Watermarking of 3D Color images in Eigen LSB approach

sakshi shrivastava*, Siddhartha Choubey**
* M.E Student, Department of CTA, SSCET Bhilai, India.
** Professor, Department of CSE, SSCET Bhilai, India.
Periodicity:November - January'2012
DOI : https://doi.org/10.26634/jfet.7.2.1761

Abstract

Digital data are so widely used because they are easy to store, transfer and duplicate with high quality. However, the convenience also facilitates the access of malicious users to produce unauthenticated and pirate copies of the original work. There are two typical digital data protection techniques: cryptography and watermarking. Watermarking can be used both in transmission and for data usage. In addition, cryptography aims to modify every single bit of the original data. In Digital Watermarking the aim is to embed a code consisting of bits into a cover media, representing image, audio, video or graphics information. Digital watermarking is generally considered as a copyright protection technique. In this paper we propose free-view watermarking, this method mainly focuses on the watermark insertion and extraction stages for the static scenes, consisting of only a single object which forms the fundamental case in the development of IBR technology. As a future research direction, the extension of the solution for dynamic scenes with multiple objects could be examined, in which different rendering and interpolation techniques are being used.

Keywords

free-view watermarking, 3d Water Marking, Watermarking, Image Authentication

How to Cite this Article?

Shrivastava , S., and Choubey, S. (2012). Watermarking Of 3d Color Images In Eigen LSB Approach. i-manager’s Journal on Future Engineering and Technology, 7(2), 34-43. https://doi.org/10.26634/jfet.7.2.1761

References

[1]. Alface, P.R., & Macq, B. (2005). Blind watermarking of 3d meshes using robust feature points detection. In Proceeding IEEE International Conference on Image Processing, vol. 1, November, pp.693-696.
[2]. Alface, P.R., & Macq, B., & Cayre, F. (2007). Blind and robust watermarking of 3D models: How to withstand the cropping attack? In Proceeding IEEE International Conference on Image Processing, pp. 465-468.
[3]. Alface, P.R., & Craene, M.D., & Macq, B.B. SPIE (2005). Three dimensional image quality measurement for the benchmarking of 3d watermarking schemes. Vol.5681, pp.230-240.
[4]. Alliez, P., & Laurent, N., & Sanson, H., & Schmitt, F. (1999). Mesh approximation using a volume-based metric. In Computer Graphics and Applications, 1999. Proceedings. Seventh Pacific Conference on, pp.292- 301.
[5]. Alregib, G., & Altunbasak, Y., & Rossignac, J. (2006). Error-resilient transmission of 3d models. ACM Transactions on Graphics, 24(2):182-208.
[6]. Alvarez-Rodriguez, M., & Perez-Gonzalez, F. (2002). Analysis of pilot-based synchronization algorithms for watermarking of still images. Signal Processing - Image Communication, 17(8):611-633.
[7]. Andrew, Y.N., & Michael, I.J., & Weiss, Y. (2001). On spectral clustering: Analysis and an algorithm. In Advances in Neural Information Processing Systems, 14, pages 849-856. MIT Press.
[8]. Aspert, N., & Santa-cruz, D., & Ebrahimi, T. (2002). Mesh: Measuring errors between surfaces using the hausdorff distance. pp. 705-708.
[9]. Barni, M., & Bartolini, F., & Cappellini, V., & Piva, A. (1998). Copyright protection of digital images by embedded unperceivable marks. Image and Vision Computing, 16(12-13):897-906.
[10]. Belkin, M., & Niyogi, P. (2002). Laplacian eigenmaps and spectral techniques for embedding and clustering. In Advances in Neural Information Processing Systems 14, volume 14, pages 585-591.
[11]. Benedens, O. (1999). Geometry-based watermarking of 3-D models. IEEE Computer Graphics Applications, 19(1):46-55.
[12]. Bian, Z., & Hu, S.M., & Ralph, R. (2009). Evaluation for small visual difference between conforming meshes on strain field. J. Comput. Sci. Technol., 24(1):65-75.
[13]. Cayre F., & Macq, B. (2003). Data hiding on 3-D triangle meshes. IEEE Transaction Signal Processing, 51(4):939-949.
[14]. Braudway, G., & Magerlein, K. & Mintzer., F. (1996). Protecting publicly-available images with a visible image watermark. Technical Report TC-20336(89918), IBM Research Report.
[15]. Caelli, T., & Kosinov, S. April (2004). An eigenspace projection clustering method for inexact graph matching. IEEE Transaction on Pattern Analysis and Machine Intelligence, 26(4):515-51.
[16]. Cano, P., & Batlle, E., & Kalker, T., & Haisma, J. (2005). A review of audio fingerprinting. Journal of VLSI Signal Processing Systems for Signal Image and Video Technology, 41(3):271-284.
[17]. Chao, M.W., & Lin, C.H., & Yu, C.W., & Lee, T.Y. (2009). A high capacity 3d steganography algorithm. IEEE Transactions on Visualization and Computer Graphics, 15(2):274-28.
[18]. Chaouch, M., & Verroust-Blondet, A. (2009). Alignment of 3d models. Graph. Models, 71(2):63-76.
[19]. Cheng, H. (2004). A review of video registration methods for watermark detection in digital cinema applications. In Proceedings of IEEE International Symposium on Circuits and Systems, Vol. 5, pp. 704-707.
[20]. Cheng, K.-S.D., & Wenping W., & Qin H., & Wong, K.- Y.K., & Yang, H., & Liu, Y. Sep-Oct (2007). Design and analysis of optimization methods for subdivision surface fitting. Visualization and Computer Graphics, IEEE Transactions on, 13(5):878-890.
[21]. Cheng, F.R.K. (1997). Spectral graph theory. AMS.
[22]. Chou, C.M., & Tseng, D.C. (2006). A public fragile watermarking scheme for 3D model authentication. Computer-Aided Design, 22(9-11).
[23]. Cotting, D., & Weyrich, T., & Pauly, M., & Gross, M. (2004). Robust watermarking of point-sampled geometry. In Proceedings of Shape Modeling Applications, pp. 233- 242, Zurich, Switzerland.
[24]. Cox, I.J., & Kilian, J., & Leighton, T., & Shamoon, T. (1995). Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute.
[25]. Ghassan Alregib & Yucel Altunbasak, & Jarek Rossignac (2005). Error-resilient transmission of 3d models. ACM Trans. Graph., 24(2):182-208.
[26] Rodr´iguez, M.A., & P´erez-Gonz´alez, F. (2002). Analysis of pilotbased synchronization algorithms for watermarking of still images. Signal Processing: Image Communication, 17(8):611-633.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.