Method for embedding and detecting watermark based on vertex distribution feature digital three-dimensional model
A technology of 3D model and watermark embedding, applied in image data processing, image data processing, instruments, etc., can solve the problems of few types of attack resistance, inability to effectively protect the copyright of 3D models, and inability to effectively resist joint attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific example 1
[0168] Specific example 1: In the bunny model (see image 3 ) application on
[0169] 1. Watermark embedding
[0170] The embedded digital watermark is:
[0171] 1111110100101011101010100110000100100000000101100000000010001000
[0172] 2. Watermark detection
[0173] Geometry attack, vertex disorder, noise, simplification, clipping, quantization, smoothing, subdivision and joint attack are carried out on the bunny model after embedding the watermark. The attack is carried out using the 3-D Mesh Watermarking Benchmark software developed by LIRIS laboratory. Watermark detection is performed on the bunny model after the attack to verify the robustness of this technology. The experimental results are shown in Table 1. It can be seen from the experimental results that the watermark extracted from the model to be detected and the original watermark have high correlation values after various attacks by applying the present invention, indicating that the present invention can b...
specific example 2
[0176] Specific example 2: In the camel model (see Figure 4 ) application on
[0177] 1. Watermark embedding
[0178] The embedded digital watermark is:
[0179] 0001111111000010000011000000100000000110101010110000111110010010
[0180] 2. Watermark detection
[0181] Geometry attack, vertex disorder, noise, simplification, clipping, quantization, smoothing, subdivision and joint attack are carried out on the camel model after embedding the watermark. The attack is carried out using the 3-D Mesh Watermarking Benchmark software developed by LIRIS laboratory. Watermark detection is performed on the attacked camel model to verify the robustness of this technology. The experimental results are shown in Table 2.
[0182] Table 2 camel model experimental results
[0183]
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 