Third Generation 3 D Watermarking : Applied
نویسنده
چکیده
With the explosion of multimedia content over Internet, there is a need for copyright protection of digital content. Whether it is music albums swapped over peer to peer networks or video files uploaded over websites such as YouTube.com or 3D models such as Shrek, artists need to protect their ownership of content. 3D Watermarking provides a deterrent to piracy of 3D models by embedding a hidden piece of information in the original content. Watermarking algorithms have a basic requirement that the watermark should be imperceptible to avoid being detected and not cause visible distortion to the viewer. The watermark should also be robust to withstand unintentional attacks. It is also desired that the watermark insertion capacity should be as high as possible to withstand intentional attacks and to allow insertion of multiple or redundant or biometric watermarks. Insertion of high density imperceptible watermark will make it extremely difficult for an attacker to find the watermark and then make substantial changes in the 3D model to remove or overwrite the watermark. However, inserting large amounts of information as watermark can cause distortion. The design of watermarking algorithms involves a trade off between imperceptibility, capacity and robustness. The first generation of 3D watermarking techniques inserted low capacity watermark based on spatial geometry and have poor robustness. The second generation of algorithms explored use of multi-resolution transform to insert the watermark and improve the robustness. This dissertation explores use of computational intelligence techniques to build third generation watermarking algorithms, that insert robust, high density watermarks and go the extra mile in terms of hiding more information than the first and second generation techniques. The focus of this study is to optimize the energy of the watermark and intelligently selecting information pockets in 3D model for watermark insertion and at the same time still maintaining randomness in the process to avoid detection. Use of Fuzzy Logic, Genetic Algorithms, and Artificial Neural Networks are proposed and assessed.
منابع مشابه
Robust multiplicative video watermarking using statistical modeling
The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...
متن کاملContent Based Watermarking for Color Images Using Transform Domain
This paper proposes three approaches to content-based watermarking for image authentication based on Independent Component Analysis (ICA). In this scheme, ICA is applied to blocks of the cover image and the resulting mixing matrix is used as the content-based feature. This is embedded in the mid-frequency DCT coefficient of the block in the first method. The watermark is embedded in the 3 rd le...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملIncreasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks
Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers, the invariance feature has been used to obtain the robustness against attacks. The purpose of this research was based on local f...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کامل