Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation

  • Hao-tian Wu
  • Yiu-ming Cheung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7110)

Abstract

The technique of independent component analysis (ICA) has been utilized in digital image and audio watermarking. In this paper, it is applied to improve the security of 3D geometry watermarking by using the ICA de-mixing matrix for transformation. An orthogonal transformation (OT) matrix is further employed so that another watermarking scheme is generated. With the same embedding method, the two watermarking schemes are implemented on the test models. The experimental results show that they have similar performance in imperceptibility and capacity. As both of them have the properties of blind extraction and security, the OT-based scheme can be regarded as a simplified version of the ICA-based one with less computational cost.

Keywords

Watermark Image Independent Component Analysis Watermark Scheme Digital Watermark Audio Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, New York (2001)Google Scholar
  2. 2.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)Google Scholar
  3. 3.
    Comon, P.: Independent Component Analysis - A New Concept? Signal Processing 36(3), 287–314 (1994)CrossRefMATHGoogle Scholar
  4. 4.
    Hyvarinen, A., Oja, E.: Independent Component Analysis: Algorithms and Applications. Neural Networks 13(4-5), 411–430 (2000)CrossRefGoogle Scholar
  5. 5.
    Hyvarinen, A., Oja, E.: A Fast Fixed-Point Algorithm for Independent Component Analysis. Neural Computation 9(7), 1483–1492 (1997)CrossRefGoogle Scholar
  6. 6.
    González-Serrano, F.J., Molina-Bulla, H.Y., Murillo-Fuentes, J.J.: Independent Component Analysis Applied to Digital Watermarking. In: International Conference on Acoustic, Speech and Signal Processing (ICASSP), vol. 3, pp. 1997–2000 (2001)Google Scholar
  7. 7.
    Bounkong, S., Toch, B., Saad, D., Lowe, D.: ICA for Watermarking Digital Images. Journal of Machine Learning Research 4(7-8), 1471–1498 (2003)Google Scholar
  8. 8.
    Toch, B., Lowe, D., Saad, D.: Watermarking of Audio Signals Using Independent Component Analysis. In: Proceeding of the 3th International Conference on WEB Delivering of Music, pp. 71–74 (2003)Google Scholar
  9. 9.
    Yu, D., Sattar, F., Ma, K.-K.: Watermark Detection and Extraction Using Independent Component Analysis Method. EURASIP Journal on Applied Signal Processing 2002(1), 92–104, doi:10.1155/S111086570200046XGoogle Scholar
  10. 10.
    Szu, H., Noel, S., Yim, S.-B., Willey, J., Landa, J.: Multimedia Authenticity Protection with ICA Watermarking and Digital Bacteria Vaccination. Neural Networks, Special Issue for International Joint Conference on Neural Networks 16(5-6), 907–914 (2003)Google Scholar
  11. 11.
    Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefMATHGoogle Scholar
  12. 12.
    Ohbuchi, R., Masuda, H., Aono, M.: Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications. IEEE Journal of Selected Areas in Communications 16(4), 551–560 (1998)CrossRefGoogle Scholar
  13. 13.
    Benedens, O.: Geometry-Based Watermarking of 3-D Models. IEEE Computer Graphics and Application, Special Issue on Image Security 19(1), 46–55 (1999)CrossRefGoogle Scholar
  14. 14.
    Praun, E., Hoppe, H., Finkelstein, A.: Robust Mesh Watermarking. In: Proceedings of ACM SIGGRAPH, pp. 69–76 (1999)Google Scholar
  15. 15.
    Yeo, B.L., Yeung, M.M.: Watermarking 3-D Objects for Verification. IEEE Computer Graphics and Application 19(1), 36–45 (1999)CrossRefGoogle Scholar
  16. 16.
    Cayre, F., Macq, B.: Data Hiding on 3-D Triangle Meshes. IEEE Transactions on Signal Processing 51(4), 939–949 (2003)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Cayre, F., Devillers, O., Schmitt, F., Maitre, H.: Watermarking 3D Triangle Meshes for Authentication and Integrity. INRIA Research Report RR-5223 (2004)Google Scholar
  18. 18.
    Uccheddu, F., Corsini, M., Barni, M.: Wavelet-Based Blind Watermarking of 3d Models. In: Proceedings of ACM Multimedia & Security Workshop, Magdeburg, Germany, pp. 143–154 (2004)Google Scholar
  19. 19.
    Zafeiriou, S., Tefas, A., Pitas, I.: Blind Robust Watermarking Schemes for Copyright Protection of 3D Mesh Objects. IEEE Transactions on Visualization and Computer Graphics 11(5), 596–607 (2005)CrossRefGoogle Scholar
  20. 20.
    Ohbuchi, R., Mukaiyama, A., Takahashi, S.: A Frequency Domain Approach to Watermarking 3D Shapes. Computer Graphics Forum 21(3), 373–382 (2002)CrossRefGoogle Scholar
  21. 21.
    Bors, A.G.: Watermarking Mesh-Based Representations of 3-D Objects Using Local Moments. IEEE Transactions on Image Processing 15(3), 687–701 (2006)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Wu, H.T., Cheung, Y.M.: A High-Capacity Data Hiding Method for Polygonal Meshes. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 188–200. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  23. 23.
    Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Hao-tian Wu
    • 1
  • Yiu-ming Cheung
    • 2
  1. 1.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouChina
  2. 2.Department of Computer ScienceHong Kong Baptist UniversityHong KongChina

Personalised recommendations