Title: Robust%20Mesh%20Watermarking
1Robust Mesh Watermarking
Emil Praun Hugues Hoppe Adam Finkelstein
Princeton University Microsoft Research Princeton
University
2Watermarking Applications
- Authentication / localization of changes
- Fragile watermarks
- Ownership protection
- Robust watermarks
- Tracing of distribution channels
- Fingerprints
3Watermarking Applications
- Authentication / localization of changes
- Fragile watermarks
- Ownership protection
- Robust watermarks
- Tracing of distribution channels
- Fingerprints
4Motivating Scenario
- 1. Alice creates a 3D shape,and publishes it on
the web.
2. Bob sells it as his own.
3. How can Alice prove ownership?(and make Bob
pay her a lot of money)
5Digital Watermarks
kept secret
originaldocument
watermark
6Incidental Attacks
- Filtering smoothing
- A/D D/A conversions
- Scaling
- Rotation
- Cropping
7Malicious Attacks
- Adding noise
- Adding another watermark
- Resampling
- Statistical analysis
8Our Goal
- Watermarking scheme for 3D models
- Robust against attacks
- Works on arbitrary meshes
- Preserves original connectivity
- Imperceptible
9Previous Watermarking
- Cox et al. 97 Introduce spread-spectrum for
images - Ohbuchi et al. 98 3 schemes fragile under
resampling - Kanai et al. 98 Requires subdivision
connectivity meshes - Benedens 99 Redistributes face normals by
moving vertices
10Spread-Spectrum Watermarking
- Transform to frequency space
- Cox et al. 97
DCT
frequency domain
image
11Spread-Spectrum
Salient features ? largest coefficients
Perturb coefficients slightly to embed signal
- Image basis function ? DCT coefficient
12Our Approach
- Extend spread-spectrum method to meshes
- Problem no DCT
- Solution multiresolution representation
- Problem no natural sampling
- Solution registration resampling
13Replacing DCT Basis Functions
image
mesh
cosine basis
- Multiresolution ? frequency information
- Progressive mesh Hoppe 96
14Multiresolution Neighborhoods
- Naturally correspond to important features
- Provide hints on allowable perturbation
15Scalar Basis Function ?i
amplitude? i
directiondi
16Watermark Insertion
Construct basis functions ? 1 ? m
17Watermark Insertion
- Construct basis functions ? 1 ? m
- Perturb each vertex
basis function coefficient
watermark direction
watermark coefficient
18Watermark Extraction
- Get points v on attacked mesh surface
corresponding to original mesh vertices v - Use same basis functions ? 1 ? m and hence
same matrix B - Solve least-squares system for w
19False-Positive Probability
- Correlation ? lt w,w gt
- Pfp computed from ? and m using Students
t-test - Declare watermark present if Pfp lt Pthresh
( e.g. Pthresh 10-6 )
20Process
(1) original mesh
(2) watermarked
(exaggerated)
(3) suspect mesh
(4) registered
(5) resampled
21Registration Resampling
- Registration
- Chen Medioni 92
- Resampling choices
- Closest point projection
- Ray-casting along local normal
- Global deformation of original
22Global Deformation
- Deform original mesh to fit suspect mesh
- Minimize
- Inter-mesh distance( vertex springs )
- Deformation( edge springs )
- Penalty for flipped triangles
- Accurate, but slow
Suspect mesh
Optimized mesh
23Results
10-29
10-7
similarity
1/2 faces
watermarked mesh
10-6
10-7
watermarked mesh
2nd watermark
noise
24Results
0
10-13
watermarked mesh
cropped
1/8 faces
10-2
10-12
smoothing
all attacks
watermarked mesh
25Summary
- Robust watermarking for 3D meshes
- Spread-spectrum
- Basis functions from multiresolution analysis
- Resampling as global optimization
- Resilient to a variety of attacks
26Future Work
- Consider other attacks
- General affine and projective transforms
- Free-form deformations! StirMark by Petitcolas
- Explore other basis functions
- e.g. Guskov et al. 99
- Fast mesh recognition ? web crawler