Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 1096463, 11 pages
https://doi.org/10.1155/2017/1096463
Research Article

A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models

1Department of M-Commerce and Multimedia Applications, Asia University, Taichung, Taiwan
2Department of Medical Research, China Medical University Hospital, China Medical University, Taichung, Taiwan
3Institute of Nuclear Energy Research, Taoyuan, Taiwan
4Department of Information Technology and Management, Shih Chien University, Taipei, Taiwan

Correspondence should be addressed to Yao-Hsien Huang; moc.liamg@gnauh.oobad

Received 27 July 2016; Revised 20 October 2016; Accepted 9 November 2016; Published 12 January 2017

Academic Editor: Ángel Martín Del Rey

Copyright © 2017 Yuan-Yu Tsai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999. View at Publisher · View at Google Scholar · View at Scopus
  2. C.-W. Lee and W.-H. Tsai, “A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding,” Signal Processing, vol. 93, no. 7, pp. 2010–2025, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. C.-C. Lo and Y.-C. Hu, “A novel reversible image authentication scheme for digital images,” Signal Processing, vol. 98, pp. 174–185, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. T.-S. Nguyen, C.-C. Chang, and T.-F. Chung, “A tamper-detection scheme for BTC-compressed images with high-quality images,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 2005–2021, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. C.-N. Yang, J.-F. Ouyang, and L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, vol. 285, no. 7, pp. 1725–1735, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Abhayaratne and D. Bhowmik, “Scalable watermark extraction for real-time authentication of JPEG 2000 images,” Journal of Real-Time Image Processing, vol. 8, no. 3, pp. 307–325, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. T.-Y. Chen, M.-S. Hwang, and J.-K. Jan, “Adaptive authentication schemes for 3D mesh models,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 12, pp. 4561–4572, 2009. View at Google Scholar · View at Scopus
  8. C.-M. Chou and D.-C. Tseng, “Affine-transformation-invariant public fragile watermarking for 3D model authentication,” IEEE Computer Graphics and Applications, vol. 29, no. 2, pp. 72–79, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. C.-C. Huang, Y.-W. Yang, C.-M. Fan, and J.-T. Wang, “A spherical coordinate based fragile watermarking scheme for 3D models,” in Recent Trends in Applied Artificial Intelligence: 26th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2013, Amsterdam,The Netherlands, June 17–21, 2013. Proceedings, vol. 7906, pp. 566–571, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  10. A. M. Molaei, H. Ebrahimnezhad, and M. H. Sedaaghi, “A blind fragile watermarking method for 3D models based on geometric properties of triangles,” 3D Research, vol. 4, no. 4, pp. 1–9, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. J.-T. Wang, Y.-W. Yang, Y.-T. Chang, and S.-S. Yu, “A high verification capacity reversible fragile watermarking scheme for 3D models,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 1, pp. 365–378, 2011. View at Google Scholar · View at Scopus
  12. J.-T. Wang, Y.-C. Chang, C.-Y. Yu, and S.-S. Yu, “Hamming code based watermarking scheme for 3D model verification,” Mathematical Problems in Engineering, vol. 2014, Article ID 241093, 7 pages, 2014. View at Publisher · View at Google Scholar
  13. W.-B. Wang, G.-Q. Zheng, J.-H. Yong, and H.-J. Gu, “A numerically stable fragile watermarking scheme for authenticating 3D models,” Computer Aided Design, vol. 40, no. 5, pp. 634–645, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. B.-L. Yeo and M.-M. Yeung, “Watermarking 3D objects for verification,” IEEE Computer Graphics and Applications, vol. 19, no. 1, pp. 36–45, 1999. View at Publisher · View at Google Scholar · View at Scopus
  15. P.-C. Wang and C.-M. Wang, “Reversible data hiding for point-sampled geometry,” Journal of Information Science and Engineering, vol. 23, no. 6, pp. 1889–1900, 2007. View at Google Scholar · View at MathSciNet
  16. P. Cignoni, C. Rocchini, and R. Scopigno, “Metro: measuring error on simplified surfaces,” Computer Graphics Forum, vol. 17, no. 2, pp. 167–174, 1998. View at Publisher · View at Google Scholar · View at Scopus
  17. Y.-Y. Tsai, “An adaptive steganographic algorithm for 3D polygonal models using vertex decimation,” Multimedia Tools and Applications, vol. 69, no. 3, pp. 859–876, 2014. View at Publisher · View at Google Scholar · View at Scopus