2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于金字塔技术的STL模型数字水印算法

崔汉国 刘健鑫 李正民

崔汉国, 刘健鑫, 李正民. 基于金字塔技术的STL模型数字水印算法. 自动化学报, 2013, 39(6): 852-860. doi: 10.3724/SP.J.1004.2013.00852
引用本文: 崔汉国, 刘健鑫, 李正民. 基于金字塔技术的STL模型数字水印算法. 自动化学报, 2013, 39(6): 852-860. doi: 10.3724/SP.J.1004.2013.00852
CUI Han-Guo, LIU Jian-Xin, LI Zheng-Min. STL Model Watermarking Algorithm Based on Pyramid Technique. ACTA AUTOMATICA SINICA, 2013, 39(6): 852-860. doi: 10.3724/SP.J.1004.2013.00852
Citation: CUI Han-Guo, LIU Jian-Xin, LI Zheng-Min. STL Model Watermarking Algorithm Based on Pyramid Technique. ACTA AUTOMATICA SINICA, 2013, 39(6): 852-860. doi: 10.3724/SP.J.1004.2013.00852

基于金字塔技术的STL模型数字水印算法

doi: 10.3724/SP.J.1004.2013.00852
基金项目: 

湖北省自然科学基金(2012FB06904)资助

详细信息
    通讯作者:

    崔汉国

STL Model Watermarking Algorithm Based on Pyramid Technique

Funds: 

Supported by Hubei Province Natural Science Foundation of China(2012FB06904)

  • 摘要: 为了确保STL (Stereo lithography) 模型数据在网络传输过程中的安全、完整性,根据STL模型自身的特点, 对模型进行了拓扑重建,在主成分分析(Primary component analysis, PCA)预处理的基础上,提出了基于金字塔技术建立STL模型数据空间索引算法,对原始STL模型数据空间进行了划分和索引, 结合奇异值分解的相关原理,提出了基于B+ 树K近邻查询的STL模型数字水印嵌入与提取算法. 实验证明:本文算法不可见性较好,算法实现速度快,在盲检测下能够抵抗旋转、平移、均匀缩放、顶点重排序、简化、噪声、剪切等攻击,具有较好的鲁棒性.
  • [1] Zhao Chun-Hui, Liu Wei. Block compressive sensing based image semi-fragile zero-watermarking algorithm. Acta Automatica Sinica, 2012, 38(4): 609-617(赵春晖, 刘巍. 基于分块压缩感知的图像半脆弱零水印算法. 自动化学报, 2012, 38(4): 609-617)
    [2] Zhang Wei-Wei, Zhang Ru, Liu Jian-Yi, Niu Xin-Xin, Yang Yi-Xian. Robust video watermarking algorithm for H.264/AVC based on texture feature. Journal on Communications, 2012, 33(3): 82-89(张维纬, 张茹, 刘建毅, 钮心忻, 杨义先. 基于纹理特征的H.264/AVC顽健视频水印算法. 通信学报, 2012, 33(3): 82-89)
    [3] Wang Jun-Xiang, Ni Jiang-Qun, Pan Jin-Wei. A high performance reversible watermarking scheme baselineskip based on histogram shifting. Acta Automatica Sinica, 2012, 38(1): 88-96(王俊祥, 倪江群, 潘金伟. 一种基于直方图平移的高性能可逆水印算法. 自动化学报, 2012, 38(1): 88-96)
    [4] Li Xu-Dong. JPEG-compression-attack resistant image quantization watermarking algorithm in DWT domain. Journal of Optoelectronics·Laser, 2012, 23(2): 342-348(李旭东. 抗JPEG压缩攻击的DWT域图像量化水印算法. 光电子. 激光, 2012, 23(2): 342-348)
    [5] Zhu Bing-Lian, Liang Hui, Yang Ji-Xiang. A text document digital watermarking algorithm based on fuzzy clustering theory. Journal of Optoelectronics·Laser, 2012, 23(2): 349-353(朱冰莲, 梁辉, 杨吉祥. 一种基于模糊聚类理论的文本水印算法. 光电子. 激光, 2012, 23(2): 349-353)
    [6] Chen Fan, He Hong-Jie, Wang Hong-Xia. Variable-payload self-recovery watermarking scheme for digital image authentication. Chinese Journal of Computers, 2012, 35(1): 154-162(陈帆, 和红杰, 王宏霞. 用于图像认证的变容量恢复水印算法. 计算机学报, 2012, 35(1): 154-162)
    [7] Cui Xin-Chun, He Jie, Qin Xiao-Lin. A multiple audio watermarking for database based on blind source separation. Acta Electronica Sinica, 2012, 40(1): 78-83(崔新春, 贺洁, 秦小麟. 基于盲源分离的多重音频数据库水印算法. 电子学报, 2012, 40(1): 78-83)
    [8] Jiang Chuan-Xian, Chen Xiao-Wei, Li Zhi. Robust text watermarking based on significant components. Acta Automatica Sinica, 2012, 36(9): 1250-1256(姜传贤, 陈孝威, 李智. 基于文本重要内容的鲁棒水印算法. 自动化学报, 2010, 36(9): 1250-1256)
    [9] Deng Cheng, Li Jie, Gao Xin-Bo. Geometric attacks resistant image watermarking in affine covariant regions. Acta Automatica Sinica, 2010, 36(2): 221-228(邓成, 李洁, 高新波. 基于仿射协变区域的抗几何攻击图像水印算法. 自动化学报, 2010, 36(2): 221-228)
    [10] Bors A G. Watermarking mesh-based representations of 3-D objects using local moments. IEEE Transactions on Image Processing, 2006, 15(3): 687-701
    [11] Hu Min, Xie Ying, Xu Liang-Feng, Xue Feng. A geometry property based adaptive watermarking scheme for 3D models. Journal of Computer-Aided Design and Computer Graphics, 2008, 20(3): 390-394, 402(胡敏, 谢颖, 许良凤, 薛锋. 基于几何特征的自适应三维模型数字水印算法. 计算机辅助设计与图形学学报, 2008, 20(3): 390-394, 402)
    [12] Liao Xue-Liang, Wang Yu-Ping. A new spatial domain method for watermarking in 3D models. Chinese Journal of Computers, 2008, 31(10): 1848-1856(廖学良, 王瑀屏. 一种新的三维模型水印嵌入空域算法. 计算机学报, 2008, 31(10): 1848-1856)
    [13] Wang Xin-Yu, Zhan Yong-Zhao. Blind watermarking scheme for 3D mesh models based on length of vector. Journal of Jiangsu University (Natural Science Edition), 2008, 29(3): 248-251(王新宇, 詹永照. 基于矢量长度的三维网格模型公有水印算法. 江苏大学学报(自然科学版), 2008, 29(3): 248-251)
    [14] Quan L, Liu Y. Watermarking of 3D polygonal meshes based on feature points. In: Proceedings of the 2nd IEEE Conference on Industrial Electronics and Application. Harbin, China: IEEE, 2007. 1837-1841
    [15] Jin J Q, Wang X. A novel 3D mesh blind watermarking algorithm based on nielson affine invariant norm. In: Proceedings of the 10th IEEE International Conference on Computer-aided Design and Computer Graphics. Beijing, China: IEEE, 2007. 294-297
    [16] Cho J W, Prost R, Jung H Y. An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing, 2007, 55(1): 142-155
    [17] Lee S H, Kwon K R. Mesh watermarking based projection onto two convex sets. Multimedia Systems, 2008, 13(5-6): 323-330
    [18] Corsini M, Gelasca E D, Ebrahimi T, Barni B. Watermarked 3-D mesh quality assessment. IEEE Transactions on Multimedia, 2007, 9(2): 247-256
    [19] Cheng Y M, Wang C M. An adaptive steganographic algorithm for 3D polygonal meshes. Visual Computer, 2007, 23(9): 721-732
    [20] Liu Y, Prabhakaran B, Guo X H. A robust spectral approach for blind watermarking of manifold surfaces. In: Proceedings of the 10th ACM Workshop on Multimedia and Security. New York, USA: ACM, 2008. 43-52
    [21] Wang K, Luo M, Bors A G, Denis F. Blind and robust mesh watermarking using manifold harmonics. In: Proceedings of the 16th IEEE International Conference on Image. Piscataway: IEEE, 2009. 3657-3660
    [22] Ji Feng, Li Zhan-Li. A novel method for the topological reconstruction based on STL files. Journal of Hunan University of Science and Engineering, 2006, 27(5): 154-157(纪峰, 李占利. 基于STL文件的拓扑重构新方法. 湖南科技学院学报, 2006, 27(5): 154-157)
    [23] Kalivas A, Tefas A, Pitas I. Watermarking of 3D models using principal component analysis. In: Proceedings of the 2003 IEEE International Conference on Acoustics, Speech, and Signal (ICASSP'03). New York: IEEE, 2003. 676-679
    [24] Berchtold S, Bohm C, Kriegel H P. The pyramid-technique: towards breaking the curse of dimensionality. In: Proceedings of the 1998 International Conference on Management of Data. New York: ACM Press, 1998. 142-153
    [25] Zhang R, Ooi B C, Tan B C. Making the pyramid technique robust to query types and workloads. In: Proceedings of the 20th International Conference on Data Engineering. New York: IEEE, 2004. 313-324
    [26] Liu J X, Cui H G, Dai X. Three dimensional point clouds watermarking algorithm based on sphere degenerated octree. Advanced Materials Research, 2011, 314-316: 2064-2070
    [27] Zhuang Yi, Hu Hai-Yang, Hu Hua. Centroid-slice-based uncertain high-dimensional indexing structure. Acta Electronica Sinica, 2011, 39(5): 1136-1142(庄毅, 胡海洋, 胡华. 基于质心片的不确定高维索引研究. 电子学报, 2011, 39(5): 1136-1142)
    [28] Meng Xian-Fu, Meng Hong-Xi, Zhang Zhen-Qiang. Bit-code and distance-based range query for high-dimensional data in Chord network. Journal of Dalian University of Technology, 2011, 51(3): 433-439(孟宪福, 孟泓汐, 张振强. 基于区位码和距离的Chord网络高维数据范围检索. 大连理工大学学报, 2011, 51(3): 433-439)
    [29] Melax S. A simple fast and effective polygon reduction algorithm. Game Developer, 1998, 5(11): 44-49
  • 加载中
计量
  • 文章访问数:  1369
  • HTML全文浏览量:  49
  • PDF下载量:  1187
  • 被引次数: 0
出版历程
  • 收稿日期:  2011-10-26
  • 修回日期:  2012-09-26
  • 刊出日期:  2013-06-20

目录

    /

    返回文章
    返回