Embedding data in 3D models
The recent popularity of digital media such as CD-ROM and the Internet has prompted exploration of techniques for embedding data, either visibly or invisibly, into text, image, and audio objects. Applications of such data embedding include copyright identification, theft deterrence, and inventory.
This paper discusses techniques for embedding data into 3D models. Given objects consisting of points, lines, (connected) polygons, or curved surfaces, the algorithms described in this paper produce polygonal models with data embedded into either their vertex coordinates, their vertex topology (connectivity), or both.
A description of the background and requirements is followed by a discussion of where, and by what fundamental methods, data can be embedded into 3D polygonal models. The paper then presents several data-embedding algorithms, with examples, based on these fundamental methods.
Additional keywords3D graphics data hiding digital watermarking steganography geometric modeling copyright protection
Unable to display preview. Download preview PDF.
- [Berghel96]H. Berghel and L. O'Gorman, Protecting Ownership Rights Through Digital Watermarking, IEEE Computer, July 1996, pp101–103.Google Scholar
- [Braudway96]G. Braudway, K. Magerlein, and F. Mintzer, Protecting Publicly-Available Images with a Visible Image Watermark, IBM Research Report, TC-20336 (89918), January 15, 1996.Google Scholar
- [Cox95]I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, Technical Report 95-10, NEC Research Institute, 1995.Google Scholar
- [Farin96]G. Farin, Curves and Surfaces for CAGD: a Practical guide, 4th edition, Academic Press, 1996.Google Scholar
- [ISO96]ISO/IEC JTC1 SC24/N1596 CD #14772 Virtual Reality Model Language (VRML 2.0)Google Scholar
- [Masuda96]H. Masuda, Topological operations for non-manifold geometric modeling and their applications, Ph. D dissertation, Department of Precision Machinery Engineering, University of Tokyo, 1996 (in Japanese).Google Scholar
- [O'Rourke94]J. O'Rourke, Computational Geometry in C, Cambridge University Press, 1994.Google Scholar
- [O'Ruanaidh96]J. J. K. O'Ruanaidh, W. J. Dowling, and F. M. Boland, Watermarking digital images for copyright protection, IEE Proceedings on Vision, Image, and Signal Processing, Vol. 143, No. 4, pp.250–256.Google Scholar
- [Pfitzmann96]B. Pfitzmann, Information Hiding Terminology, in R. Anderson, Ed., Lecture Notes in Computer Science No. 1174, pp347–350, Springer-Verlag, 1996.Google Scholar
- [Schneier96]B. Schneier, Applied Cryptography, Second edition, John Wiley & Sons, Inc., New York, 1996.Google Scholar
- [Smith96]J. R. Smith and B. O. Comiskey, Modulation and Information Hiding in Images, in R. Anderson, Ed., Lecture Notes in Computer Science No.1174, pp207–296, Springer-Verlag, 1996.Google Scholar
- [Tanaka90]K. Tanaka, Y. Nakamura, and K. Matsui, Embedding Secret Information into a Dithered Multilevel Image, Proc. 1990 IEEE Military Communications Conference, pp216–220, 1990.Google Scholar
- [Walton95]S. Walton, Image Authentication for a Slippery New Age, Dr. Dobb's Journal, April 1995.Google Scholar
- [Weiler86]K. Weiler, The Radial Edge Structure: A Topological Representation for Non-Manifold Geometric Boundary Modeling, Geometric Modeling for CAD Applications, North Holland, pp3–36, May 1986.Google Scholar
- [Zhao96]J. Zhao and E. Koch, Embedding Robust Labels into Images for Copyright Protection, Proc. of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge, and New Technologies, Vienna, August 1995.Google Scholar