A new fragile mesh watermarking algorithm for authentication

Hao Tian Wu, Yiu Ming CHEUNG

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

3 Citations (Scopus)


In this paper, we propose a new fragile watermarking algorithm based on the global characteristics of the mesh geometry to authenticate 3D mesh models. In our method, a sequence of data bits is adaptively embedded into the mesh model by properly adjusting the vertex positions, and the bit information can be blindly extracted from the watermarked mesh model using a key. The embedding process is adaptive to the mesh model so that the watermarked mesh is perceptually indistinguishable from the original. We show that the embedded watermark is invariant to affine transformation but sensitive to other operations. Besides, the embedding strength is adjustable and can be controlled to a certain extent that even a trivial tampering with the watermarked mesh would lead the watermark signal to change. Therefore, unauthorized modifications of the mesh models can be detected and estimated.

Original languageEnglish
Title of host publicationSecurity and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference
EditorsSihan Qing, Eiji Okamoto, Hiroshi Yoshiura, Ryoichi Sasaki
PublisherSpringer New York LLC
Number of pages15
ISBN (Print)9780387256580
Publication statusPublished - 2005
EventIFIP TC11 20th International Information Security Conference, IFIP/SEC2005 - Chiba, Japan
Duration: 30 May 20051 Jun 2005

Publication series

NameIFIP Advances in Information and Communication Technology
ISSN (Print)1868-4238


ConferenceIFIP TC11 20th International Information Security Conference, IFIP/SEC2005

Scopus Subject Areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

User-Defined Keywords

  • 3D models
  • dither modulation
  • fragile watermarking
  • mesh authentication


Dive into the research topics of 'A new fragile mesh watermarking algorithm for authentication'. Together they form a unique fingerprint.

Cite this