Fragile Watermarking Techniques for 3D Model Authentication: Review

  • Kariman M. MabroukEmail author
  • Noura A. Semary
  • Hatem Abdul-Kader
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 921)


The need for multimedia data in many fields such as industry, medicine, and entertainment has become a common need nowadays. 3D graphics, as a type of multimedia, attracts the attention of many researchers. The spread of programs that are used to modify and duplicate this data easily leads to increase the necessity to develop a variety of watermark technologies for various protection purposes such as copyrights protection and authentication. In this study, we provide a review study of fragile watermarking techniques for 3D models over the last decade and clarify what are the criteria and requirements for design such systems. We briefly show the different types of 3D models representation and what are the most common kinds of attacks could be applied to them, and finally discuss the challenges encountered at designing such techniques.


3D model Fragile watermarking Content authentication Attacks 


  1. 1.
    Chou, C.M., Tseng, D.C.: Technologies for 3D model watermarking: a survey. Int. J. Comput. Sci. Netw. Secur. 7(2), 328–334 (2007)Google Scholar
  2. 2.
    Bors, A.G.: Watermarking mesh-based representations of 3-D objects using local moments. IEEE Trans. Image Process. 15(3), 687–701 (2006)CrossRefGoogle Scholar
  3. 3.
    Ohbuchi, R., Masuda, H., Aono, M.: Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Sel. Areas Commun. 16(4), 551–560 (1998)CrossRefGoogle Scholar
  4. 4.
    Dugelay, J.L., Baskurt, A., Daoudi, M. (eds.): 3D Object Processing: Compression Indexing and Watermarking. Wiley, Hoboken (2008)Google Scholar
  5. 5.
    Ichikawa, S., Chiyama, H., Akabane, K.: Redundancy in 3D polygon models and its application to digital signature. J. WSCG 10(1), 225–232 (2002)Google Scholar
  6. 6.
    Wu, H.T., Cheung, Y.M.: Public authentication of 3D mesh models. In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings) (WI 2006), Hong Kong, pp. 940–948, December 2006Google Scholar
  7. 7.
    Bennour, J., Dugelay, J.L.: Protection of 3D object visual representations. In: 2006 IEEE International Conference on Multimedia and Expo, Toronto, Ontario, pp. 1113–1116, July 2006Google Scholar
  8. 8.
    Bennour, J., Dugelay, J.L.: Protection of 3D object through silhouette watermarking. In: 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, Toulouse, pp. 221–224, May 2006Google Scholar
  9. 9.
    Sales, M.M., Rondao Alface, P., Macq, B.: 3D objects watermarking and tracking of their visual representations. In: The Third International Conferences on Advances in Multimedia (2011)Google Scholar
  10. 10.
    Werghi, N., Medimegh, N., Gazzah, S.: Watermarking of 3D triangular mesh models using ordered ring facets. In: 10th International Multi-Conference on Systems, Signals and Devices, SSD, pp. 1–6 (2013)Google Scholar
  11. 11.
    Mao, X., Shiba, M., Imamiya, A.: Watermarking 3D geometric models through triangle subdivision. In: Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 253–260, August 2001Google Scholar
  12. 12.
    Yeo, B.L., Yeung, M.M.: Watermarking 3D objects for verification. IEEE Comput. Graph. Appl. 19(1), 36–45 (1999)CrossRefGoogle Scholar
  13. 13.
    Lin, H.Y., Liao, H.Y., Lu, C.S., Lin, J.C.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997–1006 (2005)CrossRefGoogle Scholar
  14. 14.
    Chou, C.M., Tseng, D.C.: A public fragile watermarking scheme for 3D model authentication. Comput. Aided Des. 38(11), 1154–1165 (2006)CrossRefGoogle Scholar
  15. 15.
    Cayre, F., Macq, B.: Data hiding on 3-D triangle meshes. IEEE Trans. Signal Process. 51(4), 939–949 (2003)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Tsai, Y.Y., Tsai, Y.S., Chang, C.C.: An improved region-based tampered detection algorithm for 3D polygonal models. In: 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, pp. 1163–1166 (2018)Google Scholar
  17. 17.
    Chou, C.M., Tseng, D.C.: Affine-transformation-invariant public fragile watermarking for 3D model authentication. IEEE Comput. Graph. Appl. 29(2), 72–79 (2009)CrossRefGoogle Scholar
  18. 18.
    Huang, C.C., Yang, Y.W., et al.: Spherical coordinate based fragile watermarking scheme for 3D models. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 566–571. Springer, Heidelberg, June 2013Google Scholar
  19. 19.
    Molaei, A.M., Ebrahimnezhad, H., Sedaaghi, M.H.: A blind fragile watermarking method for 3D models based on geometric properties of triangles. 3D Res. 4(4), 4 (2013)CrossRefGoogle Scholar
  20. 20.
    Tao, X., Zhao-Quan, C.: A novel semi-fragile watermarking algorithm for 3D mesh models. In: 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 782–785 (2012)Google Scholar
  21. 21.
    Wang, W.B., Zheng, G.Q., Yong, J.H., Gu, H.J.: A numerically stable fragile watermarking scheme for authenticating 3D models. Comput. Aided Des. 40(5), 634–645 (2008)CrossRefGoogle Scholar
  22. 22.
    Wang, Y.P., Hu, S.M.: A new watermarking method for 3D models based on integral invariants. IEEE Trans. Vis. Comput. Graph. 15(2), 285–294 (2009)CrossRefGoogle Scholar
  23. 23.
    Chen, T.Y., Hwang, M.S., Jan, J.K.: Adaptive authentication schemes for 3D mesh models. Int. J. Innovative Comput. Inf. Control 5(12), 4561–4572 (2009)Google Scholar
  24. 24.
    Wang, J.T., et al: Hamming code based watermarking scheme for 3D model verification. In: 2014 International Symposium on Computer, Consumer and Control (I3C), Taichung, pp. 1095–1098 (2014)Google Scholar
  25. 25.
    Wang, J.T., et al.: Error detecting code based fragile watermarking scheme for 3D models. In: 2014 International Symposium on Computer, Consumer and Control (I3C), Taichung, pp. 1099–1102, June 2014Google Scholar
  26. 26.
    Chang, Y.C., et al.: An error-detecting code based fragile watermarking scheme in spherical coordinate system. In: 2016 International Symposium on Computer, Consumer and Control (IS3C), Xi’an, pp. 287–290, July 2016Google Scholar
  27. 27.
    Wang, J.T., et al.: A novel chaos sequence based 3D fragile watermarking scheme. In: 2014 International Symposium on Computer, Consumer and Control (IS3C), Taichung, pp. 745–748, June 2014Google Scholar
  28. 28.
    Lavoué, G.: A roughness measure for 3D mesh visual masking. In: Proceedings of the 4th Symposium on Applied perception in Graphics and Visualization, pp. 57–60. ACM (2007)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Kariman M. Mabrouk
    • 1
    Email author
  • Noura A. Semary
    • 1
    • 2
  • Hatem Abdul-Kader
    • 1
  1. 1.Faculty of Computers and InformationMenoufia UniversityMenoufiaEgypt
  2. 2.Faculty of Computers and Information TechnologyJeddah UniversityKhulaisKingdom of Saudi Arabia

Personalised recommendations