{"title":"基于自组织映射的三维三角形网格鲁棒水印方法","authors":"Mona M. Soliman, A. Hassanien, H. Onsi","doi":"10.1109/ICCES.2013.6707181","DOIUrl":null,"url":null,"abstract":"The objective of this paper is to explore innovative ways to insert the maximum amount of secret information into 3D mesh models without causing perceptual distortion and also make it difficult for the attacker to guess where the watermark was inserted. It is based on clustering 3D vertices into appropriate or inappropriate candidates for watermark insertion using Self Organization Map (SOM). Two methods were used to embed the watermark into 3D model. The first method is a statistical approach that modified the distribution of vertex norms to hide watermark information into host 3D model while the second method is a mixed insertion of watermark bits into host model using vertex norm distribution and mesh vertices at the same time. The robustness of proposed techniques is evaluated experimentally by simulating attacks such as mesh smoothing, noise addition and mesh cropping.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Robust watermarking approach for 3D triangular mesh using self organization map\",\"authors\":\"Mona M. Soliman, A. Hassanien, H. Onsi\",\"doi\":\"10.1109/ICCES.2013.6707181\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The objective of this paper is to explore innovative ways to insert the maximum amount of secret information into 3D mesh models without causing perceptual distortion and also make it difficult for the attacker to guess where the watermark was inserted. It is based on clustering 3D vertices into appropriate or inappropriate candidates for watermark insertion using Self Organization Map (SOM). Two methods were used to embed the watermark into 3D model. The first method is a statistical approach that modified the distribution of vertex norms to hide watermark information into host 3D model while the second method is a mixed insertion of watermark bits into host model using vertex norm distribution and mesh vertices at the same time. The robustness of proposed techniques is evaluated experimentally by simulating attacks such as mesh smoothing, noise addition and mesh cropping.\",\"PeriodicalId\":277807,\"journal\":{\"name\":\"2013 8th International Conference on Computer Engineering & Systems (ICCES)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 8th International Conference on Computer Engineering & Systems (ICCES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES.2013.6707181\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2013.6707181","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Robust watermarking approach for 3D triangular mesh using self organization map
The objective of this paper is to explore innovative ways to insert the maximum amount of secret information into 3D mesh models without causing perceptual distortion and also make it difficult for the attacker to guess where the watermark was inserted. It is based on clustering 3D vertices into appropriate or inappropriate candidates for watermark insertion using Self Organization Map (SOM). Two methods were used to embed the watermark into 3D model. The first method is a statistical approach that modified the distribution of vertex norms to hide watermark information into host 3D model while the second method is a mixed insertion of watermark bits into host model using vertex norm distribution and mesh vertices at the same time. The robustness of proposed techniques is evaluated experimentally by simulating attacks such as mesh smoothing, noise addition and mesh cropping.