Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 10, pp 13877–13903 | Cite as

Crypto-watermarking system for safe transmission of 3D multiresolution meshes

  • Ikbel SayahiEmail author
  • Akram Elkefi
  • Chokri Ben Amar
Article
  • 111 Downloads

Abstract

The idea of digitizing documents to be archived or shared has given rise to a variety of new data types such as 3D meshes. The sharing of this data type between remote users, using high-speed computer networks and remote multimedia databases, poses great security problems. As a solution, we propose, in this paper, a new crypto watermarking algorithm. The originality of this work lies in joining cryptography with digital watermarking to secure 3D multiresolution meshes. To this end, three steps should be executed. The first is the watermark preparation. It consists, firstly, in applying the Secure Hash Algorithm 1 algorithm to generate an electronic signature of the mesh source. Secondly, the logo undergoes an encryption using Advanced Encryption Standard algorithm. To end this step, the signature and the encrypted logo pass through a convolutional encoder to obtain a codeword. As for the second step, it is called mesh preparation and it consists in applying a spiral scanning method to the mesh to split it into Groups Of Triangles. For each Group Of Triangles, a wavelet transform is applied to generate the corresponding Wavelet coefficients vector. Finally, embedding data occurs using the cylindrical coordinate system, a modulation and the least Significant Bit method. The experiment of our algorithm proves that it allows a very high insertion rate without influencing the mesh quality. Our algorithm also minimizes the amount of memory used. Moreover, it is robust against the most popular attacks. Our results show that our algorithm presents an improvement in comparison with recently published results.

Keywords

3D watermarking Spiral scanning Wavelet transform SHA1 algorithm AES algorithm Robustness 

Notes

References

  1. 1.
    Benyamin N, Sattar M, Seyed MS, Mohammad RM (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497Google Scholar
  2. 2.
    Charfeddine M, El’arbi M, Ben Amar C (2012) A new DCT audio watermarking scheme based on preliminary MP3 study. Multimed Tools Appl 70(3).  https://doi.org/10.1007/s11042-012-1167-0
  3. 3.
    Chrysafis C, Ortega A (2000) Line-based, reduced memory, wavelet image compression. IEEE Trans Image Process 9(3):378–389MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Cho DJ (2015) Watermarking scheme of mpeg-4 laser object for mobile device. Int J Secur Its Appl 9(1):305–312.  https://doi.org/10.14257/ijsia.2015.9.1.29 Google Scholar
  5. 5.
    Dang QH (2002) Secure hash standard. Federal Information Processing Standards Publication, pp 180–184Google Scholar
  6. 6.
    Dong W, Bin W, Sicheng Z, Hongxun Y, Hong L (2017) View-based 3d object retrieval with discriminative views. Neurocomputing 252(23):58–66Google Scholar
  7. 7.
    Elkefi A (2011) Compression des maillages 3d multiresolutions de grandes précisionsGoogle Scholar
  8. 8.
    Geri B (2015) A robust digital watermarking algorithm for three dimensional meshes. In: International conference on information engineering for mechanics and materials, pp 1105–1110Google Scholar
  9. 9.
    Guedri B, Zaied M, Ben Amar C (2011) Indexing and images retrieval by content. In: 2011 international conference on high performance computing and simulation (HPCS).  https://doi.org/10.1109/HPCSim.2011.5999848
  10. 10.
    Guiguang D, Yuchen G, Jile Z, Yue G (2016) Large-scale cross-modality search via collective matrix factorization hashing. IEEE Trans Image Process 25(11):5427–5440MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Hitendra G, Krishna K, Manish G, Suneeta A (2014) Uniform selection of vertices for watermark embedding in 3-d polygon mesh using ieee754 floating point representation. In: International conference on communication systems and network technologies, pp 788–792Google Scholar
  12. 12.
    Isenburg M, Gumholh S (2003) Out-of-core compression for gigantic polygon meshes. ACM Trans Graph 22(3):935–942.  https://doi.org/10.1145/882262.882366 CrossRefGoogle Scholar
  13. 13.
    Jen-Tse W, Yi-Ching C, Shyr-Shen Y, Chun-Yuan Y (2014) Hamming code based watermarking scheme for 3d model verification. In: International symposium on computer, consumer and control, pp 1095–1098Google Scholar
  14. 14.
    Karthigaikumar P, Soumiya R (2011) Simulation of image encryption using aes algorithm. IJCA Special Issue on Computational Science - New Dimensions and Perspectives (4), 166–172Google Scholar
  15. 15.
    Koubaa M, El’arbi M, Ben Amar C, Nicolas H (2012) Collusion, MPEG4 compression and frame dropping resistant video watermarking. Multimed Tools Appl 56(2):281–301.  https://doi.org/10.1007/s11042-010-0626-8 CrossRefGoogle Scholar
  16. 16.
    Lamiaa B, Saleh HI, Abdelhalim MB (2015) Enhanced watermarking scheme for 3d mesh models. In: International conference on information technology, pp 612–619Google Scholar
  17. 17.
    Lu K, Rongrong J, Jinhui T, Yue G (2014) Learning-based bipartite graph matching for view-based 3d model retrieval. IEEE Trans Image Process 10(23):4553–4563MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Mallat SG (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11(7):674–693.  https://doi.org/10.1109/34.192463 CrossRefzbMATHGoogle Scholar
  19. 19.
    Ouled Zaid A, Hachani M, Puech W (2015) Wavelet-based high-capacity watermarking of 3-d irregular meshes. Multimed Tools Appl 74 (15):5897–5915.  https://doi.org/10.1007/s11042-014-1896-3 CrossRefGoogle Scholar
  20. 20.
    Othmani M, Bellil W, Ben Amar C, Alimi AM (2010) A new structure and training procedure for multi-mother wavelet networks. Int J Wavelets Multiresolution Inf Process 8(1):149–175.  https://doi.org/10.1142/S0219691310003353 MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Pancholi VR, Patel BP (2016) Enhancement of cloud computing security with secure data storage using aes. Int J Innov Res Sci Technol 2(9):18–21Google Scholar
  22. 22.
    Parisot C, Antonini M (2001) Barlaud, m.: 3d scan based wavelet transform for video coding. In: IEEE 4th workshop on multimedia signal processing, pp 403–408Google Scholar
  23. 23.
    Prerna M, Abhishek S (2013) A study of encryption algorithms aes, des and rsa for security. Global J Comput Sci Technol Netw Web Secur 13(15):15–22Google Scholar
  24. 24.
    Roland H, Li X, Huimin Y, Baocang D (2014) Applying 3d polygonal mesh watermarking for transmission security protection through sensor networks. Math Probl Eng 2014(2014):27–40.  https://doi.org/10.1155/2014/305960 MathSciNetzbMATHGoogle Scholar
  25. 25.
    Rolland-Neviere X (2014) Robust 3d watermarkingGoogle Scholar
  26. 26.
    Sayahi I, Elkefi A, Ben Amar C (2006) A multi-resolution approach for blind watermarking of 3d meshes using scanning spiral method. In: International conference on computational intelligence in security for information systems, pp 526–537Google Scholar
  27. 27.
    Sayahi I, Elkefi A, Koubaa M, Ben Amar C (2015) Robust watermarking algorithm for 3d multiresolution meshes. In: International conference on computer vision theory and applications, pp 150–157Google Scholar
  28. 28.
    Sayahi I, Elkefi A, Ben Amar C (2016) Blind watermarking algorithm based on spiral scanning method and error correcting codes. Int J Multimed Tools Appl 76:1–24Google Scholar
  29. 29.
    Sayahi I, Elkefi A, Ben Amar C (2016) Blind watermarking algorithm for 3d multiresolution meshes based on spiral scanning method. Int J Comput Sci Inf Secur 14(6):331–342Google Scholar
  30. 30.
    Sicheng Z, Hongxun Y, Yue G, Rongrong J, Guiguang D (2017) Continuous probability distribution prediction of image emotions via multitask shared sparse regression. IEEE Trans Multimed 19(3):632–645CrossRefGoogle Scholar
  31. 31.
    Sicheng Z, Lujun C, Hongxun Y, Yanhao Z, Xiaoshuai S (2015) Strategy for dynamic 3d depth data matching towards robust action retrieval. Neurocomputing 151(2):533–543Google Scholar
  32. 32.
    Sweldens W (1989) The lifting scheme: a construction of second generation wavelets. SIAM J Math Anal 29(2):511–546.  https://doi.org/10.1137/S0036141095289051 MathSciNetCrossRefzbMATHGoogle Scholar
  33. 33.
    Tamane SC, Deshmukh RR (2012) Blind 3d model watermarking based on multi-resolution representation and fuzzy logic. Int J Computer Sci Inf Technol 4(1):117–136. arXiv:1203.2485v1 Google Scholar
  34. 34.
    Tariq S, Ayesha Q (2016) Encrypting grayscale images using s8 sboxes chosen by logistic map. Int J Comput Sci Inf Secur 14(4):440–444Google Scholar
  35. 35.
    Tsai YY (2015) An efficient 3d information hiding algorithm based on sampling concepts. Multimed Tools Appl 74(34):1–17.  https://doi.org/10.1007/s11042-015-2707-1 Google Scholar
  36. 36.
    Tsai YY (2016) A secret 3d model sharing scheme with reversible data hiding based on space subdivision. 3D Res 7(1):1–14.  https://doi.org/10.1007/s13319-015-0078-z
  37. 37.
    Umamageswari A, Suresh G (2014) Novel algorithm for secure medical image communication using roi based digital lossless watermarking and ds. Int J Appl Eng Res 9(22):12,163–12,176Google Scholar
  38. 38.
    Viterbi A (1971) Convolutional codes and their performance in communication systems. IEEE Transactions on Communication Technology 19(5):751–772MathSciNetCrossRefGoogle Scholar
  39. 39.
    Wadi SM, Nasharuddin Z (2014) High definition image encryption algorithm based on aes modification. Wirel Pers Commun 79(2):811–829CrossRefGoogle Scholar
  40. 40.
    Wali A, Ben Aoun N, Karray H, Ben Amar C, Alimi AM (2010) A new system for event detection from video surveillance sequences. Proceedings of the 12th international conference on advanced concepts for intelligent vision systems, ACIVS 2010. Part I. Sydney, Australia, December 13–16, 2010.  https://doi.org/10.1007/978-3-642-17691-3_11
  41. 41.
    Xiangjiu C, Zhanheng G (2012) Watermarking algorithm for 3d mesh based on multi-scale radial basis functions. Int J Parallel Emerg Distrib Syst 27(2):133–141.  https://doi.org/10.1080/17445760.2011.574631 CrossRefGoogle Scholar
  42. 42.
    Xiao Z, Qing Z (2012) A dct-based dual watermarking algorithm for three-dimensional mesh models. In: International conference on consumer electronics, communications and networks, pp 1509–1513Google Scholar
  43. 43.
    Ying Y, Ruggero P, Holly R, Ioannis I (2016) A 3d steganalytic algorithm and steganalysis-resistant watermarking. In: IEEE transactions on visualization and computer graphicsGoogle Scholar
  44. 44.
    Zhao S, Yao H, Zhang Y, Wang Y, Liu S (2015) View-based 3d object retrieval via multi-modal graph learning. Signal Process 112(C):110–118CrossRefGoogle Scholar
  45. 45.
    Zhiyong S, Weiqing L, Jianshou K, Yuewei D, Weiqing T (2013) Watermarking 3d capd models for topology verification. Computer-Aided Design 45(7):1042–1052.  https://doi.org/10.1016/j.cad.2013.04.001 CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Research Group on Intelligent Machines (REGIM), ENISUniversity of SfaxSfaxTunisia
  2. 2.College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia

Personalised recommendations