CN102999881A - Producing method and extraction method of fragile watermarks of three-dimensional model with robustness - Google Patents

Producing method and extraction method of fragile watermarks of three-dimensional model with robustness Download PDF

Info

Publication number
CN102999881A
CN102999881A CN2012105638626A CN201210563862A CN102999881A CN 102999881 A CN102999881 A CN 102999881A CN 2012105638626 A CN2012105638626 A CN 2012105638626A CN 201210563862 A CN201210563862 A CN 201210563862A CN 102999881 A CN102999881 A CN 102999881A
Authority
CN
China
Prior art keywords
vertex
watermark
summit
binary
coordinate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012105638626A
Other languages
Chinese (zh)
Inventor
孔祥增
姚志强
陈丽萍
黄榕宁
宋考
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN2012105638626A priority Critical patent/CN102999881A/en
Publication of CN102999881A publication Critical patent/CN102999881A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a producing method and an extraction method of fragile watermarks of a three-dimensional model with robustness. The producing method includes: 1) partitioning and scrambling original binary watermark images; 2) manufacturing sorted vertex sequences for embedding in the watermark images; 3) generating novel binary watermarks and novel hashed value blocks; and 4) embedding the novel binary watermarks and the novel hashed value blocks in the vertex sequences respectively, and obtain the three-dimensional model with embedded watermark images. The extraction method comprises: 1) judging whether the watermarks are imbedded in vertexes; 2) obtaining binary watermarks with inserted 0 and corresponding hashed values when the watermarks are embedded; 3) judging suspicious vertexes; 4) obtaining the scrambled binary watermark images during embedding; and 5) performing anti-scrambling on the obtained scrambled binary watermark images, and finishing extraction of the binary watermark images. The producing method and the extraction method of fragile watermarks of the three-dimensional model with the robustness are free of blocking effect and good in robustness, can detect any change of the model during extraction, and can locate tampered areas.

Description

Three-dimensional model fragile watermark production method and extracting method thereof with robustness
Technical field
The present invention relates to video image information safety technique field, relate in particular to a kind of three-dimensional model fragile watermark production method and extracting method thereof with robustness.
Background technology
In recent years, the achievement of relevant digital watermarking both at home and abroad increases day by day.Since Japanese Ohbuchi in 1997 proposed the three-dimensional model digital watermark for the first time, the research of three-dimensional model digital watermark technology had obtained very great development.Yet, the most paper is all about robust digital watermark, only having the minority achievement is Fragile Watermark Algorithm about 3D model integrity checking aspect, and in fact, the Fragile Watermark Algorithm of first piece of 3D model integrity checking aspect is that Yeo and Yeung propose.The method of Fornaro and Sanna reference 2D fragile watermark has proposed the 3D PKI Fragile Watermark Algorithm of CSG model.
All only have one owing to carrying out the Hash watermark information of processing and the information bit of storing the Hash functional value, this Hash function that has caused using in some achievements can only be h (w i)=w i, h (w i)=0.5w iDeng some simple Hash functions, these simple Hash functions are easy to just can guess out their hash value, be easy to they are implemented to attack.Process if the watermark information that can process carries out Hash by piece, the hash value that obtains is also stored by piece, utilize simultaneously some safe hash algorithms such as MD5 just can more effective opposing attack.
Summary of the invention
In order to overcome the deficiencies in the prior art, the purpose of this invention is to provide a kind of hidden performance is good, reliability is high, have simultaneously robustness three-dimensional model fragile watermark production method and extracting method thereof.
For achieving the above object, technical scheme of the present invention is: a kind of three-dimensional model fragile watermark production method with robustness, comprise the embedding of binary bitmap, and it may further comprise the steps:
1) original binary bitmap is carried out piecemeal and process, adopt identical scramble template to carry out scramble to each block image simultaneously, and repeat n arrangement, obtain the binary bitmap W=(w behind the scramble 1, w 2..., w n), described scramble is: the information order of image is upset, the a pixel is moved on the position of b pixel, the b pixel moves on the position of c pixel ... make it be transformed into the image of disorderly and unsystematic almost illegible, select simultaneously the grid image M (V of the three-dimensional model of watermarking images to be embedded, C), wherein V is the set on summit among the grid image M of three-dimensional model, and C is the annexation on summit among the grid image M of three-dimensional model;
2) the random summit V (x among the selected V 1, x 2, x 3) in order to the embed watermark image, and will select the summit of embed watermark image and the summit adjacent with it according to the size ordering of apex coordinate, the vertex sequence V after obtaining sorting i(x 1, x 2, x 3), described ordering rule is as follows:
First according to x 1Coordinate size ordering, if x 1Coordinate is identical, then according to x 2Coordinate size ordering, if x 1And x 2Coordinate all identical, then according to x 3Coordinate size ordering;
3) to the binary bitmap W=(w behind the scramble 1, w 2..., w n) insert 0 step, described 0 step of inserting is: as binary bitmap W=(w 1, w 2..., w n) occur continuous 51 o'clock, then inserting one 0 thereafter, obtain inserting binary bitmap W ' after 0=(w ' 1, w ' 2..., w ' n);
4) to insert binary bitmap W ' after 0=(w ' 1, w ' 2..., w ' n) carry out piecemeal according to 128 as a watermark block, and each watermark piecemeal is carried out the Hash function encrypting of MD5 according to following rule, and the indications of adding 01111110 before each watermark piecemeal is in order to represent the beginning of piece:
If the r piece is W ' r=(w ' R1, w ' R2..., w ' R128), then
Figure BDA00002625175500021
P wherein s rBe hashed value, S is hash length, and S=128; At the r piece W ' with 128 r=(w ' R1, w ' R2..., w ' R128) indications of front adding 01111110, then produce the new binary watermarking W with 136 " r
W″ r=(0,1,1,1,1,1,1,0,w′ r1,w′ r2,...,w′ rn)
Simultaneously at 128
Figure BDA00002625175500022
The front add 01111110 in order to represent the indications of hashed value BOB(beginning of block), then produce the new hashed value piece P ' also have 136 r
P r ′ = ( 0,1,1,1,1,1,1,0 , p 1 r , p 2 r , . . . , p 128 r )
Equally all be 136 new binary watermarking W " rWith new hashed value piece P ' rBi-level digital on the correspondence position form 136 to (w ' i, p i);
5) incite somebody to action (w ' i, p i) deposit vertex sequence V after the ordering in according to following embedding method respectively successively i(x 1, x 2, x 3) the x of correspondence 2And x 3In, namely obtaining the three-dimensional model of embed watermark image, described embedding method is:
For vertex sequence V i(x 1, x 2, x 3) in come top minimum vertex and be designated as V ' 1(x ' 1, x ' 2, x ' 3), then its adjacent vertex and minimum vertex V ' 1(x ' 1, x ' 2, x ' 3) the average of coordinate difference of respective coordinates
Figure BDA00002625175500024
Satisfy following relation:
x ij c = 1 | N ( v ) | Σ i = N ( v ) ( x ij - x j ′ ) , j = 1,2,3 ,
Wherein N (v) is vertex v i(x 1, x 2, x 3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v),
For given key parameter N, when j=1, so
Figure BDA00002625175500026
And vertex v iBe designated as d I1=| x 1|, following relation is then arranged:
If in vertex v i(x 1, x 2, x 3) embed watermark, the merchant Q of division arranged IjBe necessary for odd number, if namely
Figure BDA00002625175500027
Be odd number, then
Figure BDA00002625175500031
And R I1=d I1%S I1If
Figure BDA00002625175500032
Be not odd number, then
Figure BDA00002625175500033
And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
If in vertex v i(x 1, x 2, x 3) there are not an embed watermark, the merchant Q of division IjBe necessary for even number, if namely
Figure BDA00002625175500034
Be even number, then And R I1=d I1%S I1If
Figure BDA00002625175500036
Be not even number, then
Figure BDA00002625175500037
And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
Also namely insert vertex v after the watermark ' iD ' I1Satisfy following relational expression:
Figure BDA00002625175500038
Make M=Q Ij%2 is by adjusting v i(x 1, x 2, x 3) x 1Coordinate changes d I1, also namely:
For given key parameter N,
Figure BDA000026251755000310
And vertex v iBe designated as d Ij=| x j|, if j=2,3, then it all satisfies following relation:
(w i, p i) be to embed x 2, x 3Watermark, if w i, p i1, so must Q Ij%2=1 also is the merchant Q of division IjMust be odd number, that is to say if
Figure BDA000026251755000311
Be odd number, then And R I1=d I1%S I1
If
Figure BDA000026251755000313
Be not odd number and R Ij>S Ij/ 2, then
Figure BDA000026251755000314
And R I1=d I1%S I1
If
Figure BDA000026251755000315
Be not odd number and R Ij≤ S Ij/ 2, then
Figure BDA000026251755000316
And R I1=d I1%S I1
Q wherein IjThe merchant of division, R I1It is remainder;
If w i, p i0, so must Q Ij%2=0 also is the merchant Q of division IjMust be even number, that is to say if
Figure BDA000026251755000317
Be even number, then And R I1=d I1%S I1If
Figure BDA000026251755000319
Be not even number and R Ij>S Ij/ 2, then And R I1=d I1%S I1If
Figure BDA000026251755000321
Be not even number and R Ij≤ S Ij/ 2, then And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
By adjusting v i(x 1, x 2, x 3) x jCoordinate changes d Ij, namely satisfy:
Relation.
The present invention also provides a kind of extracting method with three-dimensional model fragile watermark of robustness, and it may further comprise the steps:
1) for vertex v ' i(x 1, x 2, x 3), its adjacent vertex and minimum vertex V ' 1(x ' 1, x ' 2, x ' 3) the average of coordinate difference of respective coordinates Satisfy following relation:
x ij c = 1 | N ( v ) | Σ i = N ( v ) ( x ij - x j ′ ) , j = 1,2,3 ,
Wherein N (v) is vertex v i(x 1, x 2, x 3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v);
2) judge each vertex v i(x 1, x 2, x 3) whether having embedded watermark, its judgment rule is: given key parameter N during for embed watermark, note For vertex v ' iNote d ' I1=| x ' 1|, so
Figure BDA00002625175500045
R ' I1=d ' I1%S ' I1Q ' wherein I1The merchant of division, R ' I1Remainder, if Q I1Be odd number, there is embed watermark on this summit so, otherwise this summit does not have embed watermark;
3) summit of embed watermark is arranged for each, from its coordinate x 2Middle extraction w ' is from coordinate x 3Middle extraction p ', given key parameter N during for embed watermark, note
Figure BDA00002625175500046
For vertex v ' iBe designated as d ' Ij=| x ' j|,
If j=2,3; Then
Figure BDA00002625175500047
R ' Ij=d ' Ij%S ' Ij, w '=Q ' I2%2, p '=Q ' I3%2, wherein Q ' IjThe merchant of division, R ' IjRemainder,
All w' and p' form the W ' that contains identifier 01111110, P ', and with W ', then P ' piecemeal removes respectively block identifier 01111110 by block identifier 01111110, the binary watermarking W ' after slotting 0 when the obtaining embed watermark rAnd corresponding hashed value P ' r
4) judge suspicious summit, its judgment rule is: calculate P r=H (W ' r), if P rUnequal to P ' rThen with these summits and adjacent summit thereof as suspicious summit;
5) the binary watermarking W ' after 0 of inserting to obtaining r0 method of inserting when embedding is carried out inverse operation, in order to remove insert inserted in 0 o'clock 0, the binary bitmap when obtaining embedding behind the scramble;
6) to obtaining the unrest that is inverted of binary bitmap behind the scramble, namely obtain the original binary bitmap that embeds, finish the extraction of binary bitmap.
The present invention adopts above technical scheme, when at first embedding, we have carried out piecemeal and scramble to original binary bitmap, after realizing embedding algorithm, original binary bitmap blocking effect can not occur, then come watermark information is carried out piecemeal with the method for the indications of inserting special character 01111110, then adopt safe Hash function MD5 that watermark block is encrypted, increase the robustness that watermarking images embeds.Use the three-dimensional model of the method embedding of this embed watermark image, and utilize the method for extraction watermarking images of the present invention, can detect any change to model, and can orient the zone of distorting.
Description of drawings
The present invention is further detailed explanation below in conjunction with the drawings and specific embodiments:
Fig. 1 is the schematic flow sheet that the present invention has the three-dimensional model fragile watermark production method of robustness;
Fig. 2 is the schematic flow sheet that the present invention has the three-dimensional model fragile watermark extracting method of robustness.
Embodiment
Shown in Fig. 1 or 2, technical scheme of the present invention is: a kind of three-dimensional model fragile watermark production method with robustness, comprise the embedding of binary bitmap, and it may further comprise the steps:
1) original binary bitmap is carried out piecemeal and process, adopt identical scramble template to carry out scramble to each block image simultaneously, and repeat n arrangement, obtain the binary bitmap W=(w behind the scramble 1, w 2..., w n), described scramble is: the information order of image is upset, the a pixel is moved on the position of b pixel, the b pixel moves on the position of c pixel ... make it be transformed into the image of disorderly and unsystematic almost illegible, select simultaneously the grid image M (V of the three-dimensional model of watermarking images to be embedded, C), wherein V is the set on summit among the grid image M of three-dimensional model, and C is the annexation on summit among the grid image M of three-dimensional model;
2) the random summit V (x among the selected V 1, x 2, x 3) in order to the embed watermark image, and will select the summit of embed watermark image and the summit adjacent with it according to the size ordering of apex coordinate, the vertex sequence V after obtaining sorting i(x 1, x 2, x 3), described ordering rule is as follows:
First according to x 1Coordinate size ordering, if x 1Coordinate is identical, then according to x 2Coordinate size ordering, if x 1And x 2Coordinate all identical, then according to x 3Coordinate size ordering;
3) to the binary bitmap W=(w behind the scramble 1, w 2..., w n) insert 0 step, described 0 step of inserting is: as binary bitmap W=(w 1, w 2..., w n) occur continuous 51 o'clock, then inserting one 0 thereafter, obtain inserting binary bitmap W ' after 0=(w ' 1, w ' 2..., w ' n);
4) to insert binary bitmap W ' after 0=(w ' 1, w ' 2..., w ' n) carry out piecemeal according to 128 as a watermark block, and each watermark piecemeal is carried out the Hash function encrypting of MD5 according to following rule, and the indications of adding 01111110 before each watermark piecemeal is in order to represent the beginning of piece:
If the r piece is W ' r=(w ' R1, w ' R2..., w ' R128), then
Figure BDA00002625175500051
P wherein s rBe hashed value, S is hash length, and S=128; At the r piece W ' with 128 r=(w ' R1, w ' R2..., w ' R128) indications of front adding 01111110, then produce the new binary watermarking W with 136 " r
W″ r=(0,1,1,1,1,1,1,0,w′ r1,w′ r2,...,w′ rn)
Simultaneously at 128
Figure BDA00002625175500061
The front add 01111110 in order to represent the indications of hashed value BOB(beginning of block), then produce the new hashed value piece P ' also have 136 r
P r ′ = ( 0,1,1,1,1,1,1,0 , p 1 r , p 2 r , . . . , p 128 r )
Equally all be 136 new binary watermarking W " rWith new hashed value piece P ' rBi-level digital on the correspondence position form 136 to (w ' i, p i);
5) incite somebody to action (w ' i, p i) deposit vertex sequence V after the ordering in according to following embedding method respectively successively i(x 1, x 2, x 3) the x of correspondence 2And x 3In, namely obtaining the three-dimensional model of embed watermark image, described embedding method is:
For vertex sequence V i(x 1, x 2, x 3) in come top minimum vertex and be designated as V ' 1(x ' 1, x ' 2, x ' 3), then its adjacent vertex and minimum vertex V ' 1(x ' 1, x ' 2, x ' 3) the average of coordinate difference of respective coordinates
Figure BDA00002625175500063
Satisfy following relation:
x ij c = 1 | N ( v ) | Σ i = N ( v ) ( x ij - x j ′ ) , j = 1,2,3 ,
Wherein N (v) is vertex v i(x 1, x 2, x 3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v),
For given key parameter N, when j=1, so
Figure BDA00002625175500065
And vertex v iBe designated as d I1=| x 1|, following relation is then arranged:
If in vertex v i(x 1, x 2, x 3) embed watermark, the merchant Q of division arranged IjBe necessary for odd number, if namely
Figure BDA00002625175500066
Be odd number, then And R I1=d I1%S I1If
Figure BDA00002625175500068
Be not odd number, then
Figure BDA00002625175500069
And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
If in vertex v i(x 1, x 2, x 3) there are not an embed watermark, the merchant Q of division IjBe necessary for even number, if namely
Figure BDA000026251755000610
Be even number, then
Figure BDA000026251755000611
And R I1=d I1%S I1If
Figure BDA000026251755000612
Be not even number, then
Figure BDA000026251755000613
And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
Also namely insert vertex v after the watermark ' iD ' I1Satisfy following relational expression:
Figure BDA000026251755000614
Make M=Q Ij%2 is by adjusting v i(x 1, x 2, x 3) x 1Coordinate changes d I1, also namely:
Figure BDA00002625175500071
For given key parameter N,
Figure BDA00002625175500072
And vertex v iBe designated as d Ij=| x j|, if j=2,3, then it all satisfies following relation:
(w i, p i) be to embed x 2, x 3Watermark, if w i, p i1, so must Q Ij%2=1 also is the merchant Q of division IjMust be odd number, that is to say if
Figure BDA00002625175500073
Be odd number, then
Figure BDA00002625175500074
And R I1=d I1%S I1
If
Figure BDA00002625175500075
Be not odd number and R Ij>S Ij/ 2, then And R I1=d I1%S I1
If
Figure BDA00002625175500077
Be not odd number and R Ij≤ S Ij/ 2, then
Figure BDA00002625175500078
And R I1=d I1%S I1
Q wherein IjThe merchant of division, R I1It is remainder;
If w i, p i0, so must Q Ij%2=0 also is the merchant Q of division IjMust be even number, that is to say if
Figure BDA00002625175500079
Be even number, then
Figure BDA000026251755000710
And R I1=d I1%S I1If Be not even number and R Ij>S Ij/ 2, then
Figure BDA000026251755000712
And R I1=d I1%S I1If
Figure BDA000026251755000713
Be not even number and R Ij≤ S Ij/ 2, then
Figure BDA000026251755000714
And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
By adjusting v i(x 1, x 2, x 3) x jCoordinate changes d Ij, namely satisfy:
Figure BDA000026251755000715
Relation.
The present invention also provides a kind of extracting method with three-dimensional model fragile watermark of robustness, and it may further comprise the steps:
1) for vertex v ' i(x 1, x 2, x 3), its adjacent vertex and minimum vertex V ' 1(x ' 1, x ' 2, x ' 3) the average of coordinate difference of respective coordinates
Figure BDA000026251755000716
Satisfy following relation:
x ij c = 1 | N ( v ) | Σ i = N ( v ) ( x ij - x j ′ ) , j = 1,2,3 ,
Wherein N (v) is vertex v i(x 1, x 2, x 3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v);
2) judge each vertex v i(x 1, x 2, x 3) whether having embedded watermark, its judgment rule is: given key parameter N during for embed watermark, note
Figure BDA000026251755000718
For vertex v ' iNote d ' I1=| x ' 1|, so
Figure BDA000026251755000719
R ' I1=d ' I1%S ' I1Q ' wherein I1The merchant of division, R ' I1Remainder, if Q I1Be odd number, there is embed watermark on this summit so, otherwise this summit does not have embed watermark;
3) summit of embed watermark is arranged for each, from its coordinate x 2Middle extraction w ' is from coordinate x 3Middle extraction p ', given key parameter N during for embed watermark, note
Figure BDA00002625175500081
For vertex v ' iBe designated as d ' Ij=| x ' j|,
If j=2,3; Then
Figure BDA00002625175500082
R ' Ij=d ' Ij%S ' Ij, w '=Q ' I2%2, p '=Q ' I3%2, wherein Q ' IjThe merchant of division, R ' IjRemainder,
All w' and p' form the W ' that contains identifier 01111110, P ', and with W ', then P ' piecemeal removes respectively block identifier 01111110 by block identifier 01111110, the binary watermarking W ' after slotting 0 when the obtaining embed watermark rAnd corresponding hashed value P ' r
4) judge suspicious summit, its judgment rule is: calculate P r=H (W ' r), if P rUnequal to P ' rThen with these summits and adjacent summit thereof as suspicious summit;
5) the binary watermarking W ' after 0 of inserting to obtaining r0 method of inserting when embedding is carried out inverse operation, in order to remove insert inserted in 0 o'clock 0, the binary bitmap when obtaining embedding behind the scramble;
6) to obtaining the unrest that is inverted of binary bitmap behind the scramble, namely obtain the original binary bitmap that embeds, finish the extraction of binary bitmap.

Claims (2)

1. have the three-dimensional model fragile watermark production method of robustness, comprise the embedding of binary bitmap, it is characterized in that: it may further comprise the steps:
1) original binary bitmap is carried out piecemeal and process, adopt identical scramble template to carry out scramble to each block image simultaneously, and repeat n arrangement, obtain the binary bitmap W=(w behind the scramble 1, w 2..., w n), described scramble is: the information order of image is upset, the a pixel is moved on the position of b pixel, the b pixel moves on the position of c pixel ... make it be transformed into the image of disorderly and unsystematic almost illegible, select simultaneously the grid image M (V of the three-dimensional model of watermarking images to be embedded, C), wherein V is the set on summit among the grid image M of three-dimensional model, and C is the annexation on summit among the grid image M of three-dimensional model;
2) the random summit V (x among the selected V 1, x 2, x 3) in order to the embed watermark image, and will select the summit of embed watermark image and the summit adjacent with it according to the size ordering of apex coordinate, the vertex sequence V after obtaining sorting i(x 1, x 2, x 3), described ordering rule is as follows:
First according to x 1Coordinate size ordering, if x 1Coordinate identical, then according to x 2Coordinate size ordering, if x 1And x 2Coordinate all identical, then according to x 3Coordinate size ordering;
3) to the binary bitmap W=(w behind the scramble 1, w 2..., w n) insert 0 step, described 0 step of inserting is: as binary bitmap W=(w 1, w 2..., w n) occur continuous 51 o'clock, then inserting one 0 thereafter, obtain inserting binary bitmap W ' after 0=(w ' 1, w ' 2..., w ' n);
4) to insert binary bitmap W ' after 0=(w ' 1, w ' 2..., w ' n) carry out piecemeal according to 128 as a watermark block, and each watermark piecemeal is carried out the Hash function encrypting of MD5 according to following rule, and the indications of adding 01111110 before each watermark piecemeal is in order to represent the beginning of piece:
If the r piece is W ' r=(w ' R1, w ' R2..., w ' R128), then
Figure FDA00002625175400011
P wherein s rBe hashed value, S is hash length, and S=128; At the r piece W ' with 128 r=(w ' R1, w ' R2..., w ' R128) indications of front adding 01111110, then produce the new binary watermarking W with 136 " r
W″ r=(0,1,1,1,1,1,1,0,w′ r1,w′ r2,...,w′ rn)
Simultaneously at 128 The front add 01111110 in order to represent the indications of hashed value BOB(beginning of block), then produce the new hashed value piece P ' also have 136 r
P r ′ = ( 0,1,1,1,1,1,1,0 , p 1 r , p 2 r , . . . , p 128 r )
Equally all be 136 new binary watermarking W " rWith new hashed value piece P ' rBi-level digital on the correspondence position form 136 to (w ' i, p i);
5) incite somebody to action (w ' i, p i) deposit vertex sequence V after the ordering in according to following embedding method respectively successively i(x 1, x 2, x 3) the x of correspondence 2And x 3In, namely obtaining the three-dimensional model of embed watermark image, described embedding method is:
For vertex sequence V i(x 1, x 2, x 3) in come top minimum vertex and be designated as V ' 1(x ' 1, x ' 2, x ' 3), then its adjacent vertex and minimum vertex V ' 1(x ' 1, x ' 2, x ' 3) the average of coordinate difference of respective coordinates
Figure FDA00002625175400021
Satisfy following relation:
x ij c = 1 | N ( v ) | Σ i = N ( v ) ( x ij - x j ′ ) , j = 1,2,3 ,
Wherein N (v) is vertex v i(x 1, x 2, x 3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v),
For given key parameter N, when j=1, so
Figure FDA00002625175400023
And vertex v iBe designated as d I1=| x 1|, following relation is then arranged:
If in vertex v i(x 1, x 2, x 3) embed watermark, the merchant Q of division arranged IjBe necessary for odd number, if namely
Figure FDA00002625175400024
Be odd number, then
Figure FDA00002625175400025
And R I1=d I1%S I1If
Figure FDA00002625175400026
Be not odd number, then
Figure FDA00002625175400027
And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
If in vertex v i(x 1, x 2, x 3) there are not an embed watermark, the merchant Q of division IjBe necessary for even number, if namely
Figure FDA00002625175400028
Be even number, then
Figure FDA00002625175400029
And R I1=d I1%S I1If
Figure FDA000026251754000210
Be not even number, then
Figure FDA000026251754000211
And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
Also namely insert vertex v after the watermark ' iD ' I1Satisfy following relational expression:
Figure FDA000026251754000212
Make M=Q Ij%2 is by adjusting v i(x 1, x 2, x 3) x 1Coordinate changes d I1, also namely:
Figure FDA000026251754000213
For given key parameter N,
Figure FDA000026251754000214
And vertex v iBe designated as d Ij=| x j|, if j=2,3, then it all satisfies following relation:
(w i, p i) be to embed x 2, x 3Watermark, if w i, p i1, so must Q Ij%2=1 also is the merchant Q of division IjMust be odd number, that is to say if
Figure FDA000026251754000215
Be odd number, then
Figure FDA000026251754000216
And R I1=d I1%S I1
If
Figure FDA00002625175400031
Be not odd number and R Ij>S Ij/ 2, then And R I1=d I1%S I1
If Be not odd number and R Ij≤ S Ij/ 2, then
Figure FDA00002625175400034
And R I1=d I1%S I1
Q wherein IjThe merchant of division, R I1It is remainder;
If w i, p i0, so must Q Ij%2=0 also is the merchant Q of division IjMust be even number, that is to say if
Figure FDA00002625175400035
Be even number, then
Figure FDA00002625175400036
And R I1=d I1%S I1
If
Figure FDA00002625175400037
Be not even number and R Ij>S Ij/ 2, then
Figure FDA00002625175400038
And R I1=d I1%S I1If
Figure FDA00002625175400039
Be not even number and R Ij≤ S Ij/ 2, then
Figure FDA000026251754000310
And R I1=d I1%S I1, Q wherein IjThe merchant of division, R I1It is remainder;
By adjusting v i(x 1, x 2, x 3) x jCoordinate changes d Ij, namely satisfy:
Figure FDA000026251754000311
Relation.
2. have the extracting method of the three-dimensional model fragile watermark of robustness, it is characterized in that: it may further comprise the steps:
1) for vertex v ' i(x 1, x 2, x 3), its adjacent vertex and minimum vertex V ' 1(x ' 1, x ' 2, x ' 3) the average of coordinate difference of respective coordinates
Figure FDA000026251754000312
Satisfy following relation:
x ij c = 1 | N ( v ) | Σ i = N ( v ) ( x ij - x j ′ ) , j = 1,2,3 ,
Wherein N (v) is vertex v i(x 1, x 2, x 3) set of adjacent vertex, | N (v) | be the number on the summit of set N (v);
2) judge each vertex v i(x 1, x 2, x 3) whether having embedded watermark, its judgment rule is: given key parameter N during for embed watermark, note
Figure FDA000026251754000314
For vertex v ' iNote d ' I1=| x ' 1|, so
Figure FDA000026251754000315
R ' I1=d ' I1%S ' I1Q ' wherein I1The merchant of division, R ' I1Remainder, if Q I1Be odd number, there is embed watermark on this summit so, otherwise this summit does not have embed watermark;
3) summit of embed watermark is arranged for each, from its coordinate x 2Middle extraction w ' is from coordinate x 3Middle extraction p ', given key parameter N during for embed watermark, note For vertex v ' iBe designated as d ' Ij=| x ' j|,
If j=2,3; Then
Figure FDA000026251754000317
R ' Ij=d ' Ij%S ' Ij, w '=Q ' I2%2, p '=Q ' I3%2, wherein Q ' IjThe merchant of division, R ' IjRemainder,
All w' and p' form the W' that contains identifier 01111110, P', and with W ', then P ' piecemeal removes respectively block identifier 01111110 by block identifier 01111110, the binary watermarking W ' after slotting 0 when the obtaining embed watermark rAnd corresponding hashed value P ' r
4) judge suspicious summit, its judgment rule is: calculate P r=H (W ' r), if P rUnequal to P ' rThen with these summits and adjacent summit thereof as suspicious summit;
5) the binary watermarking W ' after 0 of inserting to obtaining r0 method of inserting when embedding is carried out inverse operation, in order to remove insert inserted in 0 o'clock 0, the binary bitmap when obtaining embedding behind the scramble;
6) to obtaining the unrest that is inverted of binary bitmap behind the scramble, namely obtain the original binary bitmap that embeds, finish the extraction of binary bitmap.
CN2012105638626A 2012-12-20 2012-12-20 Producing method and extraction method of fragile watermarks of three-dimensional model with robustness Pending CN102999881A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012105638626A CN102999881A (en) 2012-12-20 2012-12-20 Producing method and extraction method of fragile watermarks of three-dimensional model with robustness

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012105638626A CN102999881A (en) 2012-12-20 2012-12-20 Producing method and extraction method of fragile watermarks of three-dimensional model with robustness

Publications (1)

Publication Number Publication Date
CN102999881A true CN102999881A (en) 2013-03-27

Family

ID=47928419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012105638626A Pending CN102999881A (en) 2012-12-20 2012-12-20 Producing method and extraction method of fragile watermarks of three-dimensional model with robustness

Country Status (1)

Country Link
CN (1) CN102999881A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108470318A (en) * 2018-02-06 2018-08-31 杭州电子科技大学 The three-dimensional grid doubly time series model method positioned based on grouping strategy and neighborhood relationships
CN109544433A (en) * 2018-10-15 2019-03-29 华为技术有限公司 Watermark embedding method, device, terminal and storage medium
CN111598765A (en) * 2020-05-09 2020-08-28 绍兴聚量数据技术有限公司 Three-dimensional model robust watermarking method based on homomorphic encryption domain

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
孔祥增等: "基于Hash函数的分块3D网格模型脆弱水印算法", 《计算机应用与软件》 *
孙峰: "基于混沌和分块的三维模型脆弱水印算法", 《漳州师范学院学报(自然科学版)》 *
张伟: "基于DCT的图像水印算法研究与实现", 《计算机技术与发展》 *
张华熊等: "置乱技术在数字水印中的应用", 《电路与系统学报》 *
胡金: ""基于三维模型的灰度图像盲数字水印算法"", 《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108470318A (en) * 2018-02-06 2018-08-31 杭州电子科技大学 The three-dimensional grid doubly time series model method positioned based on grouping strategy and neighborhood relationships
CN108470318B (en) * 2018-02-06 2022-01-11 杭州电子科技大学 Three-dimensional grid double watermarking method based on grouping strategy and neighborhood relation positioning
CN109544433A (en) * 2018-10-15 2019-03-29 华为技术有限公司 Watermark embedding method, device, terminal and storage medium
CN109544433B (en) * 2018-10-15 2021-01-15 华为技术有限公司 Watermark embedding method, device, terminal and storage medium
US11869112B2 (en) 2018-10-15 2024-01-09 Huawei Technologies Co., Ltd. Watermark embedding method and apparatus, terminal, and storage medium
CN111598765A (en) * 2020-05-09 2020-08-28 绍兴聚量数据技术有限公司 Three-dimensional model robust watermarking method based on homomorphic encryption domain
CN111598765B (en) * 2020-05-09 2023-05-26 绍兴聚量数据技术有限公司 Three-dimensional model robust watermarking method based on homomorphic encryption domain

Similar Documents

Publication Publication Date Title
CN102880998B (en) The extracting method of watermarking images
CN103065278B (en) A kind of multi-stage authentication method for shp layer integrality
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
CN101527030A (en) Safe watermark method based on side information
CN103123719B (en) The Zero watermarking method of a kind of image authentication and tampering location
CN102184244B (en) High-robustness geographical database watermark method suitable for polygon type
CN102223561B (en) Blind watermark embedding and extracting method of stereoscopic video image
CN102142129B (en) Visual secret sharing-based image content tampering detection method
CN102999881A (en) Producing method and extraction method of fragile watermarks of three-dimensional model with robustness
CN101692288A (en) Digital watermark embedding and detecting method of CAD model indicated on basis of NURBS
CN102880997B (en) Method for embedding watermark image
CN102270336A (en) Safe fragile watermarking method based on multiple dependency structures
CN108470318B (en) Three-dimensional grid double watermarking method based on grouping strategy and neighborhood relation positioning
CN1322433C (en) Positioning vulnerable water print generating and recognizing method capable of distigushing image and watermark distortion
CN102117474A (en) Digital picture watermark embedding and detecting method and device
CN103971324A (en) Asymmetric watermarking method for protecting vector map data copyright
CN111242825B (en) Water depth feature-based ENC electronic nautical chart zero-watermarking method
CN104700346A (en) Polar angle extension-based reversible blind database watermarking algorithm
CN103810407A (en) GIS vector data line face layer copyright authentication method
CN102663673B (en) Chaotic mapping based shp line-surface layer fragile watermark technology
CN1177472C (en) Digital watermark implanting and extracting method based on parth search
CN104866737B (en) A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account
CN103903218A (en) Robust geographic data watermarking method for public ownership verification
CN103198449B (en) A kind of digital watermark method of 3-D view
CN104361547B (en) A kind of fragile watermarking method of stereo-picture pixel tampering location

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130327