{"title":"Evaluation Metrics used in 3D Mesh Watermarking: A Study","authors":"Sagarika Borah, B. Borah","doi":"10.14257/ijsia.2017.11.11.04","DOIUrl":null,"url":null,"abstract":"Three Dimensional (3D) models are watermarked to protect their ownership information and to maintain the integrity while transmitted over networked communication. These watermarking operations change the mesh details during data embedding, which in turn affects the perceptual quality or geometrical details of the mesh. There are two different situations where a mesh watermarking technique needs to be evaluated. One of them is to make sure that the watermark embedding function induces minimal perceptual distortion to the original model and the second situation is assessing the similarity between the extracted watermark and the original one to estimate robustness of the watermarking scheme. However surface mesh quality is assessed in two ways: subjective way (observation directly from the human) or objective way where some metrics are formulated by researchers to measure the mesh quality that can meet the human observation. This study covers a detailed discussion of various objective mesh quality assessment metrics proposed for detecting the mesh degradation due to different classes of watermarking techniques. Robustness estimation metrics to assess the similarity of watermarks are also discussed.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.11.04","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2017.11.11.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Three Dimensional (3D) models are watermarked to protect their ownership information and to maintain the integrity while transmitted over networked communication. These watermarking operations change the mesh details during data embedding, which in turn affects the perceptual quality or geometrical details of the mesh. There are two different situations where a mesh watermarking technique needs to be evaluated. One of them is to make sure that the watermark embedding function induces minimal perceptual distortion to the original model and the second situation is assessing the similarity between the extracted watermark and the original one to estimate robustness of the watermarking scheme. However surface mesh quality is assessed in two ways: subjective way (observation directly from the human) or objective way where some metrics are formulated by researchers to measure the mesh quality that can meet the human observation. This study covers a detailed discussion of various objective mesh quality assessment metrics proposed for detecting the mesh degradation due to different classes of watermarking techniques. Robustness estimation metrics to assess the similarity of watermarks are also discussed.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security