Weng Bin, Pan Ri-jing, Yao Zhi-qiang, Xiao Jun, Yang Shan-chao
{"title":"A fragile watermarking algorithm for T-Spline surfaces","authors":"Weng Bin, Pan Ri-jing, Yao Zhi-qiang, Xiao Jun, Yang Shan-chao","doi":"10.1109/YCICT.2009.5382434","DOIUrl":null,"url":null,"abstract":"T-Spline surface is an important parametric surface, which is widely used in entertainment, engineering, science and medicine. A fragile watermarking algorithm is proposed for integrity authentication of T-Spline surfaces. In this algorithm, some points on T-Spline surfaces are selected by a special algorithm, then the watermark is embedded by modifing the selected points, and then the watermarked surfaces is acquired by modifying the control points with constrained optimization method. The experiment results show that the watermark is fragile to many attacks, and the tampered area can be detected. Additionally, when preprocessing is used before watermark extracting, the algorithm can modified to be semi-fragile that is robust to translating, rotating and uniformly scaling.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/YCICT.2009.5382434","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
T-Spline surface is an important parametric surface, which is widely used in entertainment, engineering, science and medicine. A fragile watermarking algorithm is proposed for integrity authentication of T-Spline surfaces. In this algorithm, some points on T-Spline surfaces are selected by a special algorithm, then the watermark is embedded by modifing the selected points, and then the watermarked surfaces is acquired by modifying the control points with constrained optimization method. The experiment results show that the watermark is fragile to many attacks, and the tampered area can be detected. Additionally, when preprocessing is used before watermark extracting, the algorithm can modified to be semi-fragile that is robust to translating, rotating and uniformly scaling.