Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission
The wide range of applications of 3D meshes and the birth of very high-speed networks for storing 3D models in remote multimedia databases have made the copyright protection of these objects a necessity. In order to contribute to safe sharing, transfer and indexing of 3D multiresolution meshes, a ne...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2022-11, Vol.81 (27), p.38543-38567 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 38567 |
---|---|
container_issue | 27 |
container_start_page | 38543 |
container_title | Multimedia tools and applications |
container_volume | 81 |
creator | Jallouli, Malika Sayahi, Ikbel Mabrouk, Anouar Ben |
description | The wide range of applications of 3D meshes and the birth of very high-speed networks for storing 3D models in remote multimedia databases have made the copyright protection of these objects a necessity. In order to contribute to safe sharing, transfer and indexing of 3D multiresolution meshes, a new crypto-watermarking approach is proposed based on spherical harmonics and AES encryption algorithm. Data to be inserted, in this case, is a grayscale image already encrypted using AES256 algorithm. The host mesh, to be watermarked, is decomposed using spherical harmonics to extract frequency coefficients and to compute optimal order for reconstruction. These coefficients undergo two watermarking iterations. During each round, modulation, insertion using quantification method and demodulation steps are implemented. Finally, reconstruction of watermarked mesh using a minimal number of coefficients is conducted. The results established show clearly that our algorithm protects the mesh quality even with the insertion of a large amount of information (a whole image) while ensuring real time execution. The application of various attacks (noise addition, coordinate quantization, smoothing, translation, rotation, uniform scaling and compression) to a watermarked mesh did not prevent the correct retrieval of inserted information. Our approach presents then an enhancement compared to existing ones. |
doi_str_mv | 10.1007/s11042-022-13113-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2725718672</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2725718672</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-25747dc554359bacfa552267453093785510ed001c9e93b8fc355e41b274283c3</originalsourceid><addsrcrecordid>eNp9kMtOwzAURC0EEqXwA6wssTb4EcfJsirlIVVC4rG2HMdpUho7-KZC_XsMQWLH6s5iZq7mIHTJ6DWjVN0AYzTjhHJOmGBMkPwIzZhUgijF2XHSoqBEScpO0RnAllKWS57N0PAcqj2M2MbDMAbyaUYXexPfO7_BZhhiMLbFlQFX4-AxDK2LnTU73JrYB99ZwMbXeLF6wWa3CbEb2x43IWJxi3sHLQbTODxG46HvALrgz9FJY3bgLn7vHL3drV6XD2T9dP-4XKyJFawcCZcqU7WVMhOyrIxtjJSc5yqTgpZCFVIy6uo0w5auFFXRWCGly1jFVcYLYcUcXU29acPH3sGot2EffXqpuUrtrMgVTy4-uWwMANE1eohd2n_QjOpvsnoiqxNZ_UNW5ykkphAks9-4-Ff9T-oLxCR7VQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2725718672</pqid></control><display><type>article</type><title>Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission</title><source>SpringerLink Journals - AutoHoldings</source><creator>Jallouli, Malika ; Sayahi, Ikbel ; Mabrouk, Anouar Ben</creator><creatorcontrib>Jallouli, Malika ; Sayahi, Ikbel ; Mabrouk, Anouar Ben</creatorcontrib><description>The wide range of applications of 3D meshes and the birth of very high-speed networks for storing 3D models in remote multimedia databases have made the copyright protection of these objects a necessity. In order to contribute to safe sharing, transfer and indexing of 3D multiresolution meshes, a new crypto-watermarking approach is proposed based on spherical harmonics and AES encryption algorithm. Data to be inserted, in this case, is a grayscale image already encrypted using AES256 algorithm. The host mesh, to be watermarked, is decomposed using spherical harmonics to extract frequency coefficients and to compute optimal order for reconstruction. These coefficients undergo two watermarking iterations. During each round, modulation, insertion using quantification method and demodulation steps are implemented. Finally, reconstruction of watermarked mesh using a minimal number of coefficients is conducted. The results established show clearly that our algorithm protects the mesh quality even with the insertion of a large amount of information (a whole image) while ensuring real time execution. The application of various attacks (noise addition, coordinate quantization, smoothing, translation, rotation, uniform scaling and compression) to a watermarked mesh did not prevent the correct retrieval of inserted information. Our approach presents then an enhancement compared to existing ones.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-022-13113-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Coefficients ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Demodulation ; Encryption ; Finite element method ; Image reconstruction ; Information retrieval ; Insertion ; Multimedia ; Multimedia Information Systems ; Special Purpose and Application-Based Systems ; Spherical harmonics ; Three dimensional models ; Watermarking</subject><ispartof>Multimedia tools and applications, 2022-11, Vol.81 (27), p.38543-38567</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-25747dc554359bacfa552267453093785510ed001c9e93b8fc355e41b274283c3</citedby><cites>FETCH-LOGICAL-c319t-25747dc554359bacfa552267453093785510ed001c9e93b8fc355e41b274283c3</cites><orcidid>0000-0002-0743-339X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-022-13113-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-022-13113-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,41487,42556,51318</link.rule.ids></links><search><creatorcontrib>Jallouli, Malika</creatorcontrib><creatorcontrib>Sayahi, Ikbel</creatorcontrib><creatorcontrib>Mabrouk, Anouar Ben</creatorcontrib><title>Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>The wide range of applications of 3D meshes and the birth of very high-speed networks for storing 3D models in remote multimedia databases have made the copyright protection of these objects a necessity. In order to contribute to safe sharing, transfer and indexing of 3D multiresolution meshes, a new crypto-watermarking approach is proposed based on spherical harmonics and AES encryption algorithm. Data to be inserted, in this case, is a grayscale image already encrypted using AES256 algorithm. The host mesh, to be watermarked, is decomposed using spherical harmonics to extract frequency coefficients and to compute optimal order for reconstruction. These coefficients undergo two watermarking iterations. During each round, modulation, insertion using quantification method and demodulation steps are implemented. Finally, reconstruction of watermarked mesh using a minimal number of coefficients is conducted. The results established show clearly that our algorithm protects the mesh quality even with the insertion of a large amount of information (a whole image) while ensuring real time execution. The application of various attacks (noise addition, coordinate quantization, smoothing, translation, rotation, uniform scaling and compression) to a watermarked mesh did not prevent the correct retrieval of inserted information. Our approach presents then an enhancement compared to existing ones.</description><subject>Algorithms</subject><subject>Coefficients</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Demodulation</subject><subject>Encryption</subject><subject>Finite element method</subject><subject>Image reconstruction</subject><subject>Information retrieval</subject><subject>Insertion</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Spherical harmonics</subject><subject>Three dimensional models</subject><subject>Watermarking</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kMtOwzAURC0EEqXwA6wssTb4EcfJsirlIVVC4rG2HMdpUho7-KZC_XsMQWLH6s5iZq7mIHTJ6DWjVN0AYzTjhHJOmGBMkPwIzZhUgijF2XHSoqBEScpO0RnAllKWS57N0PAcqj2M2MbDMAbyaUYXexPfO7_BZhhiMLbFlQFX4-AxDK2LnTU73JrYB99ZwMbXeLF6wWa3CbEb2x43IWJxi3sHLQbTODxG46HvALrgz9FJY3bgLn7vHL3drV6XD2T9dP-4XKyJFawcCZcqU7WVMhOyrIxtjJSc5yqTgpZCFVIy6uo0w5auFFXRWCGly1jFVcYLYcUcXU29acPH3sGot2EffXqpuUrtrMgVTy4-uWwMANE1eohd2n_QjOpvsnoiqxNZ_UNW5ykkphAks9-4-Ff9T-oLxCR7VQ</recordid><startdate>20221101</startdate><enddate>20221101</enddate><creator>Jallouli, Malika</creator><creator>Sayahi, Ikbel</creator><creator>Mabrouk, Anouar Ben</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-0743-339X</orcidid></search><sort><creationdate>20221101</creationdate><title>Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission</title><author>Jallouli, Malika ; Sayahi, Ikbel ; Mabrouk, Anouar Ben</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-25747dc554359bacfa552267453093785510ed001c9e93b8fc355e41b274283c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Coefficients</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Demodulation</topic><topic>Encryption</topic><topic>Finite element method</topic><topic>Image reconstruction</topic><topic>Information retrieval</topic><topic>Insertion</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Spherical harmonics</topic><topic>Three dimensional models</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jallouli, Malika</creatorcontrib><creatorcontrib>Sayahi, Ikbel</creatorcontrib><creatorcontrib>Mabrouk, Anouar Ben</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jallouli, Malika</au><au>Sayahi, Ikbel</au><au>Mabrouk, Anouar Ben</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2022-11-01</date><risdate>2022</risdate><volume>81</volume><issue>27</issue><spage>38543</spage><epage>38567</epage><pages>38543-38567</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>The wide range of applications of 3D meshes and the birth of very high-speed networks for storing 3D models in remote multimedia databases have made the copyright protection of these objects a necessity. In order to contribute to safe sharing, transfer and indexing of 3D multiresolution meshes, a new crypto-watermarking approach is proposed based on spherical harmonics and AES encryption algorithm. Data to be inserted, in this case, is a grayscale image already encrypted using AES256 algorithm. The host mesh, to be watermarked, is decomposed using spherical harmonics to extract frequency coefficients and to compute optimal order for reconstruction. These coefficients undergo two watermarking iterations. During each round, modulation, insertion using quantification method and demodulation steps are implemented. Finally, reconstruction of watermarked mesh using a minimal number of coefficients is conducted. The results established show clearly that our algorithm protects the mesh quality even with the insertion of a large amount of information (a whole image) while ensuring real time execution. The application of various attacks (noise addition, coordinate quantization, smoothing, translation, rotation, uniform scaling and compression) to a watermarked mesh did not prevent the correct retrieval of inserted information. Our approach presents then an enhancement compared to existing ones.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-022-13113-6</doi><tpages>25</tpages><orcidid>https://orcid.org/0000-0002-0743-339X</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2022-11, Vol.81 (27), p.38543-38567 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2725718672 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Coefficients Computer Communication Networks Computer Science Data Structures and Information Theory Demodulation Encryption Finite element method Image reconstruction Information retrieval Insertion Multimedia Multimedia Information Systems Special Purpose and Application-Based Systems Spherical harmonics Three dimensional models Watermarking |
title | Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T18%3A19%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Robust%20crypto-watermarking%20approach%20based%20on%20spherical%20harmonics%20and%20AES%20algorithm%20for%203D%20mesh%20safe%20transmission&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Jallouli,%20Malika&rft.date=2022-11-01&rft.volume=81&rft.issue=27&rft.spage=38543&rft.epage=38567&rft.pages=38543-38567&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-022-13113-6&rft_dat=%3Cproquest_cross%3E2725718672%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2725718672&rft_id=info:pmid/&rfr_iscdi=true |