3D Content Model Hashing Based on Object Feature Vector

객체별 특징 벡터 기반 3D 콘텐츠 모델 해싱

  • Lee, Suk-Hwan (Dept. of Information security, Tongmyong University) ;
  • Kwon, Ki-Ryong (Department of IT Convergence and Application Engineering, Pukyong National University)
  • 이석환 (동명대학교 정보보호학과) ;
  • 권기룡 (부경대학교 IT융합응용공학과)
  • Received : 2010.06.04
  • Published : 2010.11.25

Abstract

This paper presents a robust 3D model hashing based on object feature vector for 3D content authentication. The proposed 3D model hashing selects the feature objects with highest area in a 3D model with various objects and groups the distances of the normalized vertices in the feature objects. Then we permute groups in each objects by using a permutation key and generate the final binary hash through the binary process with the group coefficients and a random key. Therefore, the hash robustness can be improved by the group coefficient from the distance distribution of vertices in each object group and th hash uniqueness can be improved by the binary process with a permutation key and a random key. From experimental results, we verified that the proposed hashing has both the robustness against various mesh and geometric editing and the uniqueness.

본 논문에서는 3D 콘텐츠 인증을 위한 객체별 특징 벡터 기반 강인한 3D 모델 해싱을 제안한다. 제안한 3D 모델 해싱에서는 다양한 객체들로 구성된 3D 모델에서 높은 면적을 가지는 특징 객체내의 꼭지점 거리들을 그룹화한다. 그리고 각 그룹들을 치환한 다음, 그룹 계수, 랜덤 변수 키와 이진화 과정에 의하여 최종 해쉬를 생성한다. 이 때 해쉬의 강인성은 객체 그룹별 꼭지점 거리 분포를 그룹 계수에 의하여 향상되고, 해쉬의 유일성은 그룹 계수를 치환 키 및 랜덤변수 키 기반의 이진화 과정에 의하여 향상된다. 실험 결과로부터 제안한 해싱이 다양한 메쉬 공격 및 기하학 공격에 대한 해쉬의 강인성과 유일성을 확인하였다.

Keywords

References

  1. A. Swaminathan, Y. Mao, and M. Wu, "Robust and Secure Image Hashing," IEEE Trans. on Information Forensics and Security, Vol. 1, Issue 2, pp. 215-230, June 2006. https://doi.org/10.1109/TIFS.2006.873601
  2. Y. Mao and M. Wu, "Unicity Distance of Robust Image Hashing," IEEE Trans. on Information Forensics and Security, Vol. 2, Issue 3, Part 1, pp. 462-467, Sept. 2007. https://doi.org/10.1109/TIFS.2007.902260
  3. V. Monga and M.K. Mhcak, "Robust and Secure Image Hashing via Non-Negative Matrix Factorizations," IEEE Trans. on Information Forensics and Security, Vol. 2, Issue 3, Part 1, pp. 376-390, Sept. 2007. https://doi.org/10.1109/TIFS.2007.902670
  4. V. Monga and B.L. Evans, "Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs," IEEE Trans. on Image Processing, Vol. 15, Issue 11, pp. 3452-3465, Nov. 2006. https://doi.org/10.1109/TIP.2006.881948
  5. V. Monga, A. Banerjee, and B.L. Evans, "A Clustering Based Approach to Perceptual Image Hashing," IEEE Trans. on Information Forensics and Security, Vol. 1, Issue 1, pp. 68-79, March 2006. https://doi.org/10.1109/TIFS.2005.863502
  6. F. Khelifi and J. Jianmin, "Perceptual Image Hashing Based on Virtual Watermark Detection," IEEE Transactions on Image Processing, Vol. 19, Issue 4, pp. 981-994, 2010. https://doi.org/10.1109/TIP.2009.2038637
  7. Z. Guopu, H. Jiwu, S. Kwong, Y. Jianquan, "Fragility Analysis of Adaptive Quantization-Based Image Hashing," IEEE Transactions on Information Forensics and Security, Vol. 5, Issue 1, pp. 133-147, 2010. https://doi.org/10.1109/TIFS.2009.2038742
  8. B. Coskun, B. Sankur, and N. Memon, "Spatio - Temporal Transform Based Video Hashing," IEEE Trans. on Multimedia, Vol. 8, Issue 6, pp. 1190-1208, Dec. 2006. https://doi.org/10.1109/TMM.2006.884614
  9. C. De Roover, C. De Vleeschouwer, F. Lefebvre, B. Macq, "Robust Video Hashing Based on Radial Projections of Key Frames," IEEE Trans. on Signal Processing, Vol. 53, Issue 10, Part 2, pp. 4020-4037, Oct. 2005. https://doi.org/10.1109/TSP.2005.855414
  10. L. Sunil and C.D. Yoo, "Robust Video Fingerprinting for Content-Based Video Identification," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 18, Issue 7, pp. 983-988, July 2008. https://doi.org/10.1109/TCSVT.2008.920739
  11. 이석환, 권기룡, "키 기반 블록 표면 계수를 이용한 강인한 3D 모델 해싱," 대한전자공학회논문지, 제47권 CI편 제1호, 1쪽-14쪽, 2010년 1월.
  12. S.-H. Lee, E.-J. Lee and K.-R. Kwon, "Robust 3D Mesh Hashing Based on Shape Features," IEEE International Conference on Multimedia & Expo, pp. 1040-1043, July 2010.
  13. M. Ghaderpanah, A. Abbas, A. Hamza, "Entropic Hashing of 3D Objects Using Laplace-Beltrami Operator," IEEE International Conference on Image Processing, pp. 3104-3107, Oct. 2008.
  14. K. Tarmissi and A. Hamza, "Information- Theoretic Hashing of 3D Objects Using Spectral Graph Theory," Expert Systems with Applications, Vol 36, pp. 9409-9414, 2009. https://doi.org/10.1016/j.eswa.2008.12.062
  15. Archibase Net, http://www.archibase.net, Accessed to July 2010.