CN102999881A - Producing method and extraction method of fragile watermarks of three-dimensional model with robustness - Google Patents
Producing method and extraction method of fragile watermarks of three-dimensional model with robustness Download PDFInfo
- Publication number
- CN102999881A CN102999881A CN2012105638626A CN201210563862A CN102999881A CN 102999881 A CN102999881 A CN 102999881A CN 2012105638626 A CN2012105638626 A CN 2012105638626A CN 201210563862 A CN201210563862 A CN 201210563862A CN 102999881 A CN102999881 A CN 102999881A
- Authority
- CN
- China
- Prior art keywords
- vertex
- watermark
- summit
- binary
- coordinate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a producing method and an extraction method of fragile watermarks of a three-dimensional model with robustness. The producing method includes: 1) partitioning and scrambling original binary watermark images; 2) manufacturing sorted vertex sequences for embedding in the watermark images; 3) generating novel binary watermarks and novel hashed value blocks; and 4) embedding the novel binary watermarks and the novel hashed value blocks in the vertex sequences respectively, and obtain the three-dimensional model with embedded watermark images. The extraction method comprises: 1) judging whether the watermarks are imbedded in vertexes; 2) obtaining binary watermarks with inserted 0 and corresponding hashed values when the watermarks are embedded; 3) judging suspicious vertexes; 4) obtaining the scrambled binary watermark images during embedding; and 5) performing anti-scrambling on the obtained scrambled binary watermark images, and finishing extraction of the binary watermark images. The producing method and the extraction method of fragile watermarks of the three-dimensional model with the robustness are free of blocking effect and good in robustness, can detect any change of the model during extraction, and can locate tampered areas.
Description
Technical field
The present invention relates to video image information safety technique field, relate in particular to a kind of three-dimensional model fragile watermark production method and extracting method thereof with robustness.
Background technology
In recent years, the achievement of relevant digital watermarking both at home and abroad increases day by day.Since Japanese Ohbuchi in 1997 proposed the three-dimensional model digital watermark for the first time, the research of three-dimensional model digital watermark technology had obtained very great development.Yet, the most paper is all about robust digital watermark, only having the minority achievement is Fragile Watermark Algorithm about 3D model integrity checking aspect, and in fact, the Fragile Watermark Algorithm of first piece of 3D model integrity checking aspect is that Yeo and Yeung propose.The method of Fornaro and Sanna reference 2D fragile watermark has proposed the 3D PKI Fragile Watermark Algorithm of CSG model.
All only have one owing to carrying out the Hash watermark information of processing and the information bit of storing the Hash functional value, this Hash function that has caused using in some achievements can only be h (w
i)=w
i, h (w
i)=0.5w
iDeng some simple Hash functions, these simple Hash functions are easy to just can guess out their hash value, be easy to they are implemented to attack.Process if the watermark information that can process carries out Hash by piece, the hash value that obtains is also stored by piece, utilize simultaneously some safe hash algorithms such as MD5 just can more effective opposing attack.
Summary of the invention
In order to overcome the deficiencies in the prior art, the purpose of this invention is to provide a kind of hidden performance is good, reliability is high, have simultaneously robustness three-dimensional model fragile watermark production method and extracting method thereof.
For achieving the above object, technical scheme of the present invention is: a kind of three-dimensional model fragile watermark production method with robustness, comprise the embedding of binary bitmap, and it may further comprise the steps:
1) original binary bitmap is carried out piecemeal and process, adopt identical scramble template to carry out scramble to each block image simultaneously, and repeat n arrangement, obtain the binary bitmap W=(w behind the scramble
1, w
2..., w
n), described scramble is: the information order of image is upset, the a pixel is moved on the position of b pixel, the b pixel moves on the position of c pixel ... make it be transformed into the image of disorderly and unsystematic almost illegible, select simultaneously the grid image M (V of the three-dimensional model of watermarking images to be embedded, C), wherein V is the set on summit among the grid image M of three-dimensional model, and C is the annexation on summit among the grid image M of three-dimensional model;
2) the random summit V (x among the selected V
1, x
2, x
3) in order to the embed watermark image, and will select the summit of embed watermark image and the summit adjacent with it according to the size ordering of apex coordinate, the vertex sequence V after obtaining sorting
i(x
1, x
2, x
3), described ordering rule is as follows:
First according to x
1Coordinate size ordering, if x
1Coordinate is identical, then according to x
2Coordinate size ordering, if x
1And x
2Coordinate all identical, then according to x
3Coordinate size ordering;
3) to the binary bitmap W=(w behind the scramble
1, w
2..., w
n) insert 0 step, described 0 step of inserting is: as binary bitmap W=(w
1, w
2..., w
n) occur continuous 51 o'clock, then inserting one 0 thereafter, obtain inserting binary bitmap W ' after 0=(w '
1, w '
2..., w '
n);
4) to insert binary bitmap W ' after 0=(w '
1, w '
2..., w '
n) carry out piecemeal according to 128 as a watermark block, and each watermark piecemeal is carried out the Hash function encrypting of MD5 according to following rule, and the indications of adding 01111110 before each watermark piecemeal is in order to represent the beginning of piece:
If the r piece is W '
r=(w '
R1, w '
R2..., w '
R128), then
P wherein
s rBe hashed value, S is hash length, and S=128; At the r piece W ' with 128
r=(w '
R1, w '
R2..., w '
R128) indications of front adding 01111110, then produce the new binary watermarking W with 136 "
r
W″
r=(0,1,1,1,1,1,1,0,w′
r1,w′
r2,...,w′
rn)
Simultaneously at 128
The front add 01111110 in order to represent the indications of hashed value BOB(beginning of block), then produce the new hashed value piece P ' also have 136
r
Equally all be 136 new binary watermarking W "
rWith new hashed value piece P '
rBi-level digital on the correspondence position form 136 to (w '
i, p
i);
5) incite somebody to action (w '
i, p
i) deposit vertex sequence V after the ordering in according to following embedding method respectively successively
i(x
1, x
2, x
3) the x of correspondence
2And x
3In, namely obtaining the three-dimensional model of embed watermark image, described embedding method is:
For vertex sequence V
i(x
1, x
2, x
3) in come top minimum vertex and be designated as V '
1(x '
1, x '
2, x '
3), then its adjacent vertex and minimum vertex V '
1(x '
1, x '
2, x '
3) the average of coordinate difference of respective coordinates
Satisfy following relation:
Wherein N (v) is vertex v
i(x
1, x
2, x
3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v),
For given key parameter N, when j=1, so
And vertex v
iBe designated as d
I1=| x
1|, following relation is then arranged:
If in vertex v
i(x
1, x
2, x
3) embed watermark, the merchant Q of division arranged
IjBe necessary for odd number, if namely
Be odd number, then
And R
I1=d
I1%S
I1If
Be not odd number, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
If in vertex v
i(x
1, x
2, x
3) there are not an embed watermark, the merchant Q of division
IjBe necessary for even number, if namely
Be even number, then
And R
I1=d
I1%S
I1If
Be not even number, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
Also namely insert vertex v after the watermark '
iD '
I1Satisfy following relational expression:
Make M=Q
Ij%2 is by adjusting v
i(x
1, x
2, x
3) x
1Coordinate changes d
I1, also namely:
For given key parameter N,
And vertex v
iBe designated as d
Ij=| x
j|, if j=2,3, then it all satisfies following relation:
(w
i, p
i) be to embed x
2, x
3Watermark, if w
i, p
i1, so must Q
Ij%2=1 also is the merchant Q of division
IjMust be odd number, that is to say if
Be odd number, then
And R
I1=d
I1%S
I1
Q wherein
IjThe merchant of division, R
I1It is remainder;
If w
i, p
i0, so must Q
Ij%2=0 also is the merchant Q of division
IjMust be even number, that is to say if
Be even number, then
And R
I1=d
I1%S
I1If
Be not even number and R
Ij>S
Ij/ 2, then
And R
I1=d
I1%S
I1If
Be not even number and R
Ij≤ S
Ij/ 2, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
By adjusting v
i(x
1, x
2, x
3) x
jCoordinate changes d
Ij, namely satisfy:
Relation.
The present invention also provides a kind of extracting method with three-dimensional model fragile watermark of robustness, and it may further comprise the steps:
1) for vertex v '
i(x
1, x
2, x
3), its adjacent vertex and minimum vertex V '
1(x '
1, x '
2, x '
3) the average of coordinate difference of respective coordinates
Satisfy following relation:
Wherein N (v) is vertex v
i(x
1, x
2, x
3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v);
2) judge each vertex v
i(x
1, x
2, x
3) whether having embedded watermark, its judgment rule is: given key parameter N during for embed watermark, note
For vertex v '
iNote d '
I1=| x '
1|, so
R '
I1=d '
I1%S '
I1Q ' wherein
I1The merchant of division, R '
I1Remainder, if Q
I1Be odd number, there is embed watermark on this summit so, otherwise this summit does not have embed watermark;
3) summit of embed watermark is arranged for each, from its coordinate x
2Middle extraction w ' is from coordinate x
3Middle extraction p ', given key parameter N during for embed watermark, note
For vertex v '
iBe designated as d '
Ij=| x '
j|,
If j=2,3; Then
R '
Ij=d '
Ij%S '
Ij, w '=Q '
I2%2, p '=Q '
I3%2, wherein Q '
IjThe merchant of division, R '
IjRemainder,
All w' and p' form the W ' that contains identifier 01111110, P ', and with W ', then P ' piecemeal removes respectively block identifier 01111110 by block identifier 01111110, the binary watermarking W ' after slotting 0 when the obtaining embed watermark
rAnd corresponding hashed value P '
r
4) judge suspicious summit, its judgment rule is: calculate P
r=H (W '
r), if P
rUnequal to P '
rThen with these summits and adjacent summit thereof as suspicious summit;
5) the binary watermarking W ' after 0 of inserting to obtaining
r0 method of inserting when embedding is carried out inverse operation, in order to remove insert inserted in 0 o'clock 0, the binary bitmap when obtaining embedding behind the scramble;
6) to obtaining the unrest that is inverted of binary bitmap behind the scramble, namely obtain the original binary bitmap that embeds, finish the extraction of binary bitmap.
The present invention adopts above technical scheme, when at first embedding, we have carried out piecemeal and scramble to original binary bitmap, after realizing embedding algorithm, original binary bitmap blocking effect can not occur, then come watermark information is carried out piecemeal with the method for the indications of inserting special character 01111110, then adopt safe Hash function MD5 that watermark block is encrypted, increase the robustness that watermarking images embeds.Use the three-dimensional model of the method embedding of this embed watermark image, and utilize the method for extraction watermarking images of the present invention, can detect any change to model, and can orient the zone of distorting.
Description of drawings
The present invention is further detailed explanation below in conjunction with the drawings and specific embodiments:
Fig. 1 is the schematic flow sheet that the present invention has the three-dimensional model fragile watermark production method of robustness;
Fig. 2 is the schematic flow sheet that the present invention has the three-dimensional model fragile watermark extracting method of robustness.
Embodiment
Shown in Fig. 1 or 2, technical scheme of the present invention is: a kind of three-dimensional model fragile watermark production method with robustness, comprise the embedding of binary bitmap, and it may further comprise the steps:
1) original binary bitmap is carried out piecemeal and process, adopt identical scramble template to carry out scramble to each block image simultaneously, and repeat n arrangement, obtain the binary bitmap W=(w behind the scramble
1, w
2..., w
n), described scramble is: the information order of image is upset, the a pixel is moved on the position of b pixel, the b pixel moves on the position of c pixel ... make it be transformed into the image of disorderly and unsystematic almost illegible, select simultaneously the grid image M (V of the three-dimensional model of watermarking images to be embedded, C), wherein V is the set on summit among the grid image M of three-dimensional model, and C is the annexation on summit among the grid image M of three-dimensional model;
2) the random summit V (x among the selected V
1, x
2, x
3) in order to the embed watermark image, and will select the summit of embed watermark image and the summit adjacent with it according to the size ordering of apex coordinate, the vertex sequence V after obtaining sorting
i(x
1, x
2, x
3), described ordering rule is as follows:
First according to x
1Coordinate size ordering, if x
1Coordinate is identical, then according to x
2Coordinate size ordering, if x
1And x
2Coordinate all identical, then according to x
3Coordinate size ordering;
3) to the binary bitmap W=(w behind the scramble
1, w
2..., w
n) insert 0 step, described 0 step of inserting is: as binary bitmap W=(w
1, w
2..., w
n) occur continuous 51 o'clock, then inserting one 0 thereafter, obtain inserting binary bitmap W ' after 0=(w '
1, w '
2..., w '
n);
4) to insert binary bitmap W ' after 0=(w '
1, w '
2..., w '
n) carry out piecemeal according to 128 as a watermark block, and each watermark piecemeal is carried out the Hash function encrypting of MD5 according to following rule, and the indications of adding 01111110 before each watermark piecemeal is in order to represent the beginning of piece:
If the r piece is W '
r=(w '
R1, w '
R2..., w '
R128), then
P wherein
s rBe hashed value, S is hash length, and S=128; At the r piece W ' with 128
r=(w '
R1, w '
R2..., w '
R128) indications of front adding 01111110, then produce the new binary watermarking W with 136 "
r
W″
r=(0,1,1,1,1,1,1,0,w′
r1,w′
r2,...,w′
rn)
Simultaneously at 128
The front add 01111110 in order to represent the indications of hashed value BOB(beginning of block), then produce the new hashed value piece P ' also have 136
r
Equally all be 136 new binary watermarking W "
rWith new hashed value piece P '
rBi-level digital on the correspondence position form 136 to (w '
i, p
i);
5) incite somebody to action (w '
i, p
i) deposit vertex sequence V after the ordering in according to following embedding method respectively successively
i(x
1, x
2, x
3) the x of correspondence
2And x
3In, namely obtaining the three-dimensional model of embed watermark image, described embedding method is:
For vertex sequence V
i(x
1, x
2, x
3) in come top minimum vertex and be designated as V '
1(x '
1, x '
2, x '
3), then its adjacent vertex and minimum vertex V '
1(x '
1, x '
2, x '
3) the average of coordinate difference of respective coordinates
Satisfy following relation:
Wherein N (v) is vertex v
i(x
1, x
2, x
3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v),
For given key parameter N, when j=1, so
And vertex v
iBe designated as d
I1=| x
1|, following relation is then arranged:
If in vertex v
i(x
1, x
2, x
3) embed watermark, the merchant Q of division arranged
IjBe necessary for odd number, if namely
Be odd number, then
And R
I1=d
I1%S
I1If
Be not odd number, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
If in vertex v
i(x
1, x
2, x
3) there are not an embed watermark, the merchant Q of division
IjBe necessary for even number, if namely
Be even number, then
And R
I1=d
I1%S
I1If
Be not even number, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
Also namely insert vertex v after the watermark '
iD '
I1Satisfy following relational expression:
Make M=Q
Ij%2 is by adjusting v
i(x
1, x
2, x
3) x
1Coordinate changes d
I1, also namely:
For given key parameter N,
And vertex v
iBe designated as d
Ij=| x
j|, if j=2,3, then it all satisfies following relation:
(w
i, p
i) be to embed x
2, x
3Watermark, if w
i, p
i1, so must Q
Ij%2=1 also is the merchant Q of division
IjMust be odd number, that is to say if
Be odd number, then
And R
I1=d
I1%S
I1
Q wherein
IjThe merchant of division, R
I1It is remainder;
If w
i, p
i0, so must Q
Ij%2=0 also is the merchant Q of division
IjMust be even number, that is to say if
Be even number, then
And R
I1=d
I1%S
I1If
Be not even number and R
Ij>S
Ij/ 2, then
And R
I1=d
I1%S
I1If
Be not even number and R
Ij≤ S
Ij/ 2, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
By adjusting v
i(x
1, x
2, x
3) x
jCoordinate changes d
Ij, namely satisfy:
Relation.
The present invention also provides a kind of extracting method with three-dimensional model fragile watermark of robustness, and it may further comprise the steps:
1) for vertex v '
i(x
1, x
2, x
3), its adjacent vertex and minimum vertex V '
1(x '
1, x '
2, x '
3) the average of coordinate difference of respective coordinates
Satisfy following relation:
Wherein N (v) is vertex v
i(x
1, x
2, x
3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v);
2) judge each vertex v
i(x
1, x
2, x
3) whether having embedded watermark, its judgment rule is: given key parameter N during for embed watermark, note
For vertex v '
iNote d '
I1=| x '
1|, so
R '
I1=d '
I1%S '
I1Q ' wherein
I1The merchant of division, R '
I1Remainder, if Q
I1Be odd number, there is embed watermark on this summit so, otherwise this summit does not have embed watermark;
3) summit of embed watermark is arranged for each, from its coordinate x
2Middle extraction w ' is from coordinate x
3Middle extraction p ', given key parameter N during for embed watermark, note
For vertex v '
iBe designated as d '
Ij=| x '
j|,
If j=2,3; Then
R '
Ij=d '
Ij%S '
Ij, w '=Q '
I2%2, p '=Q '
I3%2, wherein Q '
IjThe merchant of division, R '
IjRemainder,
All w' and p' form the W ' that contains identifier 01111110, P ', and with W ', then P ' piecemeal removes respectively block identifier 01111110 by block identifier 01111110, the binary watermarking W ' after slotting 0 when the obtaining embed watermark
rAnd corresponding hashed value P '
r
4) judge suspicious summit, its judgment rule is: calculate P
r=H (W '
r), if P
rUnequal to P '
rThen with these summits and adjacent summit thereof as suspicious summit;
5) the binary watermarking W ' after 0 of inserting to obtaining
r0 method of inserting when embedding is carried out inverse operation, in order to remove insert inserted in 0 o'clock 0, the binary bitmap when obtaining embedding behind the scramble;
6) to obtaining the unrest that is inverted of binary bitmap behind the scramble, namely obtain the original binary bitmap that embeds, finish the extraction of binary bitmap.
Claims (2)
1. have the three-dimensional model fragile watermark production method of robustness, comprise the embedding of binary bitmap, it is characterized in that: it may further comprise the steps:
1) original binary bitmap is carried out piecemeal and process, adopt identical scramble template to carry out scramble to each block image simultaneously, and repeat n arrangement, obtain the binary bitmap W=(w behind the scramble
1, w
2..., w
n), described scramble is: the information order of image is upset, the a pixel is moved on the position of b pixel, the b pixel moves on the position of c pixel ... make it be transformed into the image of disorderly and unsystematic almost illegible, select simultaneously the grid image M (V of the three-dimensional model of watermarking images to be embedded, C), wherein V is the set on summit among the grid image M of three-dimensional model, and C is the annexation on summit among the grid image M of three-dimensional model;
2) the random summit V (x among the selected V
1, x
2, x
3) in order to the embed watermark image, and will select the summit of embed watermark image and the summit adjacent with it according to the size ordering of apex coordinate, the vertex sequence V after obtaining sorting
i(x
1, x
2, x
3), described ordering rule is as follows:
First according to x
1Coordinate size ordering, if x
1Coordinate identical, then according to x
2Coordinate size ordering, if x
1And x
2Coordinate all identical, then according to x
3Coordinate size ordering;
3) to the binary bitmap W=(w behind the scramble
1, w
2..., w
n) insert 0 step, described 0 step of inserting is: as binary bitmap W=(w
1, w
2..., w
n) occur continuous 51 o'clock, then inserting one 0 thereafter, obtain inserting binary bitmap W ' after 0=(w '
1, w '
2..., w '
n);
4) to insert binary bitmap W ' after 0=(w '
1, w '
2..., w '
n) carry out piecemeal according to 128 as a watermark block, and each watermark piecemeal is carried out the Hash function encrypting of MD5 according to following rule, and the indications of adding 01111110 before each watermark piecemeal is in order to represent the beginning of piece:
If the r piece is W '
r=(w '
R1, w '
R2..., w '
R128), then
P wherein
s rBe hashed value, S is hash length, and S=128; At the r piece W ' with 128
r=(w '
R1, w '
R2..., w '
R128) indications of front adding 01111110, then produce the new binary watermarking W with 136 "
r
W″
r=(0,1,1,1,1,1,1,0,w′
r1,w′
r2,...,w′
rn)
Simultaneously at 128
The front add 01111110 in order to represent the indications of hashed value BOB(beginning of block), then produce the new hashed value piece P ' also have 136
r
Equally all be 136 new binary watermarking W "
rWith new hashed value piece P '
rBi-level digital on the correspondence position form 136 to (w '
i, p
i);
5) incite somebody to action (w '
i, p
i) deposit vertex sequence V after the ordering in according to following embedding method respectively successively
i(x
1, x
2, x
3) the x of correspondence
2And x
3In, namely obtaining the three-dimensional model of embed watermark image, described embedding method is:
For vertex sequence V
i(x
1, x
2, x
3) in come top minimum vertex and be designated as V '
1(x '
1, x '
2, x '
3), then its adjacent vertex and minimum vertex V '
1(x '
1, x '
2, x '
3) the average of coordinate difference of respective coordinates
Satisfy following relation:
Wherein N (v) is vertex v
i(x
1, x
2, x
3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v),
For given key parameter N, when j=1, so
And vertex v
iBe designated as d
I1=| x
1|, following relation is then arranged:
If in vertex v
i(x
1, x
2, x
3) embed watermark, the merchant Q of division arranged
IjBe necessary for odd number, if namely
Be odd number, then
And R
I1=d
I1%S
I1If
Be not odd number, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
If in vertex v
i(x
1, x
2, x
3) there are not an embed watermark, the merchant Q of division
IjBe necessary for even number, if namely
Be even number, then
And R
I1=d
I1%S
I1If
Be not even number, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
Also namely insert vertex v after the watermark '
iD '
I1Satisfy following relational expression:
Make M=Q
Ij%2 is by adjusting v
i(x
1, x
2, x
3) x
1Coordinate changes d
I1, also namely:
For given key parameter N,
And vertex v
iBe designated as d
Ij=| x
j|, if j=2,3, then it all satisfies following relation:
(w
i, p
i) be to embed x
2, x
3Watermark, if w
i, p
i1, so must Q
Ij%2=1 also is the merchant Q of division
IjMust be odd number, that is to say if
Be odd number, then
And R
I1=d
I1%S
I1
Q wherein
IjThe merchant of division, R
I1It is remainder;
If w
i, p
i0, so must Q
Ij%2=0 also is the merchant Q of division
IjMust be even number, that is to say if
Be even number, then
And R
I1=d
I1%S
I1
If
Be not even number and R
Ij>S
Ij/ 2, then
And R
I1=d
I1%S
I1If
Be not even number and R
Ij≤ S
Ij/ 2, then
And R
I1=d
I1%S
I1, Q wherein
IjThe merchant of division, R
I1It is remainder;
By adjusting v
i(x
1, x
2, x
3) x
jCoordinate changes d
Ij, namely satisfy:
Relation.
2. have the extracting method of the three-dimensional model fragile watermark of robustness, it is characterized in that: it may further comprise the steps:
1) for vertex v '
i(x
1, x
2, x
3), its adjacent vertex and minimum vertex V '
1(x '
1, x '
2, x '
3) the average of coordinate difference of respective coordinates
Satisfy following relation:
Wherein N (v) is vertex v
i(x
1, x
2, x
3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v);
2) judge each vertex v
i(x
1, x
2, x
3) whether having embedded watermark, its judgment rule is: given key parameter N during for embed watermark, note
For vertex v '
iNote d '
I1=| x '
1|, so
R '
I1=d '
I1%S '
I1Q ' wherein
I1The merchant of division, R '
I1Remainder, if Q
I1Be odd number, there is embed watermark on this summit so, otherwise this summit does not have embed watermark;
3) summit of embed watermark is arranged for each, from its coordinate x
2Middle extraction w ' is from coordinate x
3Middle extraction p ', given key parameter N during for embed watermark, note
For vertex v '
iBe designated as d '
Ij=| x '
j|,
If j=2,3; Then
R '
Ij=d '
Ij%S '
Ij, w '=Q '
I2%2, p '=Q '
I3%2, wherein Q '
IjThe merchant of division, R '
IjRemainder,
All w' and p' form the W' that contains identifier 01111110, P', and with W ', then P ' piecemeal removes respectively block identifier 01111110 by block identifier 01111110, the binary watermarking W ' after slotting 0 when the obtaining embed watermark
rAnd corresponding hashed value P '
r
4) judge suspicious summit, its judgment rule is: calculate P
r=H (W '
r), if P
rUnequal to P '
rThen with these summits and adjacent summit thereof as suspicious summit;
5) the binary watermarking W ' after 0 of inserting to obtaining
r0 method of inserting when embedding is carried out inverse operation, in order to remove insert inserted in 0 o'clock 0, the binary bitmap when obtaining embedding behind the scramble;
6) to obtaining the unrest that is inverted of binary bitmap behind the scramble, namely obtain the original binary bitmap that embeds, finish the extraction of binary bitmap.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105638626A CN102999881A (en) | 2012-12-20 | 2012-12-20 | Producing method and extraction method of fragile watermarks of three-dimensional model with robustness |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105638626A CN102999881A (en) | 2012-12-20 | 2012-12-20 | Producing method and extraction method of fragile watermarks of three-dimensional model with robustness |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102999881A true CN102999881A (en) | 2013-03-27 |
Family
ID=47928419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012105638626A Pending CN102999881A (en) | 2012-12-20 | 2012-12-20 | Producing method and extraction method of fragile watermarks of three-dimensional model with robustness |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102999881A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108470318A (en) * | 2018-02-06 | 2018-08-31 | 杭州电子科技大学 | The three-dimensional grid doubly time series model method positioned based on grouping strategy and neighborhood relationships |
CN109544433A (en) * | 2018-10-15 | 2019-03-29 | 华为技术有限公司 | Watermark embedding method, device, terminal and storage medium |
CN111598765A (en) * | 2020-05-09 | 2020-08-28 | 绍兴聚量数据技术有限公司 | Three-dimensional model robust watermarking method based on homomorphic encryption domain |
-
2012
- 2012-12-20 CN CN2012105638626A patent/CN102999881A/en active Pending
Non-Patent Citations (5)
Title |
---|
孔祥增等: "基于Hash函数的分块3D网格模型脆弱水印算法", 《计算机应用与软件》 * |
孙峰: "基于混沌和分块的三维模型脆弱水印算法", 《漳州师范学院学报(自然科学版)》 * |
张伟: "基于DCT的图像水印算法研究与实现", 《计算机技术与发展》 * |
张华熊等: "置乱技术在数字水印中的应用", 《电路与系统学报》 * |
胡金: ""基于三维模型的灰度图像盲数字水印算法"", 《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108470318A (en) * | 2018-02-06 | 2018-08-31 | 杭州电子科技大学 | The three-dimensional grid doubly time series model method positioned based on grouping strategy and neighborhood relationships |
CN108470318B (en) * | 2018-02-06 | 2022-01-11 | 杭州电子科技大学 | Three-dimensional grid double watermarking method based on grouping strategy and neighborhood relation positioning |
CN109544433A (en) * | 2018-10-15 | 2019-03-29 | 华为技术有限公司 | Watermark embedding method, device, terminal and storage medium |
CN109544433B (en) * | 2018-10-15 | 2021-01-15 | 华为技术有限公司 | Watermark embedding method, device, terminal and storage medium |
US11869112B2 (en) | 2018-10-15 | 2024-01-09 | Huawei Technologies Co., Ltd. | Watermark embedding method and apparatus, terminal, and storage medium |
CN111598765A (en) * | 2020-05-09 | 2020-08-28 | 绍兴聚量数据技术有限公司 | Three-dimensional model robust watermarking method based on homomorphic encryption domain |
CN111598765B (en) * | 2020-05-09 | 2023-05-26 | 绍兴聚量数据技术有限公司 | Three-dimensional model robust watermarking method based on homomorphic encryption domain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102880998B (en) | The extracting method of watermarking images | |
CN103065278B (en) | A kind of multi-stage authentication method for shp layer integrality | |
CN104063731A (en) | Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology | |
CN101527030A (en) | Safe watermark method based on side information | |
CN103123719B (en) | The Zero watermarking method of a kind of image authentication and tampering location | |
CN102184244B (en) | High-robustness geographical database watermark method suitable for polygon type | |
CN102223561B (en) | Blind watermark embedding and extracting method of stereoscopic video image | |
CN102142129B (en) | Visual secret sharing-based image content tampering detection method | |
CN102999881A (en) | Producing method and extraction method of fragile watermarks of three-dimensional model with robustness | |
CN101692288A (en) | Digital watermark embedding and detecting method of CAD model indicated on basis of NURBS | |
CN102880997B (en) | Method for embedding watermark image | |
CN102270336A (en) | Safe fragile watermarking method based on multiple dependency structures | |
CN108470318B (en) | Three-dimensional grid double watermarking method based on grouping strategy and neighborhood relation positioning | |
CN1322433C (en) | Positioning vulnerable water print generating and recognizing method capable of distigushing image and watermark distortion | |
CN102117474A (en) | Digital picture watermark embedding and detecting method and device | |
CN103971324A (en) | Asymmetric watermarking method for protecting vector map data copyright | |
CN111242825B (en) | Water depth feature-based ENC electronic nautical chart zero-watermarking method | |
CN104700346A (en) | Polar angle extension-based reversible blind database watermarking algorithm | |
CN103810407A (en) | GIS vector data line face layer copyright authentication method | |
CN102663673B (en) | Chaotic mapping based shp line-surface layer fragile watermark technology | |
CN1177472C (en) | Digital watermark implanting and extracting method based on parth search | |
CN104866737B (en) | A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account | |
CN103903218A (en) | Robust geographic data watermarking method for public ownership verification | |
CN103198449B (en) | A kind of digital watermark method of 3-D view | |
CN104361547B (en) | A kind of fragile watermarking method of stereo-picture pixel tampering location |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130327 |