计算机工程与应用
計算機工程與應用
계산궤공정여응용
COMPUTER ENGINEERING AND APPLICATIONS
2014年
4期
98-102
,共5页
张建海%温显斌%雷鸣%徐海霞%钦潺%刘菁
張建海%溫顯斌%雷鳴%徐海霞%欽潺%劉菁
장건해%온현빈%뢰명%서해하%흠잔%류정
三维水印%离散小波变换(DWT)%主成分分析(PCA)%网格显著区域%仿射攻击
三維水印%離散小波變換(DWT)%主成分分析(PCA)%網格顯著區域%倣射攻擊
삼유수인%리산소파변환(DWT)%주성분분석(PCA)%망격현저구역%방사공격
3D watermarking%Discrete Wavelet Transform(DWT)%Principal Component Analysis(PCA)%mesh saliency%affine attacks
大部分三维数字水印算法更多地关注水印的鲁棒性而忽视了三维模型的视觉效果。为了解决这一问题,提出了一种基于小波变换的三维网格数字水印新算法,该算法以典型的三角网格模型作为水印载体。提取三维模型中的显著区域,并将三维模型进行旋转归一化处理,以此保证对三维模型平移、缩放或旋转攻击都有很强的鲁棒性;将三维模型转化到球面坐标下并进行小波变换,在低频和高频系数下嵌入水印;经过小波逆变换得到嵌入水印后的三维模型,实验结果表明提出的算法既对多类攻击方式具有鲁棒性,又保持了三维模型的视觉效果。
大部分三維數字水印算法更多地關註水印的魯棒性而忽視瞭三維模型的視覺效果。為瞭解決這一問題,提齣瞭一種基于小波變換的三維網格數字水印新算法,該算法以典型的三角網格模型作為水印載體。提取三維模型中的顯著區域,併將三維模型進行鏇轉歸一化處理,以此保證對三維模型平移、縮放或鏇轉攻擊都有很彊的魯棒性;將三維模型轉化到毬麵坐標下併進行小波變換,在低頻和高頻繫數下嵌入水印;經過小波逆變換得到嵌入水印後的三維模型,實驗結果錶明提齣的算法既對多類攻擊方式具有魯棒性,又保持瞭三維模型的視覺效果。
대부분삼유수자수인산법경다지관주수인적로봉성이홀시료삼유모형적시각효과。위료해결저일문제,제출료일충기우소파변환적삼유망격수자수인신산법,해산법이전형적삼각망격모형작위수인재체。제취삼유모형중적현저구역,병장삼유모형진행선전귀일화처리,이차보증대삼유모형평이、축방혹선전공격도유흔강적로봉성;장삼유모형전화도구면좌표하병진행소파변환,재저빈화고빈계수하감입수인;경과소파역변환득도감입수인후적삼유모형,실험결과표명제출적산법기대다류공격방식구유로봉성,우보지료삼유모형적시각효과。
In recent years, existing 3D digital watermarking algorithm focuses more on the robustness against adverse attacks rather than the visual quality. This paper proposes a new method based on Discrete Wavelet Transform(DWT), which in large measure improved the visual quality of the embedded 3D content. This algorithm selects the traditional 3D triangular mesh and begins by calculating the mesh saliency region of the 3D content, in the meantime, conducting the process of the Principal Component Analysis(PCA)to original 3D content, which obtaines the powerful robustness to the affine attacks such as translation, scaling and rotation attacks. Then it conducts the discrete wavelet transform to the spherical coordinate of the processed 3D content, embedding the watermark information into both low coefficients and high coefficients. The final watermarked 3D content can be obtained through the inverse discrete wavelet transform of the modified coefficients. The experimental results show that this algorithm not only has the strong robustness to possible attacks but also keeps the excellent visual quality of the 3D content.