54
Watermarking 3D images and 3D meshes Applications for cultural heritage William PUECH LIRMM Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier UMR 5506 CNRS, University of Montpellier, France May, 19 th of 2008 W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19 th of 2008 1 / 48

Watermarking 3D images and 3D meshes - Applications for ...subsol/ODENT/puech.interdisciplinary.0608.pdfJournal des sciences militaires, vol. 9, pp. 5–38, 1883. W. PUECH (LIRMM CNRS/UMII)

  • Upload
    lycong

  • View
    222

  • Download
    0

Embed Size (px)

Citation preview

Watermarking 3D images and 3D meshesApplications for cultural heritage

William PUECH

LIRMMLaboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier

UMR 5506 CNRS, University of Montpellier, France

May, 19th of 2008

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 1 / 48

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 2 / 48

Introduction

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 3 / 48

Introduction The problem

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 4 / 48

Introduction The problem

Safe visual data transfer: the problem

Safe transfer of visual data with high resolution.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 5 / 48

Introduction The problem

Safe visual data transfer: the problem

3D Visualisation on line.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 6 / 48

Introduction The problem

Safe visual data transfer: the problem

Safe Transfer and visualisation on line in real time for lowpowered systems (wireless devices).

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 7 / 48

Introduction The problem

Safe visual data transfer: the objectives

To transfer safe visual dataTo Have Confidential data during and after TransferTo Ensure the Integrity (perceptual) and the Authenticity of dataTo Hide associated data (high capacity) in Image

To Access in different resolution levels of visual dataTo Process in Real TimeTo Reduce the data size.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 8 / 48

Introduction The problem

Safe visual data transfer: the objectives

To transfer safe visual dataTo Have Confidential data during and after TransferTo Ensure the Integrity (perceptual) and the Authenticity of dataTo Hide associated data (high capacity) in Image

To Access in different resolution levels of visual dataTo Process in Real TimeTo Reduce the data size.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 8 / 48

Introduction The problem

Safe visual data transfer: the objectives

To transfer safe visual dataTo Have Confidential data during and after TransferTo Ensure the Integrity (perceptual) and the Authenticity of dataTo Hide associated data (high capacity) in Image

To Access in different resolution levels of visual dataTo Process in Real TimeTo Reduce the data size.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 8 / 48

Introduction The problem

Possible solutions: data encryption or watermarking

Encryption or watermarking for safe visual data transfer

Robust to noiseCompatible with a compressionFast: access in real timeThe secret is based on a key (secrete or private key)

The Algorithm is knownPrinciple of Kerckhoffs [KER 83]

Norms and standards

A. Kerckhoffs.La cryptographie militaire.Journal des sciences militaires, vol. 9, pp. 5–38, 1883.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 9 / 48

Introduction The problem

Possible solutions: data encryption or watermarking

Encryption or watermarking for safe visual data transfer

Robust to noiseCompatible with a compressionFast: access in real timeThe secret is based on a key (secrete or private key)

The Algorithm is knownPrinciple of Kerckhoffs [KER 83]

Norms and standards

A. Kerckhoffs.La cryptographie militaire.Journal des sciences militaires, vol. 9, pp. 5–38, 1883.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 9 / 48

Introduction The problem

Possible solutions: data encryption or watermarking

Encryption or watermarking for safe visual data transfer

Robust to noiseCompatible with a compressionFast: access in real timeThe secret is based on a key (secrete or private key)

The Algorithm is knownPrinciple of Kerckhoffs [KER 83]

Norms and standards

A. Kerckhoffs.La cryptographie militaire.Journal des sciences militaires, vol. 9, pp. 5–38, 1883.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 9 / 48

Introduction Previous work in the LIRMM

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 10 / 48

Introduction Previous work in the LIRMM

Safe Image Transfer

a) b) c)

a) Original image.b) Embedded image with a message of 512 bits using the DCT based data hiding method.c) Difference between (a) and (b).

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 11 / 48

Introduction Previous work in the LIRMM

Safe Image Transfer

(a) (b)

(c) (d)

a) Original image, b) Original image histogramc) Encrypted image with the stream cipher algorithm, with a key of 128 bitsd) Histogram of the image (c).

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 12 / 48

Introduction Previous work in the LIRMM

Safe Image Transfer

a) b)

c)

a) Original image.b) Transfer of compressed Image with a Safe ROI.c) Reconstruction of the High Resolution Definition of the ROI.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 13 / 48

Introduction Previous work in the LIRMM

Safe Image Transfer

(a) (b)

(c) (d)

a) The original image, b) The associated binary mask, c) Color watermarked image, d) Difference between original color image

and color watermarked image.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 14 / 48

Introduction Previous work in the LIRMM

Safe Image Transfer

(a) (b)

a) 5 degree rotation of color watermarked image "Fish", b) The label of fish color image with watermarked blocks.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 15 / 48

Visual data protection

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 16 / 48

Visual data protection Data encryption

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 17 / 48

Visual data protection Data encryption

Data encryption

Data encryption

The art to mask the data:confidentiality : data protectionauthenticity : emitter and receiverintegrity : ensure the totality and the content of the datanon repudiation : ACK

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 18 / 48

Visual data protection Data encryption

Perceptual signature: data integrity

Signature of a text

M1 = “Aujourd’hui il fait beau dans le sud de la France, même si il y a un peude vent...”S1 = Ox2534A8C08E12F4A8M2 = “Aujourd’hui il fait beau dans le sud de la France, même si il y a un peude mistral...”S2 = Ox3D68AB9310E38B51

Signature of visual data

S1(original image (760 kB)) = S2(compressed image (224 kB))

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 19 / 48

Visual data protection Data encryption

Perceptual signature: data integrity

Signature of a text

M1 = “Aujourd’hui il fait beau dans le sud de la France, même si il y a un peude vent...”S1 = Ox2534A8C08E12F4A8M2 = “Aujourd’hui il fait beau dans le sud de la France, même si il y a un peude mistral...”S2 = Ox3D68AB9310E38B51

Signature of visual data

S1(original image (760 kB)) = S2(compressed image (224 kB))

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 19 / 48

Visual data protection Watermarking

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 20 / 48

Visual data protection Watermarking

Watermarking

Watermarking and Data Hiding

The art to embed message in perceptual data:invisibility: statistically invisibleno removable: robust to transformations and attackspayload: size of the hidden message

Data hiding: large payloadSteganography: invisibilityWatermarking: robust to attacks

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 21 / 48

Visual data protection Watermarking

Watermarking

Watermarking and Data Hiding

The art to embed message in perceptual data:invisibility: statistically invisibleno removable: robust to transformations and attackspayload: size of the hidden message

Data hiding: large payloadSteganography: invisibilityWatermarking: robust to attacks

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 21 / 48

3D Watermarking

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 22 / 48

3D Watermarking 3D images

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 23 / 48

3D Watermarking 3D images

Image watermarking: LSB substitution

#17 #54 #83

Figure: 125 original slides of “Baton Percé”

#17 #54 #83

Figure: 125 watermarked slides of “Baton Percé”

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 24 / 48

3D Watermarking 3D images

Image watermarking: LSB substitution

Analyze

original size: 125 slides 382 × 82 pixelswatermarking with a text file: 5.4 kBytes: PNSR = 70.5 dBwatermarking with an image of 25.8 kBytes: PNSR = 63.8 dBwatermarking with a 3D file of 472.4 kBytes: PNSR = 51.2 dB

#17 #54 #83

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 25 / 48

3D Watermarking 3D images

Image watermarking: LSB substitution

(a) (b)

Figure: 3D Reconstruction: a) From the original data, b) From thewatermarked data.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 26 / 48

3D Watermarking 3D meshes

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 27 / 48

3D Watermarking 3D meshes

3D watermarking based on MST

References

P. Amat, W. Puech, S. Druon and J.P. PedeboyLossless Data Hiding Method Based on MST and TopologyChanges of 3D Triangular MeshProceedings of the 16th European Signal Processing Conference,Lausanne, Switzerland, 2008

Algorithm

MST construction,Search of quadruples,Selection of quadruples based on coplanarity and convexity,Embed one bit in each selected quadruple.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 28 / 48

3D Watermarking 3D meshes

3D watermarking based on MST

Figure: Selection of quadruples in the MST.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 29 / 48

3D Watermarking 3D meshes

3D watermarking based on MST

Figure: Data hiding of a 0-bit or a 1-bit.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 30 / 48

3D Watermarking 3D meshes

3D watermarking based on MST

Advantages

GlobalHigh payloadAny modification of the vertex positions

Inconvenient

No robust to noise

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 31 / 48

3D Watermarking 3D meshes

3D Watermarking

“Baton Percé”: 102173 vertices.

With a threshold of 1 degree: message = 4466 bits (Hausdorff’serror = 0.001637).With a threshold of 30 degree: message = 21698 bits (Hausdorff’serror = 0.029063)

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 32 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 33 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 34 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 35 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 36 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 37 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 38 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 39 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 40 / 48

3D Watermarking 3D meshes

3D Watermarking

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 41 / 48

3D Watermarking 3D meshes

Robust 3D watermarking

References

F. Cayre and B. MacqData Hiding on 3D Triangle MeshesIEEE Transactions on Signal Processing, 2003

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 42 / 48

3D Watermarking 3D meshes

Robust 3D watermarking

Algorithm

Choice of a fisrt triangle ABC,Choice of a reference edge AB,Divide AB in several parts,Associate each part to a 0-bit or a 1-bit,Move the vertex C in order to have a projection of C on AB in awished part.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 43 / 48

3D Watermarking 3D meshes

Robust 3D watermarking

Figure: Overview of the method.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 44 / 48

3D Watermarking 3D meshes

Robust 3D watermarking

Advantage

InvisibleRobust to noise

Inconvenient

Local

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 45 / 48

3D Watermarking 3D meshes

3D Watermarking

(a) (b)

Figure: a) Original 3D object “Smilodon” 508796 vertices, b) Watermarked 3Dobject with 314071 bits (= 38.3 kBytes)

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 46 / 48

Conclusion

Outline

1 IntroductionThe problemPrevious work in the LIRMM

2 Visual data protectionData encryptionWatermarking

3 3D Watermarking3D images3D meshes

4 Conclusion

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 47 / 48

Conclusion

Conclusion

Visual data protection is necessary,First proposed methods: high payload but not robust to noise orrobust to noise with a small paylaod,But not robust to cropping for example.

W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and 3D meshes May, 19th of 2008 48 / 48