High capacity reversible data hiding for 3D meshes in the PVQ domain
ZM Lu, Z Li - International Workshop on Digital Watermarking, 2007 - Springer
ZM Lu, Z Li
International Workshop on Digital Watermarking, 2007•SpringerIn the digitized world nowadays, digital content (audio, images, video, 3D meshes, etc.) can
be easily copied, manipulated and distributed. Copyright protection and integrity verification
of digital content have become urgent problems for multimedia owners and distributors. In
addition, to alleviate bandwidth requirements, vector quantization (VQ) is an effective and
popular vertex data compression technique for triangle meshes. In this paper, we present a
new data hiding method for 3D triangle meshes in the predictive VQ domain. The proposed …
be easily copied, manipulated and distributed. Copyright protection and integrity verification
of digital content have become urgent problems for multimedia owners and distributors. In
addition, to alleviate bandwidth requirements, vector quantization (VQ) is an effective and
popular vertex data compression technique for triangle meshes. In this paper, we present a
new data hiding method for 3D triangle meshes in the predictive VQ domain. The proposed …
Abstract
In the digitized world nowadays, digital content (audio, images, video, 3D meshes, etc.) can be easily copied, manipulated and distributed. Copyright protection and integrity verification of digital content have become urgent problems for multimedia owners and distributors. In addition, to alleviate bandwidth requirements, vector quantization (VQ) is an effective and popular vertex data compression technique for triangle meshes. In this paper, we present a new data hiding method for 3D triangle meshes in the predictive VQ domain. The proposed method is reversible and enables the cover mesh data to be completely restored when the payload is removed from the VQ bitstream. The mechanism is embedding the payload by modifying the prediction rules during the VQ process. Besides, the hash of the cover mesh can be hidden for the self authentication purpose. Experimental results demonstrate the high capacity of the proposed data hiding scheme.
Springer
Showing the best result for this search. See all results