Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 241093, 7 pages
http://dx.doi.org/10.1155/2014/241093
Research Article

Hamming Code Based Watermarking Scheme for 3D Model Verification

1Department of Information Management, Hsiuping University of Science and Technology, 11 Gongye Road, Dali District, Taichung City 412, Taiwan
2Department of Computer Science and Engineering, National Chung-Hsing University, 250 Kuo-Kuang Road, Taichung 402, Taiwan
3Department of Digital Living Innovation, Nan Kai University of Technology, 568 Chung-Cheng Road, TsaoTun 542, Nantou County, Taiwan

Received 25 February 2014; Accepted 13 April 2014; Published 30 April 2014

Academic Editor: Her-Terng Yau

Copyright © 2014 Jen-Tse Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Pfitzmann, “Information hiding terminology—results of an informal plenary meeting and additional proposals,” in Proceedings of the 1st International Workshop on Information Hiding, pp. 347–350, 1996.
  2. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999. View at Publisher · View at Google Scholar · View at Scopus
  3. N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures, Kluwer Academic Publishers, London, UK, 2001.
  4. P. Wayner, Disappearing Cryptography—Information Hiding: Steganography & Watermarking, Morgan Kaufmann, San Francisco, Calif, USA, 2nd edition, 2002.
  5. S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, London, UK, 2000.
  6. F. Daraee and S. Mozaffari, “Watermarking in binary document images using fractal codes,” Pattern Recognition Letters, vol. 35, pp. 120–129, 2014. View at Google Scholar
  7. J. L. Hernandez-Ardieta, A. I. Gonzalez-Tablas, J. M. de Fuentes, and B. Ramos, “A taxonomy and survey of attacks on digital signatures,” Computers & Security, vol. 34, pp. 67–112, 2013. View at Google Scholar
  8. C.-F. Chou, W. C. Cheng, and L. Golubchik, “Performance study of online batch-based digital signature schemes,” Journal of Network and Computer Applications, vol. 33, no. 2, pp. 98–114, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Zhang, “A kind of message-recoverable fairness blind digital signature scheme,” Procedia Engineering, vol. 15, pp. 2103–2107, 2011. View at Google Scholar
  10. D.-R. Lin, C.-I. Wang, Z.-K. Zhang, and D. J. Guan, “A digital signature with multiple subliminal channels and its applications,” Computers and Mathematics with Applications, vol. 60, no. 2, pp. 276–284, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. I. Cox, M. Miller, and J. Bloom, Digital Watermarking, Morgan Kauffman Publishers, San Francisco, Calif, USA, 2002.
  12. J. Seitz, Digital Watermarking for Digital Media, Information Science Publishers, Hershey, Pa, USA, 2005.
  13. M. Arnold, S. D. Wolthusen, and M. Schmucker, Techniques and Applications of Digital Watermarking and Content Protection, Artech House Publishers, Morwood, Mass, USA, 2003.
  14. C. W. Wu, “Multimedia data hiding and authentication via halftoning and coordinate projection,” EURASIP Journal on Advances in Signal Processing, vol. 2002, Article ID 634070, pp. 143–151, 2002. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. J. R. Goldschneider, E. A. Riskin, and P. W. Wong, “Embedded multilevel error diffusion,” IEEE Transactions on Image Processing, vol. 6, no. 7, pp. 956–964, 1997. View at Publisher · View at Google Scholar · View at Scopus
  16. C.-M. Chou and D.-C. Tseng, “A public fragile watermarking scheme for 3D model authentication,” Computer-Aided Design, vol. 38, no. 11, pp. 1154–1165, 2006. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Fornaro and A. Sanna, “Public key watermarking for authentication of CSG models,” Computer-Aided Design, vol. 32, no. 12, pp. 727–735, 2000. View at Publisher · View at Google Scholar · View at Scopus
  18. H.-Y. S. Lin, H.-Y. M. Liao, C.-S. Lu, and J.-C. Lin, “Fragile watermarking for authenticating 3-D polygonal meshes,” IEEE Transactions on Multimedia, vol. 7, no. 6, pp. 997–1006, 2005. View at Publisher · View at Google Scholar · View at Scopus
  19. B.-L. Yeo and M. M. Yeung, “Watermarking 3D objects for verification,” IEEE Computer Graphics and Applications, vol. 19, no. 1, pp. 36–45, 1999. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Lang and Z. Zhang, “Blind digital watermarking method in the fractional Fourier transform domain,” Optics and Lasers in Engineering, vol. 53, pp. 112–121, 2014. View at Google Scholar
  21. S. Pereira, S. Voloshynoskiy, and T. Pun, “Optimal transform domain watermark embedding via linear programming,” Signal Processing, vol. 81, no. 6, pp. 1251–1260, 2001. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Wang, C. Wang, H. Yang, and P. Niu, “A robust blind color image watermarking in quaternion Fourier transform domain,” Journal of Systems and Software, vol. 86, no. 2, pp. 255–277, 2013. View at Google Scholar
  23. M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. de Natale, and A. Neri, “A commutative digital image watermarking and encryption method in the tree structured Haar transform domain,” Signal Processing: Image Communication, vol. 26, no. 1, pp. 1–12, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. H. Yang, X. Wang, and C. Wang, “A robust digital watermarking algorithm in undecimated discrete wavelet transform domain,” Computers & Electrical Engineering, vol. 39, no. 3, pp. 893–906, 2013. View at Google Scholar
  25. R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking three-dimensional polygonal models,” in Proceedings of the 5th ACM International Multimedia Conference, pp. 261–272, November 1997. View at Scopus
  26. R. Ohbuchi, S. Takahashi, T. Miyazawa, and A. Mukaiyama, “Watermarking 3D polygonal meshes in the mesh spectral domain,” in Proceedings of the Graphics Interface, pp. 9–17, June 2001. View at Scopus
  27. R. Ohbuchi, A. Mukaiyama, and S. Takahashi, “A frequency-domain approach to watermarking 3D shapes,” Computer Graphics Forum, vol. 21, no. 3, pp. 373–382, 2002. View at Publisher · View at Google Scholar · View at Scopus
  28. R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking three-dimensional polygonal models through geometric and topological modifications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 551–559, 1998. View at Publisher · View at Google Scholar · View at Scopus
  29. F. Cayre and B. Macq, “Data hiding on 3-D triangle meshes,” IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 939–949, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. P. R. Alface, B. Macq, and F. Cayre, “Blind and robust watermarking of 3D models: how to withstand the cropping attack?” in Proceedings of the 14th IEEE International Conference on Image Processing (ICIP '07), vol. 5, pp. 465–468, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  31. C.-M. Wang and P.-C. Wang, “Data hiding approach for point-sampled geometry,” IEICE Transactions on Communications, vol. 88-B, no. 1, pp. 190–194, 2005. View at Publisher · View at Google Scholar · View at Scopus
  32. C.-M. Wang and P.-C. Wang, “Steganography on point-sampled geometry,” Computers and Graphics, vol. 30, no. 2, pp. 244–254, 2006. View at Publisher · View at Google Scholar · View at Scopus
  33. S. Kanai, H. Date, and T. Kishinami, “Digital watermarking for 3D polygons using multiresolution wavelet decomposition,” in Proceedings of the 6th IFIP WG 5.2 International Workshop on Geometric Modeling: Fundamentals and Applications (GEO '98), pp. 296–307, 1998.
  34. C.-M. Chou and D.-C. Tseng, “A public fragile watermarking scheme for 3D model authentication,” Computer-Aided Design, vol. 38, no. 11, pp. 1154–1165, 2006. View at Publisher · View at Google Scholar · View at Scopus
  35. C.-M. Chou and D.-C. Tseng, “Affine-transformation-invariant public fragile watermarking for 3D model authentication,” IEEE Computer Graphics and Applications, vol. 29, no. 2, pp. 72–79, 2009. View at Publisher · View at Google Scholar · View at Scopus
  36. Y. W. Yang, A study on the spherical coordinate based fragile watermarking scheme for 3D models [M.S. thesis], Department of Computer Science and Engineering, National Chung-Hsing University, 2011.
  37. J. T. Wang, Y. T. Chang, Y. C. Chang, C. C. Huang, and C. M. Fan, “A reference-point-based fragile watermarking scheme for 3D model in spatial domain,” in Proceedings of the 2nd Conference on Applications of Innovation and Invention, 2012.
  38. C. M. Kung, “A robust oblivious watermark system base on hybrid error correct code,” Journal of Multimedia, vol. 5, no. 3, pp. 232–239, 2010. View at Publisher · View at Google Scholar · View at Scopus
  39. C.-C. Chang, K.-N. Chen, C.-F. Lee, and L.-J. Liu, “A secure fragile watermarking scheme based on chaos-and-hamming code,” Journal of Systems and Software, vol. 84, no. 9, pp. 1462–1470, 2011. View at Publisher · View at Google Scholar · View at Scopus
  40. C. Desset, B. Macq, and L. Vandendorpe, “Block error-correcting codes for systems with a very high BER: theoretical analysis and application to the protection of watermarks,” Signal Processing: Image Communication, vol. 17, no. 5, pp. 409–421, 2002. View at Publisher · View at Google Scholar · View at Scopus
  41. J.-M. Guo, S.-C. Pei, and H. Lee, “Watermarking in halftone images with parity-matched error diffusion,” Signal Processing, vol. 91, no. 1, pp. 126–135, 2011. View at Publisher · View at Google Scholar · View at Scopus
  42. R. W. Hamming, “Error detecting and error correcting codes,” The Bell System Technical Journal, vol. 29, pp. 147–160, 1950. View at Google Scholar · View at MathSciNet
  43. J. S. chitode, Digital Communications, Technical Publications, Pune, India, 1st edition, 2007-2008.
  44. J. Bennour and J.-L. Dugelay, “Toward a 3D watermarking benchmark,” in Proceedings of the 9th IEEE International Workshop on Multimedia Signal Processing (MMSP '07), pp. 369–372, October 2007. View at Publisher · View at Google Scholar · View at Scopus