, G. Doërr, and P. Alliez, “Anti-cropping blind resynchronization for 3d watermarking,” in 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1702–1706, IEEE, 2015

  75. Chou, C.-M., Tseng, D.-C.: Technologies for 3d model watermarking: A survey. International Journal of Computer Science and Network Security 7, 328–334 (2007)

    Google Scholar 

  76. Devi, H.S., Singh, K.M.: A brief survey on 3d watermarking techniques. Journal of Basic and Applied Engineering Research 2, 1644–1648 (2015)

    Google Scholar 

  77. N. Aspert, D. Santa-Cruz, and T. Ebrahimi, “Mesh: Measuring errors between surfaces using the hausdorff distance,” in Proceedings. IEEE international conference on multimedia and expo, vol. 1, pp. 705–708, IEEE, 2002

  78. Huttenlocher, D.P., Klanderman, G.A., Rucklidge, W.J.: Comparing images using the hausdorff distance. IEEE Trans. Pattern Anal. Mach. Intell. 15(9), 850–863 (1993)

    Article  Google Scholar 

  79. Wu, W.: Quantized gromov-hausdorff distance. J. Funct. Anal. 238(1), 58–98 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  80. K. Wang, G. Lavoué, F. Denis, A. Baskurt, and X. He, “A benchmark for 3d mesh watermarking,” in 2010 Shape Modeling International Conference, pp. 231–235, IEEE, 2010

  81. G. Lavoué, E. D. Gelasca, F. Dupont, A. Baskurt, and T. Ebrahimi, “Perceptually driven 3d distance metrics with application to watermarking,” in Applications of Digital Image Processing XXIX, vol. 6312, p. 63120L, International Society for Optics and Photonics, 2006

  82. Z. Karni and C. Gotsman, “Spectral compression of mesh geometry,” in Proceedings of the 27th annual conference on Computer graphics and interactive techniques, pp. 279–286, 2000

  83. M. Eshraghi and F. F. Samavati, “3d watermarking robust to accessible attacks,” in Proceedings of the First International Conference on Immersive Telecommunications, pp. 1–6, Citeseer, 2007

  84. Chetouani, A.: A 3d mesh quality metric based on features fusion. Electronic Imaging 2017(20), 4–8 (2017)

    Article  Google Scholar 

  85. Zhan, Y.-Z., Li, Y.-T., Wang, X.-Y., Qian, Y.: A blind watermarking algorithm for 3d mesh models based on vertex curvature. Journal of Zhejiang University SCIENCE C 15(5), 351–362 (2014)

    Article  Google Scholar 

  86. W.-G. He and Y. Li, “A local space based watermarking algorithm for three dimensional meshes,” in 2009 International Symposium on Computer Network and Multimedia Technology, pp. 1–4, IEEE, 2009

  87. Chen, L., Kong, X., Weng, B., Yao, Z., Pan, R.: A novel robust mesh watermarking based on bnbw. EURASIP Journal on Advances in Signal Processing 2011, 1–9 (2011)

    Article  Google Scholar 

  88. Liu, J., Yang, Y., Ma, D., He, W., Wang, Y.: A novel watermarking algorithm for three-dimensional point-cloud models based on vertex curvature. Int. J. Distrib. Sens. Netw. 15(1), 1550147719826042 (2019)

    Article  Google Scholar 

  89. Y. Liu, B. Prabhakaran, and X. Guo, “A robust spectral approach for blind watermarking of manifold surfaces,” in Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 43–52, 2008

  90. Yu, Z., Ip, H.H., Kwok, L.: A robust watermarking scheme for 3d triangular mesh models. Pattern Recogn. 36(11), 2603–2614 (2003)

    Article  Google Scholar 

  91. Y. Yang, R. Pintus, H. Rushmeier, and I. Ivrissimtzis, “A steganalytic algorithm for 3d polygonal meshes,” in 2014 IEEE International Conference on Image Processing (ICIP), pp. 4782–4786, IEEE, 2014

  92. Lee, S.-H., Kwon, K.-R.: A watermarking for 3d mesh using the patch cegis. Digital Signal Processing 17(2), 396–413 (2007)

    Article  MathSciNet  Google Scholar 

  93. R. Darazi, R. Hu, and B. Macq, “Applying spread transform dither modulation for 3d-mesh watermarking by using perceptual models,” in 2010 IEEE international conference on acoustics, speech and signal processing, pp. 1742–1745, IEEE, 2010

  94. P. R. Alface and B. Macq, “Blind watermarking of 3d meshes using robust feature points detection,” in IEEE International Conference on Image Processing 2005, vol. 1, pp. I–693, IEEE, 2005

  95. R. Hu, P. Rondao-Alface, and B. Macq, “Constrained optimisation of 3d polygonal mesh watermarking by quadratic programming,” in 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1501–1504, IEEE, 2009

  96. Feng, X., Zhang, W., Liu, Y.: Double watermarks of 3d mesh model based on feature segmentation and redundancy information. Multimedia tools and applications 68(3), 497–515 (2014)

    Article  Google Scholar 

  97. M. Yeung and B.-L. Yeo, “Fragile watermarking of three-dimensional objects,” in Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), vol. 2, pp. 442–446, IEEE, 1998

  98. Wang, K., Lavoué, G., Denis, F., Baskurt, A.: Hierarchical watermarking of semiregular meshes based on wavelet transform. IEEE Trans. Inf. Forensics Secur. 3(4), 620–634 (2008)

    Article  Google Scholar 

  99. L. K. Sharma and D. Ojha, “Imperceptible watermarking scheme for 3d triangular mesh,”

  100. P. Thiyagarajan, V. Natarajan, G. Aghila, V. P. Venkatesan, and R. Anitha, “Pattern based 3d image steganography,” 3D Research, vol. 4, no. 1, pp. 1–8, 2013

  101. Lavoué, G., Larabi, M.C., Váša, L.: On the efficiency of image metrics for evaluating the visual quality of 3d models. IEEE Trans. Visual Comput. Graphics 22(8), 1987–1999 (2015)

    Article  Google Scholar 

  102. L. Chen and J. Zhao, “Robust contourlet-based watermarking for depth-image-based rendering 3d images,” in 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp. 1–4, IEEE, 2016

  103. Yin, K., Pan, Z., Shi, J., Zhang, D.: Robust mesh watermarking based on multiresolution processing. Computers & graphics 25(3), 409–420 (2001)

    Article  Google Scholar 

  104. Li, L., Wang, S., Zhang, S., Luo, T., Chang, C.-C.: Homomorphic encryption-based robust reversible watermarking for 3d model. Symmetry 12(3), 347 (2020)

    Article  Google Scholar 

  105. Li, L., Zhang, D., Pan, Z., Shi, J., Zhou, K., Ye, K.: Watermarking 3d mesh by spherical parameterization. Computers & Graphics 28(6), 981–989 (2004)

    Article  Google Scholar 

  106. F. Peng, B. Long, and M. Longa, “A general region nesting based semi-fragile reversible watermarking for authenticating 3d mesh models,” IEEE Transactions on Circuits and Systems for Video Technology, 2021

  107. J.-S. Lee, C. Liu, Y.-C. Chen, W.-C. Hung, and B. Li, “Robust 3d mesh zero-watermarking based on spherical coordinate and skewness measurement,” Multimedia Tools and Applications, pp. 1–16, 2021

  108. Liu, G., Wang, Q., Wu, L., Pan, R., Wan, B., Tian, Y.: Zero-watermarking method for resisting rotation attacks in 3d models. Neurocomputing 421, 39–50 (2021)

    Article  Google Scholar 

  109. Malik, H., Ansari, R., Khokhar, A.: Robust audio watermarking using frequency-selective spread spectrum. IET Inf. Secur. 2(4), 129–150 (2008)

    Article  Google Scholar 

  110. M. Soleymani, “The quest for visual interest,” in Proceedings of the 23rd ACM international conference on Multimedia, pp. 919–922, 2015

  111. V. Solachidis, A. Tefas, N. Nikolaidis, S. Tsekeridou, A. Nikolaidis, and I. Pitas, “A benchmarking protocol for watermarking methods,” in Proceedings 2001 International Conference on Image Processing (Cat. No. 01CH37205), vol. 3, pp. 1023–1026, IEEE, 2001

  112. J. Bennour and J.-L. Dugelay, “Toward a 3d watermarking benchmark,” in 2007 IEEE 9th Workshop on Multimedia Signal Processing, pp. 369–372, IEEE, 2007

  113. Jiang, R., Zhang, W., Hou, D., Wang, H., Yu, N.: Reversible data hiding for 3d mesh models with three-dimensional prediction-error histogram modification. Multimedia Tools and Applications 77(5), 5263–5280 (2018)

    Article  Google Scholar 

  114. Zhang, Q., Song, X., Wen, T., Fu, C.: Reversible data hiding for 3d mesh models with hybrid prediction and multilayer strategy. Multimedia Tools and Applications 78(21), 29713–29729 (2019)

    Article  Google Scholar 

  115. Cheung, Y.-M., Wu, H.-T.: A sequential quantization strategy for data embedding and integrity verification. IEEE Trans. Circuits Syst. Video Technol. 17(8), 1007–1016 (2007)

    Article  Google Scholar 

  116. H.-T. Wu and Y.-m. Cheung, “A reversible data hiding approach to mesh authentication,” in The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI’05), pp. 774–777, IEEE, 2005

  117. Borah, S., Borah, B.: A blind, semi-fragile 3d mesh watermarking algorithm using minimum distortion angle quantization index modulation (3d-mdaqim). Arab. J. Sci. Eng. 44(4), 3867–3882 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Modigari Narendra.

Ethics declarations

Conflict of interest

The authors Modigari Narendra, M. L. Valarmathi, L. Jani Anbarasi declare that they have no conflict of interest.

Additional information

Communicated by M. Kankanhalli.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Narendra, M., Valarmathi, M.L. & Anbarasi, L.J. Watermarking techniques for three-dimensional (3D) mesh models: a survey. Multimedia Systems 28, 623–641 (2022). https://doi.org/10.1007/s00530-021-00860-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-021-00860-z

Keywords

Navigation