期刊文献+

一种基于分块DCT变换的三维网格模型半脆弱水印算法 被引量:1

A Semi-fragile Watermarking Scheme for 3D Mesh Models Based on Partitioned DCT
下载PDF
导出
摘要 半脆弱水印可区分恶意攻击和正常数据处理,具有更广泛的适用性,但目前已提出的算法大多只能容忍少数类型的网格正常处理。文中提出了一种基于内容认证的半脆弱水印算法,网格分割后水印隐藏在各分块的DCT变换域系数中,网格被非法篡改时,通过匹配提取出的水印序列与原始水印序列可定位出篡改位置。实验结果表明,算法嵌入的半脆弱水印可容忍多种类型的网格正常数据处理,如网格RST相似变换和低强度的顶点坐标值量化处理,同时对恶意攻击表现敏感,可较准确的定位出篡改位置,并能以直观的可视化形式做出标记。 Semi-fragile watermark has wider applicability,as it can distinguish malicious tampering and normal mesh processing.Most present algorithms can only tolerate a few types of normal mesh processing. A novel semi-fragile watermarking algorithm based on mesh content is proposed.In this algorithm,mesh is partitioned into some sub-meshes,and semi-fragile watermarks are hidden in DCT coefficients of each sub-mesh.When mesh is tampered,the position occurred can be located by matching the extracted wa-termark sequence and original watermark sequence.Experimental results show that the proposed algo-rithm can tolerate various mesh normal processing,such as mesh RST similar transforming,and quantiza-tion of vertex coordinates with low intensity,while is sensitive to malicious tampering.The proposed algo-rithm can also locate the tamering positions with relatively high precision.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第2期38-43,共6页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家自然科学基金资助项目(61170193) 惠州学院重点学科建设资助项目 广东省高等学校教学质量与教学改革工作本科类项目(粤教高函[2013]113号-113)
关键词 三维水印 网格水印 半脆弱水印 DCT变换 内容认证 3 D watermark mesh watermark semi-fragile watermark DCT content authentication
  • 相关文献

参考文献13

  • 1周燕,张德丰,马子龙.基于压缩传感的图像哈希水印算法研究[J].中山大学学报(自然科学版),2010,49(6):58-63. 被引量:9
  • 2蔡龙飞,赵慧民,方艳梅.一种公钥密码体制下指纹识别与数字水印的身份认证协议[J].中山大学学报(自然科学版),2013,52(4):51-57. 被引量:6
  • 3王国栋,刘粉林,汪萍,耿楠楠.一种篡改检测与篡改定位分离的图像认证方案[J].计算机学报,2007,30(10):1880-1888. 被引量:13
  • 4LUO M, BORS A G. Surface-preserving robust water- marking of 3-D shapes [J]. IEEE Transactions on Image Processing, 2011,20(10) :2813 - 2826.
  • 5ZAFEIRIOUS S, TEFAS A, PITAS I. Blind robust wa- ternmrking schemes for copyright protection of 3D mesh objects [ J ]. IEEE Transactions on Visualization and Computer Graphics 2005, 11 (5) :596 -607.
  • 6CHO J W, PROST R, JUNG H Y. An oblivious water- marking for 3-D polygonal meshes using distribution of vertex norms [ J ]. IEEE Transactions on Signal Process- ing, 2007, 55 ( 1 ) : 142 - 155.
  • 7YEO B L, YEUNG M. Watermarking 3D objects for veri- fication[ J]. IEEE Computer Graphics and Applications, 1999, 19(1) :36 -45.
  • 8CHOU C M, TSENG D C. A public fragile watermarking scheme for3D model authentication[J]. Computer-Aided Design, 2006, 38(9) :1154 - 1165.
  • 9WU H T, CHEUNG Y M. A high-capacity data hiding method for polygonal meshes [ C ]. Springer: LNCS, Vol- ume (4437) , 2007 : 188 - 200.
  • 10CHOW H, LEE M E, LIM H, et al, Watermarking technique for authentication of 3-D polygonal meshes [ C]. Springer: LNCS, Volume (3304), 2005 : 259 - 270.

二级参考文献43

共引文献26

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部