DOI QR코드

DOI QR Code

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol

  • Lee, Suk-Hwan (Department of Information Security, Tongmyong University) ;
  • Kwon, Seong-Geun (Department of Electronics Engineering, KyungIl University) ;
  • Kwon, Ki-Ryong (Department of IT Convergene and Application Engineering, Pukyong National University)
  • Received : 2013.08.29
  • Accepted : 2014.01.24
  • Published : 2014.02.27

Abstract

This paper presents a multiple-watermarking scheme for copyright protection and the prevention of illegal copying of mobile 3D contents with low resolution. The proposed scheme embeds a unique watermark and a watermark certification authority (WCA) watermark into the spatial and encryption domains of a mobile 3D content based on the buyer-seller watermarking protocol. The seller generates a unique watermark and embeds it into the local maximum curvedness of a 3D object. After receiving the encrypted watermark from the WCA, the seller embeds it into the encrypted vertex data using an operator that satisfies the privacy homomorphic property. The proposed method was implemented using a mobile content tool, and the experimental results verify its capability in terms of copyright protection and the prevention of illegal copying.

Keywords

References

  1. SIO2 Engine, SIO2Interactive.com, http://sio2interactive.com/, Accessed to Sept. 2012.
  2. ShiVa3D, Stonetrip, http://www.stonetrip.com, Accessed to Sept. 2012.
  3. Unity3D, Unity Technologies, http://www.unity3d.com, Accessed to Sept. 2012.
  4. Corona DSK, Corona, http://www.coronasdk.com, Accessed to Sept. 2012.
  5. Unreal Engine 3 (UDK), Unreal Technology, http://www.udk.com/mobile, Accessed to Sept. 2012.
  6. Authentec, http://www.authentec.com/, Accessed to Sept. 2012.
  7. BuyDRM, http://www.buydrm.com/, Accessed to Sept. 2012.
  8. Discretix, http://www.discretix.com/, Accessed to Sept. 2012.
  9. $Microsoft^{(R)}$ PlayReady, https://www.microsoft.com/playready/, Accessed to Sept. 2012.
  10. R. Ohbuchi, H. Masuda, and M. Aono, "Watermarking three-dimensional polygonal models through geometric and topological modifications," IEEE Journal on Selected Areas in Communications, vol. 16, issue 4, pp. 551-560, May 1998. https://doi.org/10.1109/49.668977
  11. O. Benedens, "Geometry-based watermarking of 3D models," IEEE Computer Graphics and Applications, pp. 46-55, Jan./Feb. 1999.
  12. S.-H. Lee and K.-R. Kwon, "A watermarking for 3D-mesh using the patch CEGIs," Digital Signal Processing, vol. 17, issue 2, pp. 396-413, March 2007. https://doi.org/10.1016/j.dsp.2005.04.014
  13. S.-H. Lee and K.-R. Kwon, "Mesh watermarking based projection onto two convex sets," Multimedia Systems, vol. 13, no. 5-6, pp. 323-330, Feb. 2008. https://doi.org/10.1007/s00530-007-0095-8
  14. J.M. Konstantinides, A. Mademlis, P. Daras, P.A. Mitkas, M.G. Strintzis, "Blind robust 3-D mesh watermarking based on oblate spheroidal harmonics," IEEE Transactions on Multimedia, vol. 11, issue 1, pp. 23-38, Jan. 2009. https://doi.org/10.1109/TMM.2008.2008913
  15. K. Kwangtaek, M. Barni, and H.Z. Tan, "Roughness-adaptive 3-D watermarking based on masking effect of surface roughness," IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 721-733, Dec. 2010. https://doi.org/10.1109/TIFS.2010.2068546
  16. L. Ming and A.G. Bors, "Surface-preserving robust watermarking of 3-D shapes," IEEE Transactions on Image Processing, vol. 20, issue 10, pp. 2813-2826, Oct. 2011. https://doi.org/10.1109/TIP.2011.2142004
  17. S.-H. Lee and K.-R. Kwon, "CAD drawing watermarking scheme," Digital Signal Processing, vol. 20, issue 5, pp. 1379-1399, Sep. 2010. https://doi.org/10.1016/j.dsp.2010.01.003
  18. Z. Sakr and N.D. Georganas, "Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location," ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 3, no. 3, article 18, Aug. 2007.
  19. S.-H. Lee and K.-R. Kwon, "VRML animated model watermarking scheme using geometry and interpolator nodes," Computer-Aided Design, vol. 43, issue 8, pp. 1056-1073, Aug. 2011. https://doi.org/10.1016/j.cad.2011.03.003
  20. S.-H. Lee and K.-R. Kwon, "Robust 3D mesh model hashing based on feature object," Digital Signal Processing, vol. 22, issue 5, pp. 744-759, Sep. 2012. https://doi.org/10.1016/j.dsp.2012.04.015
  21. N. Memon and P.W. Wong, "A buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol.10, no.4, pp. 643-649, April 2001. https://doi.org/10.1109/83.913598
  22. C.L. Lei, P.L. Yu, P.L. Tasi, and M.W. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol.13, no.12, pp. 1618-1626, Dec. 2004. https://doi.org/10.1109/TIP.2004.837553
  23. S. Katzenbeisser, A. Lemma, M.U. Celik, M. Van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Transactions on Information Forensics and Security, vol. 3 , issue 4, pp. 783-786, Dec. 2008. https://doi.org/10.1109/TIFS.2008.2002939
  24. A. Rial, Mina Deng, T. Bianchi, A. Piva, and B. Preneel, "A provably secure anonymous buyer-seller watermarking protocol," IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 920-931, Dec. 2008.
  25. A. Rial, J. Balasch, and B. Preneel, "A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer," IEEE Transactions on Information Forensics and Security, vol. 6, issue 1, pp. 202-212, March 2011. https://doi.org/10.1109/TIFS.2010.2095844
  26. L. Quan, C. Zheng, and Z. Zude, "Research on secure buyer-seller watermarking protocol," Journal of Systems Engineering and Electronics, vol. 19, issue 2, pp. 370-376, April 2008. https://doi.org/10.1016/S1004-4132(08)60094-8
  27. S.-G. Kwon, S.-H. Lee, K.-R. Kwon, E.-J. Lee, S.-Y. Ok and S.-H. Bae, "Mobile 3D game contents watermarking based on buyer-seller watermarking protocol," IEICE Transaction on Information and System, vol. E91-D, no.7, pp. 2018-2026, July 2008. https://doi.org/10.1093/ietisy/e91-d.7.2018
  28. PowerVR SGX, Khronos OpenGL ES 2.0 SDK, Imagination Technology, http://www.imgtec.com/, Accessed to Sept. 2012.
  29. A. Jagannathan and E. L. Miller, "Three-dimensional surface mesh segmentation using curvedness-based region growing approach," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 12, pp. 2195-2204, Dec. 2007. https://doi.org/10.1109/TPAMI.2007.1125
  30. N. Dyn, K. Hormann, S.J. Kim and D. Levin, "Optimizing 3D triangulations using discrete curvature analysis," Math. Methods for Curves and Surfaces: Oslo 2000, Vanderbilt University Press, pp. 135-146, 2001. http://www.researchgate.net/publication/228909965_Optimizing_3D_triangulations_using_discrete_curvature_analysis/file/9fcfd50aa804db9277.pdf&sa=X&scisig=AAGBfm1rmavfjLLjhh1CiWCN8spsifJABA&oi=scholarr&ei=83niUqjGG4rQkwXHuoFI&ved=0CCYQgAMoADAA