Analysis of 3 Dimensional Object Watermarking Techniques

  • Deepika Khare
  • Sumita Verma
  • Ravindra Gupta
  • Gajendra Singh Chandel
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 150)


Due to the explosive growth of Internet and the development of digital content designing and processing techniques, many valuable materials can be represented in digital forms for exhibition and access via Internet. Due to the characteristics of easy duplication and modification of digital contents, it is necessary to develop a variety of watermarking techniques for various protection purposes such as ownership claiming and authentication. In this survey paper, we examine 3D model watermarking technologies developed over the last decade. We classify various algorithms into two classes: robust watermarking and fragile watermarking.


3D watermarking 3D mesh Digital signature Copyright protection Information security 


  1. 1.
    Maurer U (2004) New approaches to digital evidence. Proc IEEE 92(6):933–947CrossRefGoogle Scholar
  2. 2.
    Wells TO (2000) Electronic and digital signatures: in search of a standard. IT Prof 2(3):24–30CrossRefGoogle Scholar
  3. 3.
    Beth T, Gollman D (1989) Algorithm engineering for public key algorithms. IEEE J Select Areas Commun 7(4):458–466CrossRefGoogle Scholar
  4. 4.
    Diffie W, Hellman ME (1979) Privacy and authentication: an introduction to cryptography. Proc IEEE 67(3):397–427CrossRefGoogle Scholar
  5. 5.
    Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654MathSciNetMATHCrossRefGoogle Scholar
  6. 6.
    Cayre F, Macq B (2003) Data hiding on 3-D triangle meshes. IEEE Trans Signal Process 51(4):939–949MathSciNetCrossRefGoogle Scholar
  7. 7.
    Praun E, Hoppe H, Finkelstein A (1999) Robust mesh watermarking. In: ACM SIGGRAPH, Los Angeles, CA, Aug 8–13, 1999, pp 49–56Google Scholar
  8. 8.
    Hoppe H (1996) Progressive meshes. In: ACM SIGGRAPH, New Orleans, LA, Aug 4–9, 1996, pp. 99–108Google Scholar
  9. 9.
    Johnson AE, Hebert M (1999) Using spin-images for efficient multiple model recognition in cluttered 3-D scenes. IEEE Trans Pattern Anal Mach Intell 21:433–449Google Scholar
  10. 10.
    Xie L, Arce GR (2001) A class of authentication digital watermarks for secure multimedia communication. IEEE Trans Image Process 10(11):1754–1764Google Scholar
  11. 11.
    Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791Google Scholar
  12. 12.
    Ohbuchi R, Masuda H, Aono M (1998) Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models. Comput Commun 21(15):1344–1354CrossRefGoogle Scholar
  13. 13.
    Ohbuchi R, Masuda H, Aono M (1998) Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J Select Areas Commun 16(4):551–560CrossRefGoogle Scholar
  14. 14.
    Ohbuchi R, Takahashi S, Miyazawa T, Mukaiyama A (2001) Watermarking 3D polygonal meshes in the mesh spectral domain. In: Proceedings of the graphics interface, Ottawa, Ontario, June 7–9, 2001, pp 9–17Google Scholar
  15. 15.
    Ohbuchi R, Mukaiyama A, Takahashi S (2002) A frequency-domain approach to watermarking 3D shapes. Comput Graph Forum 21(3):373–382Google Scholar
  16. 16.
    Benedens O (1999) Geometry-based watermarking of 3-D models. IEEE Comput Graph Appl 19(1):46–55CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Deepika Khare
    • 1
  • Sumita Verma
    • 1
  • Ravindra Gupta
    • 1
  • Gajendra Singh Chandel
    • 1
  1. 1.SSSISTSehoreIndia

Personalised recommendations