Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes Fingerprinting

Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes Fingerprinting

Emad E. Abdallah, Ibrahim Al-Oqily, Alaa E. Abdallah, Ahmed F. Otoom, Ayoub Alsarhan
DOI: 10.4018/ijitwe.2014100104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this paper, the authors present a robust three-dimensional fingerprint algorithm for verification, indexing, and identification. The core idea behind our technique is to apply the eigen-decomposition to the mesh Laplacian matrix, and then compute minimum spanning trees (MST) of several concentrations of the mesh shape structure. The fixed size hash vector of a 3D mesh is defined in terms of the MST values and number of the initial patches. The extensive experimental results on several 3D meshes prove the uniqueness of the extracted hash vectors and the robustness of the proposed technique against the most common attacks including distortion-less attacks, compression, noise, smoothing, scaling, rotation as well as mixtures of these attacks.
Article Preview
Top

1. Introduction

The usage of digital multimedia data such as movies, television broadcasts, 3D models and similar digital products has grown rapidly over the last few years. Nowadays it is easier for multimedia element to be transmitted over the internet. Obviously, the data could be entirely photocopied or customized and retransmitted. Thus digital copyright protection and fingerprinting to ensure the authentication and the integrity of multimedia elements has long been the core of the digital data security research. Its importance is growing quickly due to the increasing problem of the illegal replication and the prohibited digital content modification.

The problem of 3D object hashing and watermarking is relatively new field as compared to 2D watermarking and hashing (Cox, Miller, & Bloom, 2002; Mihak & Venkatesan, 2001; Venkatesan, Koon, Jakubowski, & Moulin, 2000; Swaminathan, Mao, & Wu, 2006; Fridrich, 2000; Abdallah, Hamza, & Bhattacharya, 2006; Lin, Zsu, Oria, & Ng, 2001). It has received less attention partially because the technology that has been used for the 2D images and videos analysis cannot be easily adapted to 3D objects. Moreover, 3D meshes can be effortlessly altered by several graphics attacks without changing the general shape of the model.

Hash functions could assist in guaranteeing the authentication and the integrity of the multimedia element. The authenticity of the digital data can be verified by recalculating the fingerprint value from the underlying data and judging it against the attached fingerprint value (Fridrich, 2000; Abdallah et al., 2006). In addition, the multimedia hashes are used in content-based recovery from databases (Lin et al., 2001).

There has been significant research on image hashing for more than a decade. In Venkatesan et al. (2000) a robust image hashing is introduced. The algorithm employs arbitrary signal processing approaches for a nonreversible compression of images into random binary strings. Experiments show robustness against image changes due to compression, geometric distortions, and other attacks. Fourier transforms features and controlled randomization was used in (Fridrich, 2000) to generate a robust image hash. In (Mihak & Venkatesan, 2001) an image hashing prototype that employs geometric skins is proposed, it creates unpredictable randomized output. The technique has been modified for robust multimedia classification, identification and watermarking. Another image hashing technique is presented in (Monga & Evans, 2006), where several feature points is extracted for perceptual image hashing. The chosen feature points maintain the geometry and steady to perceptually irrelevant deformations. Statistical analysis is employed for image hashing and watermarking (Cannons & Moulin, 2004), where the hash is chosen from undisclosed division of the discrete cosine transforms of an image and the watermark is embedded using multiplicative technique.

Complete Article List

Search this Journal:
Reset
Volume 19: 1 Issue (2024)
Volume 18: 1 Issue (2023)
Volume 17: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 16: 4 Issues (2021)
Volume 15: 4 Issues (2020)
Volume 14: 4 Issues (2019)
Volume 13: 4 Issues (2018)
Volume 12: 4 Issues (2017)
Volume 11: 4 Issues (2016)
Volume 10: 4 Issues (2015)
Volume 9: 4 Issues (2014)
Volume 8: 4 Issues (2013)
Volume 7: 4 Issues (2012)
Volume 6: 4 Issues (2011)
Volume 5: 4 Issues (2010)
Volume 4: 4 Issues (2009)
Volume 3: 4 Issues (2008)
Volume 2: 4 Issues (2007)
Volume 1: 4 Issues (2006)
View Complete Journal Contents Listing