Embedding data in 3D models

  • Ryutarou Ohbuchi
  • Hiroshi Masuda
  • Masaki Aono
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1309)


The recent popularity of digital media such as CD-ROM and the Internet has prompted exploration of techniques for embedding data, either visibly or invisibly, into text, image, and audio objects. Applications of such data embedding include copyright identification, theft deterrence, and inventory.

This paper discusses techniques for embedding data into 3D models. Given objects consisting of points, lines, (connected) polygons, or curved surfaces, the algorithms described in this paper produce polygonal models with data embedded into either their vertex coordinates, their vertex topology (connectivity), or both.

A description of the background and requirements is followed by a discussion of where, and by what fundamental methods, data can be embedded into 3D polygonal models. The paper then presents several data-embedding algorithms, with examples, based on these fundamental methods.

Additional keywords

3D graphics data hiding digital watermarking steganography geometric modeling copyright protection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [Berghel96]
    H. Berghel and L. O'Gorman, Protecting Ownership Rights Through Digital Watermarking, IEEE Computer, July 1996, pp101–103.Google Scholar
  2. [Braudway96]
    G. Braudway, K. Magerlein, and F. Mintzer, Protecting Publicly-Available Images with a Visible Image Watermark, IBM Research Report, TC-20336 (89918), January 15, 1996.Google Scholar
  3. [Cox95]
    I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, Technical Report 95-10, NEC Research Institute, 1995.Google Scholar
  4. [Farin96]
    G. Farin, Curves and Surfaces for CAGD: a Practical guide, 4th edition, Academic Press, 1996.Google Scholar
  5. [ISO96]
    ISO/IEC JTC1 SC24/N1596 CD #14772 Virtual Reality Model Language (VRML 2.0)Google Scholar
  6. [Masuda96]
    H. Masuda, Topological operations for non-manifold geometric modeling and their applications, Ph. D dissertation, Department of Precision Machinery Engineering, University of Tokyo, 1996 (in Japanese).Google Scholar
  7. [O'Rourke94]
    J. O'Rourke, Computational Geometry in C, Cambridge University Press, 1994.Google Scholar
  8. [O'Ruanaidh96]
    J. J. K. O'Ruanaidh, W. J. Dowling, and F. M. Boland, Watermarking digital images for copyright protection, IEE Proceedings on Vision, Image, and Signal Processing, Vol. 143, No. 4, pp.250–256.Google Scholar
  9. [Pfitzmann96]
    B. Pfitzmann, Information Hiding Terminology, in R. Anderson, Ed., Lecture Notes in Computer Science No. 1174, pp347–350, Springer-Verlag, 1996.Google Scholar
  10. [Schneier96]
    B. Schneier, Applied Cryptography, Second edition, John Wiley & Sons, Inc., New York, 1996.Google Scholar
  11. [Smith96]
    J. R. Smith and B. O. Comiskey, Modulation and Information Hiding in Images, in R. Anderson, Ed., Lecture Notes in Computer Science No.1174, pp207–296, Springer-Verlag, 1996.Google Scholar
  12. [Tanaka90]
    K. Tanaka, Y. Nakamura, and K. Matsui, Embedding Secret Information into a Dithered Multilevel Image, Proc. 1990 IEEE Military Communications Conference, pp216–220, 1990.Google Scholar
  13. [Walton95]
    S. Walton, Image Authentication for a Slippery New Age, Dr. Dobb's Journal, April 1995.Google Scholar
  14. [Weiler86]
    K. Weiler, The Radial Edge Structure: A Topological Representation for Non-Manifold Geometric Boundary Modeling, Geometric Modeling for CAD Applications, North Holland, pp3–36, May 1986.Google Scholar
  15. [Zhao96]
    J. Zhao and E. Koch, Embedding Robust Labels into Images for Copyright Protection, Proc. of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge, and New Technologies, Vienna, August 1995.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Ryutarou Ohbuchi
    • 1
  • Hiroshi Masuda
    • 1
  • Masaki Aono
    • 1
  1. 1.IBM Japan Tokyo Research LaboratoryKanagawaJapan

Personalised recommendations