The Visual Computer

, Volume 26, Issue 9, pp 1177–1181 | Cite as

An improved data hiding approach for polygon meshes

  • Shih-Chun Tu
  • Wen-Kai Tai
  • Martin Isenburg
  • Chin-Chen Chang
Original Article

Abstract

We present an improved technique for data hiding in polygonal meshes, which is based on the work of Bogomjakov et al. (Comput. Graph. Forum 27(2):637–642, 2008). Like their method, we use an arrangement on primitives relative to a reference ordering to embed a message. But instead of directly interpreting the index of a primitive in the reference ordering as the encoded/decoded bits, our method slightly modifies the mapping so that our modification doubles the chance of encoding an additional bit compared to Bogomjakov et al.’s (Comput. Graph. Forum 27(2):637–642, 2008). We illustrate the inefficiency in the original mapping of Bogomjakov et al. (Comput. Graph. Forum 27(2):637–642, 2008) with an intuitive representation using a binary tree.

Although both methods have the same minimal and maximal capacities and are both only one bit per primitive less than optimal, our method improves the average capacity up to 0.63 bits per primitive. Our embedding and extraction algorithms are just as simple to implement and just as efficient, O(n), as those of Bogomjakov et al. (Comput. Graph. Forum 27(2):637–642, 2008).

Data hiding Permutation steganography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
  5. 5.
    Artz, D.: Digital steganography: hiding data within data. IEEE Internet Comput. 5(3), 75–80 (2001) CrossRefGoogle Scholar
  6. 6.
    Aspert, N., Drelie, E., Maret, Y., Ebrahimi, T.: Steganography for three-dimensional polygonal meshes. Proc. SPIE 4790, 211–219 (2002) CrossRefGoogle Scholar
  7. 7.
    Benedens, O.: Geometry-based watermarking of 3d models. IEEE Comput. Graph. Appl. 19(1), 46–55 (1999) CrossRefGoogle Scholar
  8. 8.
    Bogomjakov, A., Gotsman, C., Isenburg, M.: Distortion-free steganography for polygonal meshes. Comput. Graph. Forum 27(2), 637–642 (2008) CrossRefGoogle Scholar
  9. 9.
    Cayre, F., Devillers, O., Schmitt, F., Maître, H.: Watermarking 3d triangle meshes for authentication and integrity. INRIA Res. Rep. 5223, 211–219 (2004) Google Scholar
  10. 10.
    Cayre, F., Macq, B.: Data hiding on 3-d triangle meshes. IEEE Trans. Signal Process. 51(4), 939–949 (2003) CrossRefMathSciNetGoogle Scholar
  11. 11.
    Cheng, Y.M., Wang, C.M.: A high-capacity steganographic approach for 3d polygonal meshes. Vis. Comput. 22(9), 845–855 (2006) CrossRefGoogle Scholar
  12. 12.
    Cheng, Y.M., Wang, C.M.: An adaptive steganographic algorithm for 3d polygonal meshes. Vis. Comput. 23(9–11), 721–732 (2007) CrossRefMathSciNetGoogle Scholar
  13. 13.
    Cho, J.W., Prost, R., Jung, H.Y.: An oblivious watermarking for 3-d polygonal meshes using distribution of vertex norms. IEEE Trans. Signal Process. 55(1), 142–155 (2007) CrossRefMathSciNetGoogle Scholar
  14. 14.
    Cotting, D., Weyrich, T., Pauly, M., Gross, M.: Robust watermarking of polygonal meshes. In: SMI’04: International Conference on Shape Modeling and Applications, pp. 233–242 (2004) Google Scholar
  15. 15.
    Kanai, S., Date, H., Kishinami, T.: Digital watermarking for 3d polygons using multiresolution wavelet decomposition. In: Proceedings of Sixth IFIP WG 5.2 GEO-6, pp. 296–307 (1998) Google Scholar
  16. 16.
    Maret, Y., Ebrahimi, T.: Data hiding on 3d polygonal meshes. In: MM&Sec’04: Proceedings of the ACM 2004 Workshop on Multimedia and Security, pp. 68–74 (2004) Google Scholar
  17. 17.
    Ohbuchi, R., Masuda, H., Aono, M.: Watermarking three-dimensional polygonal models. In: MULTIMEDIA’97: Proceedings of the Fifth ACM International Conference on Multimedia, pp. 261–272 (1997) Google Scholar
  18. 18.
    Ohbuchi, R., Mukaiyama, A., Takahashi, S.: A frequency domain approach to watermarking 3d shapes. Comput. Graph. Forum 21(3), 373–382 (2002) CrossRefGoogle Scholar
  19. 19.
    Ohbuchi, R., Mukaiyama, A., Takahashi, S.: Watermarking a 3d shape model defined as a point set. In: CW’04: Third International Conference on Cyberworlds, pp. 392–399 (2004) Google Scholar
  20. 20.
    Ohbuchi, R., Takahashi, S., Miyazawa, T., Mukaiyama, A.: Watermarking 3d polygonal meshes in the mesh spectral domain. In: GRIN’01: No Description on Graphics Interface 2001, pp. 9–17 (2001) Google Scholar
  21. 21.
    Praun, E., Hoppe, H., Finkelstein, A.: Robust mesh watermarking. In: Siggraph 1999, Computer Graphics Proceedings, pp. 49–56 (1999) Google Scholar
  22. 22.
    Rossignac, J.: Edgebreaker: Connectivity compression for triangle meshes. IEEE Trans. Vis. Comput. Graph. 5(1), 47–61 (1999) CrossRefGoogle Scholar
  23. 23.
    Wagner, M.G.: Robust watermarking of polygonal meshes. In: Proceedings of Geometric Modeling and Processing, pp. 201–208 (2000) Google Scholar
  24. 24.
    Wang, C.M., Cheng, Y.M.: An efficient information hiding algorithm for polygon models. Comput. Graph. Forum 24(3), 591–600 (2005) CrossRefGoogle Scholar
  25. 25.
    Wang, C.M., Wang, P.C.: Data hiding approach for point-sampled geometry. IEICE Trans. Commun. E88-B(1), 190–194 (2005) CrossRefGoogle Scholar
  26. 26.
    Wang, C.M., Wang, P.C.: Steganography on point-sampled geometry. Comput. Graph. 30(2), 244–254 (2006) CrossRefGoogle Scholar
  27. 27.
    Wu, H.T., Cheung, Y.M.: A reversible data hiding approach to mesh authentication. In: WI’05: the 2005 IEEE/WIC/ACM International Conference on Web Intelligence, pp. 774–777 (2005) Google Scholar
  28. 28.
    Yu, Z., Horace, H.S.I., Kwok, L.F.: A robust watermarking scheme for 3d triangular mesh models. Pattern Recognit. 36(11), 2603–2614 (2003) CrossRefGoogle Scholar
  29. 29.
    Zafeiriou, S., Tefas, A., Pitas, I.: Blind robust watermarking schemes for copyright protection of 3d mesh objects. IEEE Trans. Vis. Comput. Graph. 11(5), 596–607 (2005) CrossRefGoogle Scholar

Copyright information

© Springer-Verlag 2009

Authors and Affiliations

  • Shih-Chun Tu
    • 1
  • Wen-Kai Tai
    • 1
  • Martin Isenburg
    • 2
  • Chin-Chen Chang
    • 3
  1. 1.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan
  2. 2.Lawrence Livermore National LaboratoryLivermoreUSA
  3. 3.Department of Computer Science and Information EngineeringNational United UniversityMiaoliTaiwan

Personalised recommendations