Robust 3D object watermarking scheme using shape features for copyright protection.

PeerJ Comput Sci

Department of Computer Science, Faculty of Computers and Information, South Valley University, Qena, Egypt.

Published: April 2024

This article utilizes the discrete wavelet transformation to introduce an advanced 3D object watermarking model depending on the characteristics of the object's vertices. The model entails two different phases: integration and extraction. In the integration phase, a novel technique is proposed, which embeds the secret grayscale image three times using both the encrypted pixels and the vertices' coefficients of the original 3D object. In the extraction phase, the secret image is randomly extracted and recaptured using the inverse phase of the integration technique. Four common 3D objects (Stanford bunny, horse, cat figurine, and angel), with different faces and different vertices, are used in this model as a dataset. The performance of the proposed technique is evaluated using different metrics to show its superiority in terms of execution time and imperceptibility. The results demonstrated that the proposed method achieved high imperceptibility and transparency with low distortion. Moreover, the extracted secret grayscale image perfectly matched the original watermark with a structural similarity index of 1 for all testing models.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11157590PMC
http://dx.doi.org/10.7717/peerj-cs.2020DOI Listing

Publication Analysis

Top Keywords

object watermarking
8
vertices model
8
secret grayscale
8
grayscale image
8
robust object
4
watermarking scheme
4
scheme shape
4
shape features
4
features copyright
4
copyright protection
4

Similar Publications

Robust 3D object watermarking scheme using shape features for copyright protection.

PeerJ Comput Sci

April 2024

Department of Computer Science, Faculty of Computers and Information, South Valley University, Qena, Egypt.

This article utilizes the discrete wavelet transformation to introduce an advanced 3D object watermarking model depending on the characteristics of the object's vertices. The model entails two different phases: integration and extraction. In the integration phase, a novel technique is proposed, which embeds the secret grayscale image three times using both the encrypted pixels and the vertices' coefficients of the original 3D object.

View Article and Find Full Text PDF

A Blind Watermarking Model of the 3D Object and the Polygonal Mesh Objects for Securing Copyright.

Comput Intell Neurosci

December 2021

Department of Computer Science, Faculty of Computers and Information, South Valley University, Qena, Egypt.

In this paper, we propose a novel model for 3D object watermarking. The proposed method is based on the properties of the discrete cosine transform (DCT) of the 3D object vertices to embed a secret grayscale image three times. The watermarking process takes place by using the vertices coefficients and the encrypted image pixels.

View Article and Find Full Text PDF

Rapid and Blind Watermarking Approach of the 3D Objects Using QR Code Images for Securing Copyright.

Comput Intell Neurosci

November 2021

Department of Mathematics, Faculty of Science, Al-Baha University, Al-Bahah, Saudi Arabia.

Watermarking techniques in a wide range of digital media was utilized as a host cover to hide or embed a piece of information message in such a way that it is invisible to a human observer. This study aims to develop an enhanced rapid and blind method for producing a watermarked 3D object using QR code images with high imperceptibility and transparency. The proposed method is based on the spatial domain, and it starts with converting the 3D object triangles from the three-dimensional Cartesian coordinate system to the two-dimensional coordinates domain using the corresponding transformation matrix.

View Article and Find Full Text PDF

In this paper, we tackle the problem of categorizing and identifying cross-depicted historical motifs using recent deep learning techniques, with aim of developing a content-based image retrieval system. As cross-depiction, we understand the problem that the same object can be represented (depicted) in various ways. The objects of interest in this research are watermarks, which are crucial for dating manuscripts.

View Article and Find Full Text PDF

Radar Data Integrity Verification Using 2D QIM-Based Data Hiding.

Sensors (Basel)

September 2020

Department of Electrical and Computer Engineering, University of Michigan-Dearborn, Dearborn, MI 48128, USA.

The modern-day vehicle is evolved in a cyber-physical system with internal networks (controller area network (CAN), Ethernet, etc.) connecting hundreds of micro-controllers. From the traditional core vehicle functions, such as vehicle controls, infotainment, and power-train management, to the latest developments, such as advanced driver assistance systems (ADAS) and automated driving features, each one of them uses CAN as their communication network backbone.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!