4.7 Article

A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSVT.2021.3052468

Keywords

Watermarking; Solid modeling; Three-dimensional displays; Distortion; Two dimensional displays; Authentication; Topology; Integrity authentication; region nesting; semi-fragile reversible watermarking; 3D mesh models

Funding

  1. National Natural Science Foundation of China [92067104, U1936115, 62072055]

Ask authors/readers for more resources

This paper introduces a semi-fragile reversible watermarking technique based on region nesting, which can effectively authenticate the integrity of 3D mesh models and prevent distortion, helping identify tampering types and determine tampering locations.
Aiming to reduce the distortion in the existing reversible watermarking for 3D mesh models, this paper generalizes two-dimensional (2D) region nesting to n-dimensional space, and proposes a general region nesting based semi-fragile reversible watermarking for authenticating 3D mesh models by combing watermark generation based on vertex projection and mesh topology. For any n-dimensional space, each hypercube space is partitioned into several nested watermark sub-spaces, and the watermark is embedded by placing the original vertex and the mapped vertex on a straight line. The watermark is extracted by acquiring the position of the vertices, and its original coordinates can be restored by inverse mapping. Furthermore, a new coordinate system is built for 3D mesh models based on reference vertices to achieve semi-fragility, and the watermarks generated by vertex projection and mesh topology is utilized for integrity authentication. Experimental results and analysis show that the proposed scheme can significantly reduce the distortion, achieve semi-fragility in RST (Rotation, Scaling and Translation) and vertex reordering, identify the tampering type, and accomplish tampering location at vertex level. It has great potential to be applied for content authentication of 3D mesh models.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available