Abstract
With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of intellectual property protection have risen since the last decade. Numerous watermarking schemes have been suggested to protect ownership and prevent the threat of data piracy. This paper begins with the potential difficulties that arose when dealing with three-dimension entities in comparison to two-dimensional entities and also lists possible algorithms suggested hitherto and their comprehensive analysis. Attacks, also play a crucial role in deciding a watermarking algorithm so an attack based analysis is also presented to analyze resilience of watermarking algorithms under several attacks. In the end, some evaluation measures and potential solutions are brooded over to design robust and oblivious watermarking schemes in the future.
References
Ai, Q., Liu, Q., Zhou, Z., Yang, L., & Xie,S. (2009). A new digitalwatermarking scheme for 3dtriangular mesh models.SignalProcessing,89(11), 2159–2170.
Borah, S., & Borah, B. (2018).Watermarking techniques for threedimensional (3d) mesh authenticationin spatial domain.3D Research,9(3),1–22.
Bors, A. G., & Luo, M. (2012). Optimized3d watermarking for minimal surfacedistortion.IEEE Transactions onImage Processing,22(5), 1822–1835.
Cayre, F., Rondao-Alface, P., Schmitt, F.,Macq, B., & Maıtre, H. (2003).Application of spectral decompositionto compression and watermarking of 3d triangle mesh geometry.SignalProcessing: Image Communication,18(4), 309–319.
Cho, J.-W., Prost, R., & Jung, H.-Y.(2006). An oblivious watermarkingfor 3-d polygonal meshes usingdistribution of vertex norms.IEEETransactions on Signal Processing,55(1), 142–155.
Cho, W.-H., Lee, M.-E., Lim, H., & Park,S.-Y. (2004). Watermarking techniquefor authentication of 3-d polygonalmeshes. InInternational workshop ondigital watermarking(pp. 259–270).
El Zein, O. M., El Bakrawy, L. M., &Ghali, N. I. (2017). A robust 3d meshwatermarking algorithm utilizingfuzzy c-means clustering.FutureComputing and Informatics Journal,2(2), 148–156.
Ghali, N. I. (2016). A non-blind robustwatermarking approach for 3d meshmodels.
Hu, R., Rondao-Alface, P., & Macq, B.(2009). Constrained optimisation of3d polygonal mesh watermarking byquadratic programming. In2009 ieeeinternational conference on acoustics,speech and signal processing(pp.1501–1504).
Jian-qiu, J., Min-ya, D., Hu-jun, B., &Qun-sheng, P. (2004). Watermarkingon 3d mesh based on spherical wavelettransform.Journal of ZhejiangUniversity-Science A,5(3), 251–258.
Li, S., Ni, R., & Zhao, Y. (2017). A 3dmesh watermarking based on improved vertex grouping andpiecewise mapping function.J InfHiding Multimedia Signal ProcessJanuary,8(1), 97e108.
Liu, C.-C., & Chen, J.-Y. (2010). Awatermarking scheme for 3d modelsusing haar discrete wavelet transform.In2010 international symposium oncomputer, communication, controland automation (3ca)(Vol. 1, pp.244–247).
Motwani, R. C., & Harris Jr, F. C. (2009).Robust 3d watermarking using vertexsmoothness measure. InIpcv(pp.287–293).
Murotani, K., & Sugihara, K. (2003).Watermarking 3d polygonal meshesusing the singular spectrum analysis.InMathematics of surfaces(pp.85–98). Springer.
Ohbuchi, R., Masuda, H., & Aono, M.(1998). Watermarkingthree-dimensional polygonal modelsthrough geometric and topologicalmodifications.IEEE Journal onselected areas in communications,16(4), 551–560.
Ohbuchi, . R., Mukaiyama, . A., &Takahashi, . S. (2002). Afrequency-domain approach towatermarking 3d shapes. InComputer graphics forum(Vol. 21,pp. 373–382).
Ohbuchi, R., Mukaiyama, A., & Takahashi,S. (2004). Watermarking a 3d shapemodel defined as a point set. In2004international conference oncyberworlds(pp. 392–399).
Praun, E., Hoppe, H., & Finkelstein, A.(1999). Robust mesh watermarking.InProceedings of the 26th annualconference on computer graphics andinteractive techniques(pp. 49–56).
Sharma, N., & Panda, J. (2020). Statisticalwatermarking approach for 3d meshusing local curvature estimation.IETInformation Security,14(6), 745–753.
Soliman, M. M., Hassanien, A. E., & Onsi,H. M. (2013). Robust watermarkingapproach for 3d triangular mesh usingself organization map. In2013 8thinternational conference on computerengineering & systems (icces)(pp.99–104).
Uccheddu, F., Corsini, M., & Barni, M.(2004). Wavelet-based blindwatermarking of 3d models. InProceedings of the 2004 workshop onmultimedia and security(pp.143–154).
Wang, K., Lavou ́e, G., Denis, F., Baskurt,A., & He, X. (2010). A benchmarkfor 3d mesh watermarking. In2010shape modeling internationalconference(pp. 231–235).
Yin, K., Pan, Z., Shi, J., & Zhang, D.(2001). Robust mesh watermarkingbased on multiresolution processing.Computers & graphics,25(3),409–420.
Yu, Z., Ip, H. H., & Kwok, L. (2003). Arobust watermarking scheme for 3dtriangular mesh models.Patternrecognition,36(11), 2603–2614.
Recommended Citation
Sharma, Neha and Panda, Jeebananda
(2022)
"Assessment of 3D mesh watermarking techniques,"
Journal of Digital Forensics, Security and Law: Vol. 17
, Article 2.
DOI: https://doi.org/10.15394/jdfsl.2022.1745
Available at:
https://commons.erau.edu/jdfsl/vol17/iss2/2