Skip to main content
Log in

A robust security framework for 3D images

  • Regular Paper
  • Published:
Journal of Visualization Aims and scope Submit manuscript

Abstract

Three-dimensional (3D) visualization of spatial and non-spatial data is a well-established practice having numerous applications. The cheapest and the most efficient way to 3D visualization is 3D images/Anaglyphs. 3D images contain 3D information of the objects present in the image. These images are easily obtained by superimposing left and right eye images in different color in a single image. In this paper, a novel security framework, viz., watermarking scheme, is presented to ensure their security. The proposed security framework is employed in fractional Fourier transform domain of secret color channel followed by the embedding using singular value decomposition. The secret channels (SEC) are obtained by applying reversible integer transform on the RGB channels. The experimental results prove the robustness and imperceptibility of the proposed watermarking scheme.

Graphical abstract

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Alattar AM (2003) Reversible watermark using difference expansion of triplets. In: Proceedings of IEEE international conference on image processing, vol 1, Barcelona, Spain, pp 501–504

  • Almeida LB (1994) The fractional Fourier transform and time–frequency representations. IEEE Trans Signal Process 42:3084–3091

    Article  Google Scholar 

  • Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Comput Stand Interface 31(5):1002–1013

    Article  Google Scholar 

  • Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking. Morgan Kaufmann, San Francisco, CA

    Google Scholar 

  • Dubois E (2001) A projection method to generate Anaglyph stereo images. In: Proceedings of IEEE international conference on acoustics speech signal processing, vol 3, Salt Lake City, UT, pp 1661–1664

  • Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using DWT-SVD. J Electron Imag 14(4):043004

    Google Scholar 

  • Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128

    Article  Google Scholar 

  • Namias V (1980) The fractional order Fourier transform and its application to quantum mechanics. J Inst Math Appl 25:241–265

    Article  MATH  MathSciNet  Google Scholar 

  • Ozaktas HM, Kutay MA, Zalevsky Z (2000) The fractional Fourier transform with applications in optics and signal processing. Wiley, New York

    Google Scholar 

  • Pinker S (1997) The Mind’s eye. In: Pinker S (ed) How the mind works. WW Norton & Company, New York, pp 211–233

  • Rollmann W (1853) Notiz zur Stereoskopie. Ann Phys 165(6):350–351

    Google Scholar 

  • Stoffer PW, Phillips E, Messina P (2003) Anaglyph image technology as a visualization tool for teaching geology of national parks. EOS Trans AGU 84(46), Fall meet. suppl., Abstract ED32B-1198

  • Strang G (1993) Introduction to linear algebra. Wellesley-Cambridge Press, Wellesley

    MATH  Google Scholar 

  • Sverldov A, Dexter S, Eskicioglu AM (2005) Robust DCT-SVD domain image watermarking for copyright protection: embedding data in all frequencies. In: Proceedings of European signal processing conference, Antalya, Turkey, pp 1–4

  • Trucco E, Verri A (1998) Introductory techniques for 3D computer vision. Prentice Hall PTR, New Jersey

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Bhatnagar.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bhatnagar, G., Wu, J. & Raman, B. A robust security framework for 3D images. J Vis 14, 85–93 (2011). https://doi.org/10.1007/s12650-010-0067-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12650-010-0067-5

Keywords

Navigation