Skip to main content

Part of the book series: Advanced Topics in Science and Technology in China ((ATSTC,volume 0))

Abstract

As mentioned in Chapter 5, 3D model watermarking techniques can be classified into irreversible watermarking techniques and reversible watermarking techniques. Chapter 5 focuses on irreversible watermarking techniques. Now we turn to reversible watermarking techniques in this chapter. In fact, reversible watermarking is a branch of reversible data hiding. Reversible watermarking schemes are designed mainly for copyright protection and content authentication, while reversible data hiding schemes are designed for more application areas, including covert communication, besides copyright protection and content authentication. Reversible data hiding is also called invertible data hiding, lossless data hiding, distortion-free data hiding or erasable data hiding. It was initially investigated and designed for digital images. Then reversible data hiding schemes were reported in the literature for other media such as video, audio, 2D vector data, motion data and 3D models. After the first work on 3D model data hiding was reported [1], most subsequent work focuses on the following four aspects: (1) to improve the robustness of the 3D model data hiding schemes [2, 3] against rotation, translation, scaling, mesh simplification, and so on; (2) to reduce the visual distortions introduced by data embedding [4]; (3) to achieve the goal of blind extraction of the hidden data [5]; (4) to enhance the embedding capacity of the confidential data [6]. Some of these methods are based on transform domains and/or multiresolution analysis [7–9].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Ohbuchia, H. Masudab and M. Aonoa. Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models. Computer Communications, 1998, 21:1344–1354.

    Article  Google Scholar 

  2. E. E. Abdallah, A. B. Hamza and P. Bhattacharya. Robust 3D watermarking technique using eigendecomposition and nonnegative matrix factorization. Lecture Notes in Computer Science, 2008, Vol. 5112, pp. 253–262.

    Article  Google Scholar 

  3. O. Benedens. Watermarking of 3D polygonal based models with robustness against mesh simplification. In: Proc. SPIE Security and Watermarking of Multimedia, 1999, pp. 329–340.

    Google Scholar 

  4. M. Corsini, F. Uccheddu, F. Bartolini, et al. 3D watermarking technology: visual quality aspects. VSMM, 2003, pp. 1–8.

    Google Scholar 

  5. O. Benedens and C. Busch. Toward blind detection of robust watermarks in polygonal models. In: Proc. EUROGRAPHICS Comput. Graph. Forum, 2000, Vol. 19, pp. C199–C208.

    Article  Google Scholar 

  6. O. Benedens. Two high capacity methods for embedding public watermarks into 3D polygonal models. In: Proc. Multimedia and Security, 1999, pp. 95–99.

    Google Scholar 

  7. R. Ohbuchi, A. Mukaiyama and S. Takahashi. A frequency domain approach to watermarking 3D shapes. Computer Graphics Forum, 2002, 21(3):373–382.

    Article  Google Scholar 

  8. R. Ohbuchi, S. Takahashi, T. Miyazawa, et al. Watermarking 3D polygonal meshes in the mesh spectral domain. In: Proceedings of Graphics Interface, 2001, pp.9–18.

    Google Scholar 

  9. S. Kanai, H. Date and T. Kishinami. Digital watermarking for 3D polygons using multiresolution wavelet decomposition. In: Proceeding of the Sixth International Workshop on Geometric Modeling: Fundamentals and Applications, 1998, pp. 296–307.

    Google Scholar 

  10. I. J. Cox, M. L. Millter, J. A. Bloom, et al. Digital Watermarking and Steganography (2nd ed.). Morgan Kaufmann, 2008.

    Google Scholar 

  11. H. T. Sencar, M. Ramkumar and A. N. Akansu. Data Hiding Fundamentals and Applications. Elsevier Academic Press, 2004.

    Google Scholar 

  12. M. Wu and B. Liu. Multimedia Data Hiding. Springer-Verlag, 2003.

    Google Scholar 

  13. M. Awrangjeb. An overview of reversible data hiding. In: Proc. 6th Int. Conf. Computer and Information Technology, Jahangirnagar University, Bangladesh, 2003, pp. 75–79.

    Google Scholar 

  14. F. Mintzer, J. Lotspiech and N. Morimoto. Safeguarding digital library contents and users: digital watermarking. D-Lib Magazine, 1997.

    Google Scholar 

  15. S. Lee, C. D. Yoo and T. Kalker. Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Information Forensics and Security, 2007, 2(3):321–330.

    Article  Google Scholar 

  16. J. Fridrich, J. Goljan and R. Du. Invertible authentication. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, 2001, Vol. 4314, pp. 197–208.

    Google Scholar 

  17. M. U. Celik, G. Sharma, A. M. Tekalp, et al. Lossless generalized-LSB data embedding. IEEE Trans. Image Processing, 2005, 14(2):253–266.

    Article  Google Scholar 

  18. B. Yang, M. Schmucker, C. B. W. Funk, et al. Integer DCT-based reversible watermarking for images using companding technique. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents, 2004, Vol. 5306, pp. 405–415.

    Google Scholar 

  19. G. Xuan, Y. Q. Shi, Q. Yao, et al. Lossless data hiding using histogram shifting method based on integer wavelets. In: International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Springer-Verlag, 2006, Vol. 4283, pp. 323–332.

    Google Scholar 

  20. J. Tian. Reversible data embedding using a difference expansion. IEEE Trans. Circuits and Systems for Video Technology, 2003, 13(8):890–896.

    Article  Google Scholar 

  21. A. M. Alattar. Reversible watermark using difference expansion of triplets. In: Proc. IEEE Int. Conf. Image Processing, 2003, Vol. 1, pp. 501–504.

    Google Scholar 

  22. A. M. Alattar. Reversible watermark using difference expansion of quads. In: Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, 2004, Vol. 3, pp. 377–380.

    Google Scholar 

  23. A. M. Alattar. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Processing, 2004, 13(8):1147–1156.

    Article  MathSciNet  Google Scholar 

  24. L. Kamstra and H. J. A. M. Heijmans. Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Processing, 2005, 14(12):2082–2090.

    Article  MathSciNet  Google Scholar 

  25. D. M. Thodi and J. J. Rodriguez. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Processing, 2007, 16(3):721–730.

    Article  MathSciNet  Google Scholar 

  26. Z. Ni, Y. Q. Shi, N. Ansari, et al. Reversible data hiding. IEEE Trans. Circuits and Systems for Video Technology, 2006, 16(3):354–362.

    Article  Google Scholar 

  27. E. Varsaki, V. Fotopoulos and A. N. Skodras. A reversible data hiding technique embedding in the image histogram. Technical Report HOU-CS-TR-2006-08-GR, Hellenic Open University, 2006.

    Google Scholar 

  28. J. Hwang, J. W. Kim and J. U. Choi. A reversible watermarking based on histogram shifting. In: International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Springer-Verlag, 2006, Vol. 4283, pp. 348–361.

    Google Scholar 

  29. W. C. Kuo, D. J. Jiang and Y. C. Huang. Reversible data hiding based on histogram. In: Int. Conf. on Intelligent Computing, Lecture Notes in Artificial Intelligence, Springer-Verlag, 2007, Vol. 4682, pp. 1152–1161.

    Google Scholar 

  30. P. Tsai, Y. C. Hu and H. L. Yeh. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process, 2009.

    Google Scholar 

  31. S. K. Lee, Y. H. Suh and Y. S. Ho. Lossless data hiding based on histogram modification of difference images. In: Pacific Rim Conference on Multimedia, Lecture Notes in Computer Science, Springer-Verlag, 2004, Vol. 3333, pp. 340–347.

    Google Scholar 

  32. C. C. Lin, W. L. Tai and C. C. Chang. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition, 2008, 41(12):3582–3591.

    Article  MATH  Google Scholar 

  33. Z. Ni, Y. Shi, N. Ansari, et al. Reversible data hiding. In: IEEE Proceedings of ISCAS’03, 2003, (2):II–912~II–915.

    Google Scholar 

  34. X. Luo, Q. Cheng and J. Tian. A lossless data embedding scheme for medical images in applications of E-Diagnosis. In: Proc. IEEE 25th Annual Int. Conf. Engineering in Medicine and Biology Society, 2003, Vol. 1, pp. 852–855.

    Google Scholar 

  35. P. Ross, M. A. Viegerver, M. C. A. Van Dijke,et al. Reversible infraframe of medical images. IEEE Trans. Medical Image, 1998, 7:328–336.

    Article  Google Scholar 

  36. F. Bartolini, G. Bini, V. Cappellini, et al. Enforcement of copyright laws for multimedia through blind, detectable, reversible watermarking. In: IEEE Int. Conf. Multimedia Computing and Systems, 1999, Vol. 2, pp. 199–203.

    Article  Google Scholar 

  37. M. Barni, F. Bartolini, V. Cappellini, et al. Near-lossless digital watermarking for copyright protection of remote sensing images. In: Proc. IEEE Int. Conf. Geoscience and Remote Sensing Symposium, 2002, Vol. 3, pp. 1447–1449.

    Google Scholar 

  38. D. Vleeschouwer, J. E. Delaigle and B. Macq. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia, 2001, 5(1):97–105.

    Article  Google Scholar 

  39. Chou, C. Y. Jhou and S. C. Chu. Reversible watermark for 3D vertices based on data hiding in mesh formation. International Journal of Innovative Computing, Information and Control, 2009, 5(7):1893–1901.

    Google Scholar 

  40. H. Luo, Z. M. Lu and J. S. Pan. A reversible data hiding scheme for 3D point cloud model. In: IEEE International Symposium on Signal Processing and Information Technology, 2006, pp. 863–867.

    Google Scholar 

  41. H..Luo, J. S. Pan, Z. M. Lu, et al. Reversible data hiding for 3D point cloud model. In: Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006.

    Google Scholar 

  42. H. T. Wu and J. L. Dugelay. Reversible watermarking of 3D mesh models by prediction-error expansion. MMSP, 2008, pp. 797–802.

    Google Scholar 

  43. H. T. Wu and M. C. Yiu. A reversible data hiding approach to mesh authentication. In: Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence, 2005.

    Google Scholar 

  44. Z. Sun, Z. M. Lu and Z. Li. Reversible data hiding for 3D meshes in the PVQ-compressed domain. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006, pp. 593–596.

    Google Scholar 

  45. Z. M. Lu and Z. Li. High capacity reversible data hiding for 3D meshes in the PVQ domain. In: The 6th International Workshop, IWDW, LNCS 5041, 2007, pp. 233–243.

    Google Scholar 

  46. R. Ohbuchi, H. Masuda and M. Aono. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Select. Areas Commun., 1998, 16:551–560.

    Article  Google Scholar 

  47. O. Benedens. Geometry-based watermarking of 3-D models. IEEE Comput. Graph., Special Issue on Image Security, 1999, 1/2:46–55.

    Google Scholar 

  48. E. Praun, H. Hoppe and A. Finkelstein. Robust mesh watermarking. In: Proc. SIGGRAPH, 1999, pp. 69–76.

    Google Scholar 

  49. M. M. Yeung and B. L. Yeo. Fragile watermarking of three dimensional objects. In: Proc. 1998 Int. Conf. Image Processing, ICIP98, 1998, Vol. 2, pp. 442–446.

    Article  Google Scholar 

  50. F. Cayre and B. Macq. Data hiding on 3-D triangle meshes. IEEE Trans. Signal Processing, 2003, 51(4):939–949.

    Article  MathSciNet  Google Scholar 

  51. H. Y. S. Lin, H. Y. M. Liao, C. S. Lu, et al. Fragile watermarking for authenticating 3D polygonal meshes. IEEE Transactions on Multimedia, 2005, 7(6):997–1006.

    Article  Google Scholar 

  52. J. Dittmann and O. Benedens. Invertible authentication for 3D meshes. In: Proceedings of SPIE — The International Society for Optical Engineering, 2003, Vol. 5020, pp. 653–664.

    Google Scholar 

  53. X. Mao, M. Shiba and A. Imamiya. Watermarking 3D geometric models through triangle subdivision. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, 2001, Vol. 4314, pp. 253–260.

    Google Scholar 

  54. H. T. Wu and Y. M. Cheung. A new fragile mesh watermarking algorithm for authentication. Paper presented at The IFIP 20th International Information Security Conference, 2005, pp. 509–523.

    Google Scholar 

  55. B. Chen and G. W. Wornell. Dither modulation: a new approach to digital watermarking and information embedding. In: Proc. SPIE: Security and Watermarking of Multimedia Contents, 1999, Vol. 3657, pp. 342–353.

    Google Scholar 

  56. C. W. Honsinger, P. Jones, M. Rabbani, et al. Lossless recovery of an original mesh containing embedded data. US Patent Application, Docket No: 77102/E-D, 1999.

    Google Scholar 

  57. J. Tian. High capacity reversible data embedding and content authentication. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing — Proceedings, 2003, Vol. 3, pp. 517–520.

    Google Scholar 

  58. G. Xuan, Y. Q. Shi, Z. C. Ni, et al. High capacity lossless data hiding based on integer wavelet transform. In: Proceedings — IEEE International Symposium on Circuits and Systems, 2004, Vol. 2.

    Google Scholar 

  59. Y. Q. Shi, Z. Ni, D. Zou, et al. Lossless data hiding: fundamentals, algorithms and applications. In: Proceedings — IEEE International Symposium on Circuits and Systems, 2004, Vol. 2.

    Google Scholar 

  60. Z. Ni, Y. Q. Shi, A. Nirwan, et al. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3):354–361.

    Article  Google Scholar 

  61. C. Mehmet, U. S. Gaurav, T. A. Murat, et al. Reversible data hiding. Paper presented at The IEEE International Conference on Image Processing, 2002, Vol. 2, pp. II/157–II/160.

    Google Scholar 

  62. R. Xuan, C. Y. Yang, Y. Z. Zhen, et al. Reversible data hiding based on wavelet spread spectrum. In: 2004 IEEE 6th Workshop on Multimedia Signal Processing, 2004, pp. 211–214.

    Google Scholar 

  63. Z. C. Ni, Y. Q. Shi, A. Nirwan, et al. Robust lossless image data hiding. Paper presented at The IEEE International Conference on Multimedia and Expo (ICME), 2004, Vol. 3, pp. 2199–2202.

    Google Scholar 

  64. J. Fridrich, M. Goljan and R. Du. Invertible authentication watermark for JPEG images. In: Proc. IEEE Int. Conf. on Information Technology: Coding and Computing, 2001.

    Google Scholar 

  65. R. Gray and D. Neuhoff. Quantization. IEEE Trans. Information Theory, 1998, 44(10):2325–2384.

    Article  MATH  MathSciNet  Google Scholar 

  66. P. H. Chou and T. H. Meng. Vertex data compression through vector quantization. IEEE Transactions on Visualization and Computer Graphics, 2002, 8(4):373–382.

    Article  Google Scholar 

  67. Princeton University. 3D Model Search Engine. <http://shape.cs.princeton.edu>.

  68. C. Zhu and L. M. Po. Minimax partial distortion competitive learning for optimal codebook design. IEEE Trans. on Image Processing, 1998, 7(10):1400–1409.

    Article  Google Scholar 

  69. S. W. Ra and J. K. Kim. Fast mean-distance-ordered partial codebook search algorithm for image vector quantization. IEEE. Trans. on Circuits and Systems-II, 1993, 40(9):576–579.

    Article  Google Scholar 

  70. C. M. Wang and P. C. Wang. Steganography on point-sampled geometry. Computers & Graphics, 2006, 30:244–254.

    Article  Google Scholar 

  71. R. Ohbuchi, H. Masuda and M. Aono. Embedding watermark in 3D models. In: Proceedings of the IDMS’97, Lecture Notes in Computer Science, Springer, 1997, pp. 1–11.

    Google Scholar 

  72. R. Ohbuchi, H. Masuda and M. Aono. Watermarking three-dimensional polygonal models. In: Proceedings of the ACM Multimedia’97, 1997, pp. 261–272.

    Google Scholar 

  73. R. Ohbuchi, H. Masuda and M. Aono. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE Journal on Selected Areas in Communications, 1998, 16(4):551–560.

    Article  Google Scholar 

  74. R. Ohbuchi, H. Masuda and M. Aono. Watermark embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models. Computer Communications, 1998.

    Google Scholar 

  75. O. Benedens. Geometry-based watermarking of 3D models. IEEE Computer Graphics and Applications, 1999, 19(1):46–55.

    Article  Google Scholar 

  76. B. L. Yeo and M. M. Yeung. Watermarking 3D Objects for Verification. IEEE Computer Graphics and Applications, 1999, 19(1):36–45.

    Article  Google Scholar 

  77. M. G. Wagner. Robust watermarking of polygonal meshes. In: Proceedings of Geometric Modeling and Processing, 2000, pp. 10–12.

    Google Scholar 

  78. E. Praun, H. Hoppe and A. Finkelstein. Robust mesh watermarking. Microsoft Technical Report TR-99-05, 1999.

    Google Scholar 

  79. R. Ohbuchi, A. Mukaiyama and S. Takahashi. A frequency-domain approach to watermarking 3D shapes. In: Proc. EUROGRAPHICS 2002, 2002.

    Google Scholar 

  80. R. Ohbuchi, A. Mukaiyama and S. Takahashi. Watermarking a 3D shape model defined as a point set. In: Proc. of Cyber Worlds 2004, IEEE Computer Society Press, 2004, pp. 392–399.

    Google Scholar 

  81. M. Voigt, B. Yang and C. Busch. Reversible watermarking of 2D-vector watermark. In: Proceedings of the Multimedia and Security Workshop 2004 (MM&SEC’04), 2004, pp. 160–165.

    Google Scholar 

  82. G. Plonka and M. Tasche. Invertible integer DCT algorithms. Appl. Comput. Harmon. Anal., 2003, 15:70–88.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Zhejiang University Press, Hangzhou and Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yu, F., Luo, H., Lu, Z., Wang, P. (2010). Reversible Data Hiding in 3D Models. In: Three-Dimensional Model Analysis and Processing. Advanced Topics in Science and Technology in China, vol 0. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12651-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12651-2_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12650-5

  • Online ISBN: 978-3-642-12651-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics