STL Model Watermarking Algorithm Based on Pyramid Technique
-
摘要: 为了确保STL (Stereo lithography) 模型数据在网络传输过程中的安全、完整性,根据STL模型自身的特点, 对模型进行了拓扑重建,在主成分分析(Primary component analysis, PCA)预处理的基础上,提出了基于金字塔技术建立STL模型数据空间索引算法,对原始STL模型数据空间进行了划分和索引, 结合奇异值分解的相关原理,提出了基于B+ 树K近邻查询的STL模型数字水印嵌入与提取算法. 实验证明:本文算法不可见性较好,算法实现速度快,在盲检测下能够抵抗旋转、平移、均匀缩放、顶点重排序、简化、噪声、剪切等攻击,具有较好的鲁棒性.Abstract: To ensure the security and integrity of stereo lithography (STL) model during transmission on the network, according to its own characteristics, the topological reconstruction of the STL model was achieved. After the pretreatment of primary component analysis (PCA), the multidimensional index algorithm for STL model based on pyramid technique was proposed, and the data space that contains the STL model was subdivided and indexed. According to the singular value decomposition principle, an STL model watermarking embedding and extraction algorithm based on B+ tree K nearest-neighbor query was proposed. Experimental results showed that the presented algorithm is efficient and robust to many attacks such as rotation, translation, uniform scaling, vertices reordering, simplifying, noise and cropping under blind detection.
-
[1] Zhao Chun-Hui, Liu Wei. Block compressive sensing based image semi-fragile zero-watermarking algorithm. Acta Automatica Sinica, 2012, 38(4): 609-617(赵春晖, 刘巍. 基于分块压缩感知的图像半脆弱零水印算法. 自动化学报, 2012, 38(4): 609-617) [2] Zhang Wei-Wei, Zhang Ru, Liu Jian-Yi, Niu Xin-Xin, Yang Yi-Xian. Robust video watermarking algorithm for H.264/AVC based on texture feature. Journal on Communications, 2012, 33(3): 82-89(张维纬, 张茹, 刘建毅, 钮心忻, 杨义先. 基于纹理特征的H.264/AVC顽健视频水印算法. 通信学报, 2012, 33(3): 82-89) [3] Wang Jun-Xiang, Ni Jiang-Qun, Pan Jin-Wei. A high performance reversible watermarking scheme baselineskip based on histogram shifting. Acta Automatica Sinica, 2012, 38(1): 88-96(王俊祥, 倪江群, 潘金伟. 一种基于直方图平移的高性能可逆水印算法. 自动化学报, 2012, 38(1): 88-96) [4] Li Xu-Dong. JPEG-compression-attack resistant image quantization watermarking algorithm in DWT domain. Journal of Optoelectronics·Laser, 2012, 23(2): 342-348(李旭东. 抗JPEG压缩攻击的DWT域图像量化水印算法. 光电子. 激光, 2012, 23(2): 342-348) [5] Zhu Bing-Lian, Liang Hui, Yang Ji-Xiang. A text document digital watermarking algorithm based on fuzzy clustering theory. Journal of Optoelectronics·Laser, 2012, 23(2): 349-353(朱冰莲, 梁辉, 杨吉祥. 一种基于模糊聚类理论的文本水印算法. 光电子. 激光, 2012, 23(2): 349-353) [6] Chen Fan, He Hong-Jie, Wang Hong-Xia. Variable-payload self-recovery watermarking scheme for digital image authentication. Chinese Journal of Computers, 2012, 35(1): 154-162(陈帆, 和红杰, 王宏霞. 用于图像认证的变容量恢复水印算法. 计算机学报, 2012, 35(1): 154-162) [7] Cui Xin-Chun, He Jie, Qin Xiao-Lin. A multiple audio watermarking for database based on blind source separation. Acta Electronica Sinica, 2012, 40(1): 78-83(崔新春, 贺洁, 秦小麟. 基于盲源分离的多重音频数据库水印算法. 电子学报, 2012, 40(1): 78-83) [8] Jiang Chuan-Xian, Chen Xiao-Wei, Li Zhi. Robust text watermarking based on significant components. Acta Automatica Sinica, 2012, 36(9): 1250-1256(姜传贤, 陈孝威, 李智. 基于文本重要内容的鲁棒水印算法. 自动化学报, 2010, 36(9): 1250-1256) [9] Deng Cheng, Li Jie, Gao Xin-Bo. Geometric attacks resistant image watermarking in affine covariant regions. Acta Automatica Sinica, 2010, 36(2): 221-228(邓成, 李洁, 高新波. 基于仿射协变区域的抗几何攻击图像水印算法. 自动化学报, 2010, 36(2): 221-228) [10] Bors A G. Watermarking mesh-based representations of 3-D objects using local moments. IEEE Transactions on Image Processing, 2006, 15(3): 687-701 [11] Hu Min, Xie Ying, Xu Liang-Feng, Xue Feng. A geometry property based adaptive watermarking scheme for 3D models. Journal of Computer-Aided Design and Computer Graphics, 2008, 20(3): 390-394, 402(胡敏, 谢颖, 许良凤, 薛锋. 基于几何特征的自适应三维模型数字水印算法. 计算机辅助设计与图形学学报, 2008, 20(3): 390-394, 402) [12] Liao Xue-Liang, Wang Yu-Ping. A new spatial domain method for watermarking in 3D models. Chinese Journal of Computers, 2008, 31(10): 1848-1856(廖学良, 王瑀屏. 一种新的三维模型水印嵌入空域算法. 计算机学报, 2008, 31(10): 1848-1856) [13] Wang Xin-Yu, Zhan Yong-Zhao. Blind watermarking scheme for 3D mesh models based on length of vector. Journal of Jiangsu University (Natural Science Edition), 2008, 29(3): 248-251(王新宇, 詹永照. 基于矢量长度的三维网格模型公有水印算法. 江苏大学学报(自然科学版), 2008, 29(3): 248-251) [14] Quan L, Liu Y. Watermarking of 3D polygonal meshes based on feature points. In: Proceedings of the 2nd IEEE Conference on Industrial Electronics and Application. Harbin, China: IEEE, 2007. 1837-1841 [15] Jin J Q, Wang X. A novel 3D mesh blind watermarking algorithm based on nielson affine invariant norm. In: Proceedings of the 10th IEEE International Conference on Computer-aided Design and Computer Graphics. Beijing, China: IEEE, 2007. 294-297 [16] Cho J W, Prost R, Jung H Y. An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing, 2007, 55(1): 142-155 [17] Lee S H, Kwon K R. Mesh watermarking based projection onto two convex sets. Multimedia Systems, 2008, 13(5-6): 323-330 [18] Corsini M, Gelasca E D, Ebrahimi T, Barni B. Watermarked 3-D mesh quality assessment. IEEE Transactions on Multimedia, 2007, 9(2): 247-256 [19] Cheng Y M, Wang C M. An adaptive steganographic algorithm for 3D polygonal meshes. Visual Computer, 2007, 23(9): 721-732 [20] Liu Y, Prabhakaran B, Guo X H. A robust spectral approach for blind watermarking of manifold surfaces. In: Proceedings of the 10th ACM Workshop on Multimedia and Security. New York, USA: ACM, 2008. 43-52 [21] Wang K, Luo M, Bors A G, Denis F. Blind and robust mesh watermarking using manifold harmonics. In: Proceedings of the 16th IEEE International Conference on Image. Piscataway: IEEE, 2009. 3657-3660 [22] Ji Feng, Li Zhan-Li. A novel method for the topological reconstruction based on STL files. Journal of Hunan University of Science and Engineering, 2006, 27(5): 154-157(纪峰, 李占利. 基于STL文件的拓扑重构新方法. 湖南科技学院学报, 2006, 27(5): 154-157) [23] Kalivas A, Tefas A, Pitas I. Watermarking of 3D models using principal component analysis. In: Proceedings of the 2003 IEEE International Conference on Acoustics, Speech, and Signal (ICASSP'03). New York: IEEE, 2003. 676-679 [24] Berchtold S, Bohm C, Kriegel H P. The pyramid-technique: towards breaking the curse of dimensionality. In: Proceedings of the 1998 International Conference on Management of Data. New York: ACM Press, 1998. 142-153 [25] Zhang R, Ooi B C, Tan B C. Making the pyramid technique robust to query types and workloads. In: Proceedings of the 20th International Conference on Data Engineering. New York: IEEE, 2004. 313-324 [26] Liu J X, Cui H G, Dai X. Three dimensional point clouds watermarking algorithm based on sphere degenerated octree. Advanced Materials Research, 2011, 314-316: 2064-2070 [27] Zhuang Yi, Hu Hai-Yang, Hu Hua. Centroid-slice-based uncertain high-dimensional indexing structure. Acta Electronica Sinica, 2011, 39(5): 1136-1142(庄毅, 胡海洋, 胡华. 基于质心片的不确定高维索引研究. 电子学报, 2011, 39(5): 1136-1142) [28] Meng Xian-Fu, Meng Hong-Xi, Zhang Zhen-Qiang. Bit-code and distance-based range query for high-dimensional data in Chord network. Journal of Dalian University of Technology, 2011, 51(3): 433-439(孟宪福, 孟泓汐, 张振强. 基于区位码和距离的Chord网络高维数据范围检索. 大连理工大学学报, 2011, 51(3): 433-439) [29] Melax S. A simple fast and effective polygon reduction algorithm. Game Developer, 1998, 5(11): 44-49
点击查看大图
计量
- 文章访问数: 1369
- HTML全文浏览量: 49
- PDF下载量: 1187
- 被引次数: 0