DOI QR코드

DOI QR Code

Optimization of 3D Triangular Mesh Watermarking Using ACO-Weber's Law

  • Narendra, Modigari (Computer Science and Engineering, Vignan's Foundation for Science Technology and Research Deemed to be University) ;
  • Valarmathi, M.L. (Computer Science & Engineering, Dr. Mahalingam College of Engineering and Technology) ;
  • Anbarasi, L.Jani (School of Computing Science and Engineering, VIT Chennai)
  • Received : 2019.12.21
  • Accepted : 2020.09.15
  • Published : 2020.10.31

Abstract

The development of new multimedia techniques such as 3D printing is increasingly attracting the public's attention towards 3D objects. An optimized robust and imperceptible watermarking method based on Ant Colony Optimization (ACO) and Weber Law is proposed for 3D polygonal models. The proposed approach partitions the host model into smaller sub meshes and generates a secret watermark from the sub meshes using Weber Law. ACO based optimized strength factor is identified for embedding the watermark. The secret watermark is embedded and extracted on the wavelet domain. The proposed scheme is robust against geometric and photometric attacks that overcomes the synchronization problem and authenticates the secret watermark from the distorted models. The primary characteristic of the proposed system is the flexibility achieved in data embedding capacity due to the optimized strength factor. Extensive simulation results shows enhanced performance of the recommended framework and robustness towards the most common attacks like geometric transformations, noise, cropping, mesh smoothening, and the combination of such attacks.

Keywords

1. Introduction

Copyright protection of digital multimedia models [1] has been the focal point in multimedia research for a long period. In the field of multimedia and computer graphics, importance towards copyright protection is rapidly growing to overcome the unauthorized duplication. The progress of internet and digital signal processing have made copying, transferring, conversion and sharing of multimedia documents so simple. Watermarking scheme is a method that embeds hidden information called watermark into the host, which holds the exact owner information. Whenever the ownership of any multimedia object is under question the secret watermark is extracted to make a claim about the object. Watermarking schemes can be used for various applications like transaction tracing, copyright and copy protection, broadcast monitoring, medical safety and authentication etc., [2-4].

Watermarking techniques can be categorized as i) fragile and ii) robust. Fragile watermarking authenticates the digital content and is able to detect even the smallest changes that have occurred to the system. Robust watermarking [33,34] hides a simple logo or a secret into the digital content to ensure the ownership details. This embedded secret should be robust against intentional or unintentional attacks and should be able to extract the secret without loss. Similarly watermarking is also classified as blind, non-blind watermarking. For non-blind watermarking schemes, the original data is required during the extraction process. This scheme achieves good imperceptibility, high robustness towards various attacks and has a limited utilization effect. In contrast, blind mesh watermarking doesn’t require the original secret during the extraction process[26]. Most of the blind watermarking schemes are mostly vulnerable to cropping attacks[29]. Watermarking in the 3D mesh models can be categorized according to the domain in which the watermarks are embedded or extracted. In accordance with this, watermarking schemes are classified as spatial and spectral domain techniques. In spatial domains, the watermarks are embedded [28] through modifying the structure of the mesh line vertex coordinates, edge length, triangular area, tetrahedral volume, etc. Generally, spatial schemes are designed to be in both fragile and robust, but we have to perform some additional operations to increase its robustness. A spectral method embeds the secret watermark in the coefficients of harmonic coefficients or transform domain like wavelet or frequency.

Similarly watermarking can be classified as blind, non-blind, and semi-blind [35,36]. Blind watermarking schemes allow the authorized user to extract the watermark using the secret key. It doesn’t require either the original content or the watermarked content [27]. Non-blind watermarking schemes require the original data and the watermark to verify the watermarks embedded in the applications. The original data is not required in the semi-blind watermarking scheme. A novel blind watermarking is proposed by [37,38] using DWT and DCT for images to obtain strength of imperceptibility and robustness. The watermark is embedded into the joined transform to overcome the individual drawbacks and results in an effective watermarking. Similarly the watermarking is performed to embed the watermark in the special middle frequency. Similarly to optimize the watermarking the various research work has been performed. Robust and novel insertion using discrete wavelet transform and ANN was performed to insert based on the association between the coefficient and its neighbors’ standard deviation. Vertices for embedding the watermark are selected by back propagation neural network [39].

This paper proposed an approach to embed the watermark by modifying the wavelet coefficient of the 3D models. The secret watermark is generated from the actual 3D model using the Weber law. Vertices of the 3D models for embedding is selected using the optimized strength factor computed using ACO. Watermark is extracted from the original 3D model in the presence of watermarked model. This scheme enhances the robustness and imperceptibility and is compared with the existing algorithm. The remainder of this paper is structured as follows. Section 2 describes the related works. The proposed study is explained in Section 3. This section explains in detail about the proposed pre-processing, feature extraction and classification methods used for classifying the COVID-19 Lung X-ray images. Section 4 illustrates the experimental analysis, results and discussion followed by Conclusions in Section 5.

2. Related Work

3D digital watermarking schemes are relatively new compared to 2D watermarking. 3D models has received less contribution as the techniques implemented for video content and image data cannot be adapted as such due to its complex representation like voxels, NURBS, polygonal meshes etc. Benedens [6] proposed geometry based watermarking which directly embedded the watermark by altering the 3D mesh geometry. Similarly Ohbuchi [7] and Harte [8] also embedded the secret watermark by altering the geometry and topology of the 3D mesh models. These schemes are simple which requires less computation and are not robust enough to resist various attacks.

Later various investigations were performed in frequency domain based on [5, 7, 11] spectral decomposition and wavelet transformation, which achieved a good resistance towards various attacks. Praun [5] proposed a generalized spread spectrum technique which constructed a scalar basic function using multi resolution technique over the vertices of the mesh model. The secret is embedded into the vertices of the 3D model along the surface weighted by a basic function. Obhuche [7] proposed a mesh spectral matrix to embed the secret watermark into the spectral coefficient. Cotting et al [9] generalized the mesh spectral coefficient to point based embedding in 3D geometrics. Qiu et al [11] decomposed the original 3D model into a various series of details using spherical wavelet transform and embedded the secret watermark in the approximation part of the transformed 3D model. Li et al [10] embedded the watermark into partitioned surfaces using additive characteristic of Fourier transform. Kwon et. al.[12] watermarked into every polygon patch using normal vector distribution. A blind robust watermarking technique is analyzed by Zafeiriou et. al. [16] for copyright protection which is robust enough to resist against affine transformation attacks. A new texture based 3D video object watermarking was suggested by Garcia et al [15] and Ucceddu et. al. [14] where the watermark is embedded at suitable resolution level after performing wavelet decomposition. A new orthogonal function based on radial basis was proposed by [13] which generated a robust spectral scheme for large meshes. Karni and Gotsman [22] performed a mesh Laplacian matrix to encode 3D shape using Eigen values which successfully retained the shape information without loss. A new symmetric encryption scheme is proposed based on Arnonld cat map, using shuffling and substitution. A novel robust statistical watermarking of 3D mesh was performed by Nassima et al [6], embedded the signature bits into the vertices identified through a salient point detector [1] ADF (Auto Diffusion Function). The bits are embedded repeatedly into each region thus overcoming the cropping attack. The authors further extended by segmenting the mesh based on the identified salient features. Statistical embedding of secret was performed by altering the amplitude and means of the bits watermark strength [3]. Han et. al.[4] presented an embedding approach through consistent segmentation and steganalysis. The primary watermark domain is identified using the shape function and the consistency interval is used to eliminate the outliers of the segments. This scheme also followed the principle of embedding the same watermark into various segments thus achieving high robustness against the cropping attack.

3. Representation of Triangle Mesh and Methodologies

3D object are typically characterized as triangular or polygonal meshes in graphics and geometric-aided designs. The triangular meshes are well-described as M = ( δ, β) where δ= (δ 1, δ 2, δ 3 ... δ m) is the set of vertices and β =( β1, β2, ... β n ) is the set of faces of the 3D model. Every edge lij = (δ i, δ j) is formed by connecting vertex pairs where δ i, δ j ∈ δ are said to be adjacent if their edges are connected i.e. eij ∈ β.

A. Weber Law

Weber Law [20,21] demonstrates the relation between incremental threshold and intensity as constant. Relationship between the intensity and quantity in Weber’s Law is termed as

\(\frac{\partial T}{T}=C\)       (1)

Where incremental threshold is ∂T , primary value of intensity is T and fractional constant is C . For any vertex δ the coordinates is chosen from x, y and z axes of mesh models where δ represents the center vertices surrounded by eight neighbors which are shown in Fig. 1.

E1KOBZ_2020_v14n10_4042_f0006.png 이미지

Fig. 1. Representation of Vertex Neighborhood

Weber Law organizes the data into non overlapping block from which the threshold intensity among neighbors of every pixel is assumed as the differential excitation descriptor. Differential excitation 𝜒𝜒 is calculated for the current vertex δ as (2), where m lies between 1 to 8.

\(\chi\left(\mathrm{x}_{\mathrm{i}}, \mathrm{y}_{\mathrm{j}}\right)=\arctan \left(\sum_{\mathrm{n}=0}^{\mathrm{m}-1} \frac{\delta_{\mathrm{n}}-\delta_{\mathrm{i}}}{\delta_{\mathrm{i}}}\right)\)       (2)

(xi, yj) refers to the current vertices and ‘m(=8)’ refers to the neighbors. The range of the differential excitation χ lies within the range \(\left[\frac{\pi}{2}, \pi\right]\). The second descriptor of Weber's law refers to the orientation 𝜆 which is computed as follows

\(\lambda\left(\mathrm{x}_{\mathrm{i}}, \mathrm{y}_{\mathrm{j}}\right)=\arctan \left(\frac{\delta_{\mathrm{8}}-\delta_{4}}{\delta_{6}-\delta_{2}}\right)\)       (3)

Orientation λ , is mapped to λ2 using Eq.(4), such that λ2 lies in between the interval [0, 2π ].

m\(\lambda_{2}\left(\mathrm{x}_{\mathrm{i}}, \mathrm{y}_{\mathrm{j}}\right)=\arctan 2\left(\frac{\delta_{7}-\delta_{3}}{\delta_{5}-\delta_{1}}\right)+\Pi\)       (4)

λ2 refers to the orientation of the processed vertices (xi,yj).

B. Ant Colony Optimization (ACO )

Ant Colony Optimization is a meta heuristic algorithm introduced by Dorigo [17, 18, 32] to resolve complex optimization issues. ACO algorithm is enlivened by the behavior of ant’s species during their exploration of food surrounding their nest [19]. If the ants identify their food, then they drop pheromone a chemical substance on the pathway to trace the food source. All the other ants smell the trace through high concentration of pheromone. Thus optimal path to the food source and the nest is found through the pheromone, which helps in effective transfer of food to their nest. The representation of colony within ACO algorithm is the initial process. A matrix T of size MxN represents the colony of M ants where T = (𝑦1, 𝑦2 … ym) and Y = (𝑦1, 𝑦2, y3, …… ym) and Y = (y1, y2, y3 ……, y𝑛)𝑡 corresponds to vectors of N variables of a single ant. Socha and Dorigo [36] computed η phoromone

\(\eta_{\text {phoromone }}=\exp \left(-\frac{\left(y-y_{\min }\right)^{2}}{2 \sigma^{2}}\right)\)       (5)

through normal distribution given in equation 5 where ymin refers the optimal point identified from the design space. Standard deviation σ specifies the current minimum value through aggregating the ants ymin and σ are initialized accordingly. ymin is initialized randomly through uniform distribution computation and σ is chosen greater than the span of the design space so that the it can be located inside. Each design variables of every ant are updated after every iteration and the distribution of pheromone is updated using the data obtained through the optimization as given in the following equation 6

\(\sigma=\operatorname{std}(\text { antcolony })\)       (6)

where std(antcolony) [32] is the elite solution which retrieves a vector that includes the standard derivation for every design variable. Ideal solution can be obtained by accumulation of Pheromone through increase in the vicinity of the candidate. Negative updating processes are not disregarded to prevent premature convergence. So a modest scheme to dissolve the pheromone is performed where the quantity of pheromone is modified by the current standard deviation of each variable as σ new = λ.σ old where the dissolving rate is always considered as (λ >1) .

4. Proposed 3D Watermarking Scheme

The watermarking scheme proposed by Laumar [21] and Anbarasi [20] using Weber’s Law shows that the generated watermarked model is similar to the host 3D model for strength factor α equal to 0, whereas the retrieved watermark will be close to original watermark for strength factor α equal to 1. Identifying a strength factor to generate a less visually degraded watermarked model with a good retrieval property was performed using a trial and error method in these schemes. The analyses were performed with a strength factor ranging from α =0 .98 to 0 .001 and the identified value doesn’t achieve good imperceptibility all the times due to the complex nature of the mesh model.

Mostly high scalar value affects the imperceptibility but improves robustness. Challenging task deals with the computation of optimal strength factor to achieve high imperceptibility and robustness. Near optimum strength factor has to be identified for good visual quality and robustness. Optimization algorithm plays an inevitable role in identifying the optimum strength factor. So an optimized strength factor using ACO for watermarking in 3D models is suggested and analyzed in this work.

In this proposed method, a 3D model fingerprint information is framed from the host 3D model based on Weber differential excitation descriptor . The 3D mesh model is partitioned into 3x3 sub mesh models and for every 3x3 non overlapping sub model, differential excitation descriptor value is computed to form vertices of the watermark. The faces of the host watermark are included in the vertices thus constructing a fingerprint watermark. This fingerprint watermark is embedded into the host 3D model for an elite strength factor. The generation of the fingerprint secret watermark, embedding and retrieval is expressed in the following section. The proposed optimized watermarking architecture for 3D models is shown in Fig. 2.

E1KOBZ_2020_v14n10_4042_f0001.png 이미지

Fig. 2. Architecture of the Proposed System

A. Generation of Watermark

Every three vertex coordinates are grouped into 3x3 blocks, resulting in ‘c’ generating blocks. The Weber differential excitation description value is computed based on the threshold intensity among the neighbours of each generating block as expressed in the equation 7.

\(W\left(\mathrm{x}_{\mathrm{i}}, \mathrm{y}_{\mathrm{j}}\right)=\sum_{\mathrm{x}=1}^{\mathrm{x}=\mathrm{m} / 3} \sum_{\mathrm{y}=1}^{\mathrm{y}=3} \arctan \left(\sum_{\mathrm{n}=0}^{\mathrm{m}-1} \frac{\delta_{\mathrm{n}}-\delta_{\mathrm{i}}}{\delta_{\mathrm{i}}}\right)\)       (7)

‘c’ generating blocks results in ‘c’ values and every 3 coordinates are grouped to form vertex values as δx, δy, δz. Based on the number of vertices, faces are included from the host model to generate a fingerprint 3D watermark and the resulted secret watermarks for various models are given in Table 2.

Table 2. Original 3D model and the Generated fingerprint watermarks

E1KOBZ_2020_v14n10_4042_t0002.png 이미지

B. Embedding of Watermark

The fingerprint 3D model is embedded in the ‘C’ generating blocks of host 3D model using linear interpolation given as equation (8)

\(W_{m}=\sum_{\mathrm{x}=1}^{\mathrm{x}=\mathrm{m} / 3} \sum_{y=1}^{y=3}(1-\alpha)^{*} \mathrm{w}_{\mathrm{c}}+\alpha^{*} \mathrm{i}_{\mathrm{c}}\)       (8)

Where Wm-> watermarked block, wc-> watermark vertices (coordinates of the block c), ic-> center value of the host 3D model, m -> maximum vertex.

C. Watermark Extraction

The proposed semi blind watermarking scheme extracts the watermark, by performing inverse linear interpolation on the watermarked 3D model, splitting into ‘C’ blocks of size 3*3 as given in equation (9) Where We is the extracted watermark, α is the optimized strength factor

\(W_{e}=\sum_{x=1}^{x=m / 3} \sum_{y=1}^{y=3} \frac{1}{\alpha} W-\frac{(1-\alpha)}{\alpha} W_{m}\)

D. Identification of Optimized strength factor

The algorithm for identifying the optimized strength factor α is given as

a) Initialize the parameters of ACO such as population, fitness function and stopping criterion.

b) Target fitness function is defined as a good PSNR value ≥ 50dB and a high NC (NC=1).

c) Randomize the Initial population of ants X which includes a set of potential solution to that in equation 5.

d) For each ant termed as X of length L in population perform the following:

1. Embed the watermark using X as strength factor as given in equation 8.

2. Compute NC between host (I) and watermarked model (Im)

3. For each watermarked model perform few attacks like cropping, scaling and noise addition, generate different attacked watermarked model as Wc, Ws, Wr € Wi.

4. Extract the watermark from the attacked model Wi ˆ i

5. Compute NC between watermark and the retrieved secret watermark (w, wˆm ) (w, wˆ c ) (w, wˆ ) (w, wˆ r

m - Secret watermark retrieved from original watermarked model, 

wˆ c - Cropped model, wˆ s - Scaled, wˆ r - noisy model   

6. Fitness function is computed as (10)

\(F(x)=\left(\frac{1}{N C\left(I, I_{m}\right) N C\left(w, w_{m}\right) N C\left(w, \hat{w}_{c}\right) N C\left(w, \hat{w}_{s}\right) N C\left(w, \hat{w}_{r}\right)}\right)\)       (10)

7. Elite strength value is computed using multi objective function as given in equation (11) where constant values are p, w, F0

\(f_{\text {obj }}(x)=\sum_{i=1}^{T+2}\left(e^{p \cdot w}-1\right) e^{p\left(F(x)-F_{0}\right)}\)       (11)

8. Pheromone is updated using equation (12) where σ specifies finally evaluated value and their aggregation, where xi refers the present value in population matrix , xˆ refers mean and ‘ m’ is the population count .

\(\sigma_{1}=\sqrt{\frac{1}{m}} \sum_{i=1}^{m} x_{i}-\hat{x}\)       (12)

The maximum iteration is initialized to 150 and the target strength factor α is set as [0.98 to 0.01] and the value of p, w, fo is considered as 2, 5 and 10 for equation (11).

e) If the maximum number of population or target objective function is reached (which is the stopping criteria) then goto step ‘f’ or goto step ‘c’.

f) The χ best values with the smallest objective function fobj are chosen as the strength factor to embed the watermark.

5. Simulation Results and Evaluation

The experimental evaluation of the proposed ACO-Weber watermarking scheme was analyzed with respect to imperceptibility (PSNR) and Robustness (NC) towards several known threats. The characteristics of 3D model (faces F, vertices V) used in the experimental study is given in Table 1. The optimized strength factor is obtained after several iteration of ACO algorithm. Table 3 presents the ACO based watermarked models and its obtained PSNR values. The results clearly predict a high imperceptibility in the resulting models. To assess the efficiency of the developed scheme, different simulation process was performed with various 3D mesh models.

Table 1. Characteristics of the 3D host model and the secret 3D watermark

E1KOBZ_2020_v14n10_4042_t0001.png 이미지

Table 3. Watermarked 3D model, ACO strength factor and achieved PSNR

E1KOBZ_2020_v14n10_4042_t0003.png 이미지

A. Mesh Distortion of ACO-Weber Law

Degradation value of 3D model has to be measured to achieve a successful watermarking scheme. The mesh distortion of the watermarked models is measured using PSNR (Peak Signal to Noise Ratio) and NC (Normalized Correlation). PSNR measure is given in equation (13) where max(I(i, j)) represents the vertex count and face coordinated of a 3D model.

\(\mathrm{PSNR}=10 \log _{10}\left(\max \left([(i, j))^{2} / \mathrm{d}_{\mathrm{rms}}\right)\right.\)       (13)

Root mean square Error identifies the Geometrical Distortion between two meshes and is given in equation (14) where M and M′ refers to the original and deformed meshes surface and v refers to the point of the mesh model and |M| refers to the surface area of the 3D model M and d(v, M′) refers to the point to mesh distance. This evaluates the geometrical distortion which is not symmetric [61].

\(\mathrm{d}_{\mathrm{rms}}\left(\mathrm{M}, \mathrm{M}^{\prime}\right)=\sqrt{\mathrm{d}_{\mathrm{v} \in \mathrm{M}}\left(\mathrm{v}, \mathrm{M}^{\prime}\right)^{2} \mathrm{~d} \mathrm{M}}\)       (14)

Therefore the maximum root mean square error between a host and a watermarked model can be represented as equation 15. The distortions measured using MRMS is more accurate since it evaluates the mesh surface.

\(\mathrm{d}_{\mathrm{rms}}\left(\mathrm{M}, \mathrm{M}^{\prime}\right)=\max \left(\mathrm{d}_{\mathrm{rms}}\left(\mathrm{M}, \mathrm{M}^{\prime}\right), \mathrm{d}_{\mathrm{rm}}\left(\mathrm{M}^{\prime}, \mathrm{M}\right)\right.\)       (15)

Normalised Correlation NC is calculated as given in equation 16.

\(\mathrm{NC}\left(\mathrm{w}, \mathrm{w}_{\mathrm{e}}\right)=\frac{\sum_{i=1}^{M} \sum_{j=1}^{N}\left(w(i, j)-\mu_{\omega}\right)\left(W_{e}(i, j)-\mu_{e}\right)}{\sqrt{\left.\sum_{i=1}^{M} \sum_{j=1}^{N}(w(i, j)-\mu \omega)^{2}\right)} \sqrt{\sum_{i=1}^{M} \sum_{j=1}^{N}\left(w(i, j)-\mu_{e}\right)^{2}}}\)       (16)

w and we represents the host and the extracted 3D watermark, 𝜇𝜔, 𝜇e indicates the mean value of original and the retrieved 3D secret watermark respectively. The normalized correlation value obtained for the original and extracted 3D mesh watermark lies in the range of -1 and 1. The extracted 3D mesh watermark is identical to the original 3D mesh watermark while the Normalized Correlation value equals 1. Fig. 3 shows the PSNR values obtained among the host and the watermarked 3D model compared to [20]. The results depicts that the optimized strength factor results in lesser degradation than a fixed strength factor.

E1KOBZ_2020_v14n10_4042_f0002.png 이미지

Fig. 3. Comparison of the PSNR values obtained among the host and the watermarked 3D model

ACO based optimized Weber law resulted in optimized verifying strength factor for each model. The attained ideal strength factor successfully preserves a good imperceptibility PSNR values and good robustness against several attacks.

B. Robustness of the proposed ACO-Weber watermarking Scheme

To analyze the robustness of the proposed scheme, various attacks like geometrical transformation and topological transformation were tested. Geometrical transformation includes rotation, scaling, translation and their combinations, whereas topological transformations comprised attacks like cropping, rendering of vertices and mesh simplifications. Signal processing attack incorporates noising and compression. Table 4 shows the calculated results of the achieved robustness with respect to NC. The results shows that a high normalized correlation i.e. equivalent to the original (NC=1) is obtained for the proposed scheme.

Table 4. NC of the proposed ACO-Weber with respect to robustness

E1KOBZ_2020_v14n10_4042_t0004.png 이미지

Correlation is a suitable metric to compare and quantify the robustness to attacks. If the correlation of any watermark is achieved more than 0.5 then the watermark is visible. Three types of attacks are analyzed in our simulation studies: cropping, noising and scaling, various scenarios and different parameters used are specified in Table 5. Resistance towards noisy attack is shown by adding salt and pepper noise signal and Gaussian noise ranging from 0.5%, 1%, 2%. The noisy 3D models along with the extracted watermarks are shown in Fig. 4(a, b). Fig. 5 shows the achieved correlation coefficient for different models. The results show a good NC for the retrieved watermark which is almost nearing 1. Similarly PSNR is achieved above 46 dB even after a noise ratio of 2% is added to the model.

Table 5. Types of Attacks

E1KOBZ_2020_v14n10_4042_t0005.png 이미지

E1KOBZ_2020_v14n10_4042_f0007.png 이미지

Fig. 4(a). Noisy 3D model and the extracted watermarks (Salt and Pepper)

E1KOBZ_2020_v14n10_4042_f0008.png 이미지

Fig. 5(a). NC values between the original retrieved 3D watermark from a salt and pepper noisy model.

E1KOBZ_2020_v14n10_4042_f0009.png 이미지

Fig. 5(b). NC values between the original retrieved 3D watermark from a Gaussian noisy model.

Second the robustness towards cropping attack is tested for different degree of cropping vertices like 15%, 20%, and 25%. The secret watermark is extracted from the attacked model. Precisely in the case of cropping, most of the research works has embedded the secret in different region to resist cropping attack, but the proposed work achieves a correlation coefficient above 0.5 for lower strength factor thus overcoming the process of repetition to resist cropping attack. Fig. 6 details the obtained PSNR values of the retrieved watermark after cropping the vertices.

E1KOBZ_2020_v14n10_4042_f0003.png 이미지

Fig. 6. PSNR of the generated watermark after cropping vertices

Similarly robustness against scaling attacks is analyzed using few factors a)scaling down x-axis by 0.5% b) scaling up y-axis with 1% c)scaling along z-axis with 1.5% d) mixed scaling where x-axis as 0.5%, y-axis as 1% and z-axis as 1.5%. Table 6 and Fig. 7 show the​​​​​​​ performance comparison between the proposed model and [20] to resist scaling attacks in terms of PSNR and NC detection ratio.

Table 6. Performance comparison of the proposed scheme to resist scaling attacks

E1KOBZ_2020_v14n10_4042_t0006.png 이미지

E1KOBZ_2020_v14n10_4042_f0004.png 이미지

Fig. 7. Performance comparison to counter scaling attacks for the proposed model in terms of detection ratio.

E1KOBZ_2020_v14n10_4042_f0005.png 이미지

Fig. 8. PSNR accuracy obtained for the existing systems and the proposed ACO-Weber Scheme

6. Conclusion

An optimized reliable ACO based Weber law watermarking scheme is proposed achieving a high robustness without losing imperceptibility. ACO attains an elite strength factor which achieved a good imperceptibility target. A watermark is generated from the original 3D model using the Weber Law. The generated 3D secret watermark is embedded into the host 3D mesh model. Embedding and extraction are achieved in the wavelet domain using the optimized strength factor. The achieved experimental results show good robustness towards different attacks including additive noise addition, cropping and scaling, thus demonstrating the efficiency of the algorithm. The ACO-Weber watermarking scheme exhibits good resistance towards various geometrical and non-geometrical attacks. Going forward, further analysis is called for to exploit the watermarking technique so as to embed and extract watermarks using blind schemes.

References

  1. Abdallah, Emad E., A. Ben Hamza, and Prabir Bhattacharya, "Spectral graph-theoretic approach to 3D mesh watermarking," in Proc. of graphics interface 2007. ACM, pp. 327-334, 2007.
  2. Metnon, N., and P. Wong, "Protecting multimedia content," Commun. ACM, 47.7, 35-43, 1998.
  3. Cox Ingemar J., Matthew L. Miller, and Jeffrey A. Bloom, "8 - Robust Watermarking," Digital watermarking, 241-277, 2002.
  4. Hartung, Frank, and Martin Kutter, "Multimedia watermarking techniques," Proceedings of the IEEE, 87.7, 1079-1107, 1999. https://doi.org/10.1109/5.771066
  5. Praun, Emil, Hugues Hoppe, and Adam Finkelstein, "Robust mesh watermarking," in Proc. of Siggraph, Vol. 99, pp. 49-56, 1999.
  6. Benedens, Oliver, and Christoph Busch, "Towards blind detection of robust watermarks in polygonal models," in Proc. of Computer Graphics Forum, Vol. 19, No. 3, pp. 199-208, 2000.
  7. Ohbuchi, Ryutarou, et al, "Watermarking 3D polygonal meshes in the mesh spectral domain," Graphics interface, Vol. 2001, pp. 9-18, 2001.
  8. Harte, Thomas, and Adrian G. Bors, "Watermarking 3D models," in Proc. of International Conference on Image Processing, Vol. 3, 2002.
  9. Cotting, Daniel, et al, "Robust watermarking of point-sampled geometry," in Proc. of Shape Modeling Applications, 2004. IEEE, 2004.
  10. Li, Li, et al, "Watermarking subdivision surfaces based on addition property of Fourier transform," in Proc. of the 2nd international conference on Computer graphics and interactive techniques in Australasia and South East Asia. ACM, pp. 46-49, 2004.
  11. Jian-qiu, Jin, et al, "Watermarking on 3D mesh based on spherical wavelet transform," Journal of Zhejiang University-Science A, 5.3, 251-258, 2004. https://doi.org/10.1631/jzus.2004.0251
  12. Kwon, Ki-Ryong, et al, "Watermarking for 3D polygonal meshes using normal vector distributions of each patch," in Proc. of 2003 International Conference on Image Processing (Cat. No. 03CH37429), Vol. 2, 2003.
  13. Wu, Jianhua, and Leif Kobbelt, "Efficient spectral watermarking of large meshes with orthogonal basis functions," The Visual Computer, 21.8-10, 848-857, 2005. https://doi.org/10.1007/s00371-005-0311-5
  14. Uccheddu, Francesca, Massimiliano Corsini, and Mauro Barni, "Wavelet-based blind watermarking of 3D models," in Proc. of the 2004 workshop on Multimedia and security. ACM, pp. 143-154, 2004.
  15. Garcia, Emmanuel, and Jean-Luc Dugelay, "Texture-based watermarking of 3D video objects," IEEE Transactions on Circuits and Systems for Video Technology, 13.8, 853-866, 2003. https://doi.org/10.1109/TCSVT.2003.815963
  16. Zafeiriou, Stefanos, Anastasios Tefas, and Ioannis Pitas, "Blind robust watermarking schemes for copyright protection of 3D mesh objects," IEEE Transactions on Visualization and Computer Graphics, 11.5, 596-607, 2005. https://doi.org/10.1109/TVCG.2005.71
  17. M. Dorigo, M. Birattari and T. Stutzle, "Ant colony optimization," IEEE Computational Intelligence Magazine, vol. 1, no. 4, pp. 28-39, Nov. 2006. https://doi.org/10.1109/MCI.2006.329691
  18. Makbol, Nasrin M., et al, "A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection," Information Sciences, 417, 381-400, 2017. https://doi.org/10.1016/j.ins.2017.07.026
  19. Dorigo, Marco, and Mauro Birattari, Ant colony optimization, Springer, Boston, MA, 2017.
  20. Jani Anbarasi, L., and Modigari Narendra, "Robust watermarking scheme using Weber Law for 3D mesh models," The Imaging Science Journal, 65.7, 409-417, 2017. https://doi.org/10.1080/13682199.2017.1359992
  21. Laouamer, Lamri, et al, "Robust watermarking scheme and tamper detection based on threshold versus intensity," Journal of Innovation in Digital Ecosystems, 2.1-2, 1-12, 2015. https://doi.org/10.1016/j.jides.2015.10.001
  22. Karni, Zachi, and Craig Gotsman, "Spectral compression of mesh geometry," in Proc. of the 27th annual conference on Computer graphics and interactive techniques. ACM Press/Addison-Wesley Publishing Co., pp. 279-286, 2000.
  23. Bors, Adrian G, "Watermarking mesh-based representations of 3-D objects using local moments," IEEE Transactions on Image processing, 15.3, 687-701, 2006. https://doi.org/10.1109/TIP.2005.863116
  24. Kuo, Chen-Tsung, et al, "A blind robust watermarking scheme for 3D triangular mesh models using 3d edge vertex detection," Asian Journal of Health and Information Sciences, 4.1, 36-63, 2009.
  25. Cignoni, Paolo, Claudio Rocchini, and Roberto Scopigno, "Metro: Measuring error on simplified surfaces," Computer Graphics Forum, Vol. 17. No. 2, pp. 167-174, 1998. https://doi.org/10.1111/1467-8659.00236
  26. Borah, S., Borah, B., "A Blind. Semi-Fragile 3D mesh Watermarking Algorithm Using Minimum Distortion Angle Quantization Index Modulation (3D-MDAQIM)," Arab J Sci Eng, 44, 3867-3882, 2019. https://doi.org/10.1007/s13369-018-03714-5
  27. Sagarika Borah, Bhogeswar Borah, "Watermarking Techniques for Three Dimensional (3D) Mesh Authentication in Spatial Domain," 3D Research, vol. 9, eptember 2018.
  28. Jang, HU., Choi, HY., Son, J. et al, "Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis," Multimedia Tools and Applications, Vol. 77, Issue 5, pp. 5685-5712, 2018. https://doi.org/10.1007/s11042-017-4483-6
  29. J. U. Hou, D. G. Kim and H. K. Lee, "Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact," IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2712-2725, Nov. 2017. https://doi.org/10.1109/TIFS.2017.2718482
  30. Raj, Benson, et al, "A New Transformation of 3D Models Using Chaotic Encryption Based on Arnold Cat Map," in Proc. of International Conference on Emerging Internetworking, Data & Web Technologies. Springer, Cham, pp. 322-332, 2019.
  31. Socha, Krzysztof, and Marco Dorigo, "Ant colony optimization for continuous domains," European journal of operational research, 185.3, 1155-1173, 2008. https://doi.org/10.1016/j.ejor.2006.06.046
  32. Ping Guo, Lin Zhu, "Ant Colony Optimization for Continuous Domains," in Proc. of 2012 8th International Conference on Natural Computation (ICNC 2012), 2012.
  33. Kai Wang Guillaume Lavou'e, Florence Denis and Attila Baskurt, "Three Dimensional Meshes Watermarking: Review and Attack- Centric Investigation," in Proc. of Conference on Information Hiding 2007, pp. 50-64, March 2007.
  34. Xiangui Kang, Jiwu Huang, Yun Q Shi, Yan Lin, "A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression," IEEE Transactions on Circuits and Systems for Video Technology, Vol 13, No. 8, pp. 776-786, Aug 2003. https://doi.org/10.1109/TCSVT.2003.815957
  35. S. Vallet and R. Prost, "Wavelet- Based Multiresolution Analysis of Irregular Surface Meshes," IEEE trans. On Visualization and Computer Graphics, vol 10, no. 2, pp. 113-122, Mar. Apr. 2004.
  36. M. S. Kim, S. Vallete, H. Y. Jung and R. Prost, "Watermarking of 3D Irregular Meshes based on Wavelet Multiresolution Analysis," in Proc. of International workshop on Digital Watermarking (IWDW'05), pp. 313-324, 2005.
  37. Xuefang Li, Randing Wang, "A Video Watermarking Scheme based on 3D DWT and Neural Network," in Proc. of Ninth IEEE International Symposium on Multimedia 2007- workshops, 2007.
  38. Shi-Chun Mei, Ren-Hou Li, Hong-Mei Dang, Yun-Kuan, Wang, "Decision of Image Watermarking Strength based on Artificial Neural Network," in Proc. of 9th International Conference on Neural Information Processing, ICONIP' 02, vol. 5, pp. 2430-2434, 18-22 Nov. 2002.
  39. Mukesh C. Motwani, Bobby D. Bryant, Sergiu M. Dascalu, and Frederick C. Harris, Jr., "3d Multimedia Protection Using Artificial Neural Network," in Proc. of IEEE CCNC 2010 proceedings, 2010.

Cited by

  1. Robust 3D mesh zero-watermarking based on spherical coordinate and Skewness measurement vol.80, pp.17, 2020, https://doi.org/10.1007/s11042-021-10878-0