高级检索
钱逸, 王新宇, 詹永照. 基于顶点统计特征的三维网格模型盲水印算法[J]. 计算机辅助设计与图形学学报, 2015, 27(9): 1661-1668.
引用本文: 钱逸, 王新宇, 詹永照. 基于顶点统计特征的三维网格模型盲水印算法[J]. 计算机辅助设计与图形学学报, 2015, 27(9): 1661-1668.
Qian Yi, Wang Xinyu, Zhan Yongzhao. A Blind Watermarking Scheme for Three-Dimensional Mesh Models Based on Statistical Characteristic of Vertices[J]. Journal of Computer-Aided Design & Computer Graphics, 2015, 27(9): 1661-1668.
Citation: Qian Yi, Wang Xinyu, Zhan Yongzhao. A Blind Watermarking Scheme for Three-Dimensional Mesh Models Based on Statistical Characteristic of Vertices[J]. Journal of Computer-Aided Design & Computer Graphics, 2015, 27(9): 1661-1668.

基于顶点统计特征的三维网格模型盲水印算法

A Blind Watermarking Scheme for Three-Dimensional Mesh Models Based on Statistical Characteristic of Vertices

  • 摘要: 针对三维网格模型盲水印算法鲁棒性和透明性未很好权衡的问题,提出一种基于顶点统计特征的三维网格盲水印算法.在水印嵌入过程中,首先计算顶点到模型中心的距离作为顶点的特征值;根据该特征值对顶点进行分区,并依据特征值的分布将分区分为联合嵌入分区、恢复分区和缓冲分区;然后通过改变联合嵌入分区内归一化后的顶点特征值的分布来嵌入水印,并修改恢复分区中顶点的坐标还原模型中心.文中算法通过综合利用联合嵌入分区、恢复分区和顶点微调方法增强了水印的鲁棒性,并实现了水印的盲检测.实验结果表明,在保持较好的透明性的基础上,该算法能够有效抵抗平移、旋转、均匀缩放、顶点重排序、噪声、平滑、细分和网格重构等常见攻击.

     

    Abstract: To obtain a better balance between the robustness and transparency of the blind watermarking scheme for three-dimensional mesh models, a novel blind watermarking scheme based on statistical characteristic of vertices is proposed in this paper. In the embedding process, the distances from vertices to the model center are calculated as their eigenvalues based on which vertices are separated into bins that are further classified into three groups: united bins, recovery bins and buffer bins according to the distribution of eigenvalues. Watermark is embedded by adjusting the distribution of normalized eigenvalues in united bins and then the position of the model center is recovered through modifying the coordinates of vertices in recovery bins. The proposed scheme enhances the robustness owing to the comprehensive utilization of united bins, recovery bins and vertex fine-tuning method while achieves the blind detection of watermark. The experimental results show that the proposed scheme not only has a good performance in transparency but also can effectively resist the common attacks including translation, rotation, uniform scaling, vertex rearrangement, noise, smoothing, subdivision and remeshing.

     

/

返回文章
返回