Prediction Error Expansion (PEE) based Reversible polygon mesh watermarking scheme for regional tamper localization

被引:5
作者
Borah, Sagarika [1 ]
Borah, Bhogeswar [1 ]
机构
[1] Tezpur Univ, Dept Comp Sci & Engn, Tezpur, Assam, India
关键词
3D mesh watermarking; Semi-fragile; Authentication; Geometrical attacks; Tamper localization; Reversible watermarking; Prediction Error Expansion (PEE); PUBLIC FRAGILE WATERMARKING; AUTHENTICATION;
D O I
10.1007/s11042-019-08411-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a block based semi-fragile reversible authentication scheme that achieves regional localization for different classes of geometry and topology based mesh attacks. First of all, the model bounding volume is spatially partitioned into sub-volumes using Octree data structure and for each sub-volume, the embeddable units are computed. Each embeddable unit is comprises of three vertices and one bit can be embedded to an embeddable unit using a Prediction Error Histogram (PEH) shifting strategy. In PEH shifting, few of the embeddable units are expandable and few are shiftable. To compute PEH, Vertex Normal Value Ordering (VNVO) is performed and the maximum prediction error value is expanded. During PEH generation, to achieve sharper histograms and to get minimum numbers of shiftable units, adaptive bin-width selection step is also added. Verification of each block is performed by computing CRC-8 using vertex information from the block and embedding to the expandable units of the corresponding block itself. The proposed method could generate a sharper histogram than the state of the art methods and the proposed embedding function incurred very low distortion to mesh surface. It also outperforms the prior arts by achieving regional taper localization for both geometrical as well as topological attacks. The results analysis justifies the superiority of the proposed work than state of the art methods.
引用
收藏
页码:11437 / 11458
页数:22
相关论文
共 42 条
[1]  
Abdallah EE, 2007, LECT NOTES COMPUT SC, V4633, P772
[2]   Video watermarking using wavelet transform and tensor algebra [J].
Abdallah, Emad E. ;
Ben Hamza, A. ;
Bhattacharya, Prabir .
SIGNAL IMAGE AND VIDEO PROCESSING, 2010, 4 (02) :233-245
[3]   Watermarking 3D models using spectral mesh compression [J].
Abdallah, Emad E. ;
Ben Hamza, A. ;
Bhattacharya, Prabir .
SIGNAL IMAGE AND VIDEO PROCESSING, 2009, 3 (04) :375-389
[4]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[5]  
[Anonymous], 2013, INT C IND ENG OTH AP, DOI DOI 10.1007/978-3-642-38577-3_66
[6]  
[Anonymous], 2006, SPIE OPTICS PHOTONIC
[7]  
Botsch M., 2010, Polygon Mesh Processing
[8]   Lossless watermarking for image authentication: A new framework and an implementation [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (04) :1042-1049
[9]  
Chen TY, 2009, INT J INNOV COMPUT I, V5, P4561
[10]   Sequential quantization strategy for data embedding and integrity verification [J].
Cheung, Yiu-ming ;
Wu, Hao-tian .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2007, 17 (08) :1007-1016