TY - GEN
T1 - Data hiding on 3D meshes based on dither modulation
AU - Wu, Hao Tian
AU - CHEUNG, Yiu Ming
AU - Wang, Yuping
N1 - Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2006
Y1 - 2006
N2 - In this paper, data hiding on 3D meshes is investigated based on dither modulation. We present two algorithms to embed the data imperceptibly into polygonal meshes by modulating the distance from the mesh surface to mesh centroid and the one from a vertex to the centroid of its traversed neighbors, respectively. In these two algorithms, the embedded data are invariant to rotation, uniformly scaling and translation, as well as slight distortion of the cover mesh to a certain degree. On the other hand, if the cover mesh is maliciously modified, the embedded data will be changed accordingly so that the proposed algorithms can be utilized for authentication applications. Further, to improve the security of using dither modulation, a component is added into the modulation to make the quantization step statistically undetectable. The two algorithms are compared in terms of complexity, capacity and security, and their common characteristics are discussed as well. Experimental results Show their efficacies. Copyright - World Automation Congress (WAC) 2006.
AB - In this paper, data hiding on 3D meshes is investigated based on dither modulation. We present two algorithms to embed the data imperceptibly into polygonal meshes by modulating the distance from the mesh surface to mesh centroid and the one from a vertex to the centroid of its traversed neighbors, respectively. In these two algorithms, the embedded data are invariant to rotation, uniformly scaling and translation, as well as slight distortion of the cover mesh to a certain degree. On the other hand, if the cover mesh is maliciously modified, the embedded data will be changed accordingly so that the proposed algorithms can be utilized for authentication applications. Further, to improve the security of using dither modulation, a component is added into the modulation to make the quantization step statistically undetectable. The two algorithms are compared in terms of complexity, capacity and security, and their common characteristics are discussed as well. Experimental results Show their efficacies. Copyright - World Automation Congress (WAC) 2006.
KW - Authentication
KW - Dither modulation
KW - Mesh integrity
KW - Rst transformations
KW - Semi-fragile watermarking
UR - http://www.scopus.com/inward/record.url?scp=36849048640&partnerID=8YFLogxK
U2 - 10.1109/WAC.2006.375936
DO - 10.1109/WAC.2006.375936
M3 - Conference proceeding
AN - SCOPUS:36849048640
SN - 1889335339
SN - 9781889335339
T3 - 2006 World Automation Congress, WAC'06
BT - 2006 World Automation Congress, WAC'06
PB - IEEE Computer Society
T2 - 2006 World Automation Congress, WAC'06
Y2 - 24 June 2006 through 26 June 2006
ER -