Watermarking three-dimensional polygonal models

被引:143
作者
Ohbuchi, R [1 ]
Masuda, H [1 ]
Aono, M [1 ]
机构
[1] IBM Corp, Tokyo Res Lab, Kanagawa 242, Japan
来源
ACM MULTIMEDIA 97, PROCEEDINGS | 1997年
关键词
three-dimensional geometrical modeling; three-dimensional graphics; data hiding; digital watermarking; steganography; copyright protection; digital fingerprinting;
D O I
10.1145/266180.266377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advantages of digital media such as the Internet and CD-ROMs lie in the fact that their contents are easy to duplicate, edit, and distribute. These advantages, however, are double-edged swords, because they also facilitate unauthorized use of such contents. Data embedding, which places information into the contents themselves, is an approach to address this issue. Embedded information can be used, for example, for copyright protection, theft deterrence, and inventory. This paper discusses our work on embedding data into three-dimensional (3D) polygonal models of geometry. Given objects consisting of points, lines, polygons, or curved surfaces, the data embedding algorithms described in this paper produce polygonal models with data embedded. Data are placed into 3D polygonal models by modifying either their vertex coordinates, their vertex topology (connectivity), or both. A brief review of related work and a description of the requirements of data embedding is followed by a discussion of where, and by what fundamental methods, data can be embedded into 3D polygonal models. The paper then presents data-embedding algorithms, with examples, based on these fundamental methods.
引用
收藏
页码:261 / 272
页数:12
相关论文
共 15 条
[1]  
[Anonymous], JTC1 ISOIEC
[2]  
BRAUDWAY G, 1996, TC20336 IBM
[3]  
COX IJ, 1995, 9510 NEC RES I
[4]  
Farin G, 1996, Curves and Surfaces for CAGD, Fourth Edition: A Practical Guide, V4th
[5]  
Hartung F, 1997, LECT NOTES COMPUT SC, V1242, P423, DOI 10.1007/BFb0037367
[6]  
MASUDA H, 1996, THESIS U TOKYO
[7]  
OROURKE J, 1994, COMPUTATIONAL GEOM C
[8]  
PFITZMANN B, 1996, RZ2881 IBM
[9]  
Schneier Bruce, 1996, APPL CRYPTOGRAPHY
[10]  
SMITH JR, 1996, LECT NOTES COMPUTER, V1174, P207