Browse > Article
http://dx.doi.org/10.3837/tiis.2014.02.010

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol  

Lee, Suk-Hwan (Department of Information Security, Tongmyong University)
Kwon, Seong-Geun (Department of Electronics Engineering, KyungIl University)
Kwon, Ki-Ryong (Department of IT Convergene and Application Engineering, Pukyong National University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.2, 2014 , pp. 504-523 More about this Journal
Abstract
This paper presents a multiple-watermarking scheme for copyright protection and the prevention of illegal copying of mobile 3D contents with low resolution. The proposed scheme embeds a unique watermark and a watermark certification authority (WCA) watermark into the spatial and encryption domains of a mobile 3D content based on the buyer-seller watermarking protocol. The seller generates a unique watermark and embeds it into the local maximum curvedness of a 3D object. After receiving the encrypted watermark from the WCA, the seller embeds it into the encrypted vertex data using an operator that satisfies the privacy homomorphic property. The proposed method was implemented using a mobile content tool, and the experimental results verify its capability in terms of copyright protection and the prevention of illegal copying.
Keywords
Mobile 3D Content; 3D Watermarking; Buyer-Seller Watermarking (BSW) Protocol; Copyright Protection; Curvedness;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Katzenbeisser, A. Lemma, M.U. Celik, M. Van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Transactions on Information Forensics and Security, vol. 3 , issue 4, pp. 783-786, Dec. 2008.   DOI
2 A. Rial, Mina Deng, T. Bianchi, A. Piva, and B. Preneel, "A provably secure anonymous buyer-seller watermarking protocol," IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 920-931, Dec. 2008.
3 A. Rial, J. Balasch, and B. Preneel, "A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer," IEEE Transactions on Information Forensics and Security, vol. 6, issue 1, pp. 202-212, March 2011.   DOI   ScienceOn
4 L. Quan, C. Zheng, and Z. Zude, "Research on secure buyer-seller watermarking protocol," Journal of Systems Engineering and Electronics, vol. 19, issue 2, pp. 370-376, April 2008.   DOI
5 S.-G. Kwon, S.-H. Lee, K.-R. Kwon, E.-J. Lee, S.-Y. Ok and S.-H. Bae, "Mobile 3D game contents watermarking based on buyer-seller watermarking protocol," IEICE Transaction on Information and System, vol. E91-D, no.7, pp. 2018-2026, July 2008.   DOI   ScienceOn
6 PowerVR SGX, Khronos OpenGL ES 2.0 SDK, Imagination Technology, http://www.imgtec.com/, Accessed to Sept. 2012.
7 A. Jagannathan and E. L. Miller, "Three-dimensional surface mesh segmentation using curvedness-based region growing approach," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 12, pp. 2195-2204, Dec. 2007.   DOI   ScienceOn
8 N. Dyn, K. Hormann, S.J. Kim and D. Levin, "Optimizing 3D triangulations using discrete curvature analysis," Math. Methods for Curves and Surfaces: Oslo 2000, Vanderbilt University Press, pp. 135-146, 2001. http://www.researchgate.net/publication/228909965_Optimizing_3D_triangulations_using_discrete_curvature_analysis/file/9fcfd50aa804db9277.pdf&sa=X&scisig=AAGBfm1rmavfjLLjhh1CiWCN8spsifJABA&oi=scholarr&ei=83niUqjGG4rQkwXHuoFI&ved=0CCYQgAMoADAA
9 R. Ohbuchi, H. Masuda, and M. Aono, "Watermarking three-dimensional polygonal models through geometric and topological modifications," IEEE Journal on Selected Areas in Communications, vol. 16, issue 4, pp. 551-560, May 1998.   DOI   ScienceOn
10 O. Benedens, "Geometry-based watermarking of 3D models," IEEE Computer Graphics and Applications, pp. 46-55, Jan./Feb. 1999.
11 S.-H. Lee and K.-R. Kwon, "A watermarking for 3D-mesh using the patch CEGIs," Digital Signal Processing, vol. 17, issue 2, pp. 396-413, March 2007.   DOI   ScienceOn
12 S.-H. Lee and K.-R. Kwon, "Mesh watermarking based projection onto two convex sets," Multimedia Systems, vol. 13, no. 5-6, pp. 323-330, Feb. 2008.   DOI   ScienceOn
13 J.M. Konstantinides, A. Mademlis, P. Daras, P.A. Mitkas, M.G. Strintzis, "Blind robust 3-D mesh watermarking based on oblate spheroidal harmonics," IEEE Transactions on Multimedia, vol. 11, issue 1, pp. 23-38, Jan. 2009.   DOI
14 K. Kwangtaek, M. Barni, and H.Z. Tan, "Roughness-adaptive 3-D watermarking based on masking effect of surface roughness," IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 721-733, Dec. 2010.   DOI
15 S.-H. Lee and K.-R. Kwon, "CAD drawing watermarking scheme," Digital Signal Processing, vol. 20, issue 5, pp. 1379-1399, Sep. 2010.   DOI
16 Z. Sakr and N.D. Georganas, "Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location," ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 3, no. 3, article 18, Aug. 2007.
17 S.-H. Lee and K.-R. Kwon, "VRML animated model watermarking scheme using geometry and interpolator nodes," Computer-Aided Design, vol. 43, issue 8, pp. 1056-1073, Aug. 2011.   DOI   ScienceOn
18 S.-H. Lee and K.-R. Kwon, "Robust 3D mesh model hashing based on feature object," Digital Signal Processing, vol. 22, issue 5, pp. 744-759, Sep. 2012.   DOI
19 N. Memon and P.W. Wong, "A buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol.10, no.4, pp. 643-649, April 2001.   DOI   ScienceOn
20 C.L. Lei, P.L. Yu, P.L. Tasi, and M.W. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol.13, no.12, pp. 1618-1626, Dec. 2004.   DOI   ScienceOn
21 SIO2 Engine, SIO2Interactive.com, http://sio2interactive.com/, Accessed to Sept. 2012.
22 ShiVa3D, Stonetrip, http://www.stonetrip.com, Accessed to Sept. 2012.
23 Unity3D, Unity Technologies, http://www.unity3d.com, Accessed to Sept. 2012.
24 Corona DSK, Corona, http://www.coronasdk.com, Accessed to Sept. 2012.
25 Unreal Engine 3 (UDK), Unreal Technology, http://www.udk.com/mobile, Accessed to Sept. 2012.
26 Authentec, http://www.authentec.com/, Accessed to Sept. 2012.
27 BuyDRM, http://www.buydrm.com/, Accessed to Sept. 2012.
28 Discretix, http://www.discretix.com/, Accessed to Sept. 2012.
29 $Microsoft^{(R)}$ PlayReady, https://www.microsoft.com/playready/, Accessed to Sept. 2012.
30 L. Ming and A.G. Bors, "Surface-preserving robust watermarking of 3-D shapes," IEEE Transactions on Image Processing, vol. 20, issue 10, pp. 2813-2826, Oct. 2011.   DOI