{"title":"基于径向的三维水印系统安全性分析","authors":"Xavier Rolland-Névière, G. Doërr, P. Alliez","doi":"10.1109/WIFS.2014.7084299","DOIUrl":null,"url":null,"abstract":"To be relevant in copyright protection scenarios, watermarking systems need to provide appropriate levels of security. This paper investigates the security of a popular 3D watermarking method that alters the histogram of distances between the vertices of a surface mesh and its center of mass using a quadratic programming formulation.We study two conventional security mechanisms, namely (i) obfuscating the support of the content used for watermarking and (ii) relying on random projections to obfuscate the watermarking subspace. The different attacks surveyed throughout the paper clearly highlight the limitations of this family of 3D watermarking systems with respect to security.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security analysis of radial-based 3D watermarking systems\",\"authors\":\"Xavier Rolland-Névière, G. Doërr, P. Alliez\",\"doi\":\"10.1109/WIFS.2014.7084299\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To be relevant in copyright protection scenarios, watermarking systems need to provide appropriate levels of security. This paper investigates the security of a popular 3D watermarking method that alters the histogram of distances between the vertices of a surface mesh and its center of mass using a quadratic programming formulation.We study two conventional security mechanisms, namely (i) obfuscating the support of the content used for watermarking and (ii) relying on random projections to obfuscate the watermarking subspace. The different attacks surveyed throughout the paper clearly highlight the limitations of this family of 3D watermarking systems with respect to security.\",\"PeriodicalId\":220523,\"journal\":{\"name\":\"2014 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"volume\":\"127 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WIFS.2014.7084299\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS.2014.7084299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security analysis of radial-based 3D watermarking systems
To be relevant in copyright protection scenarios, watermarking systems need to provide appropriate levels of security. This paper investigates the security of a popular 3D watermarking method that alters the histogram of distances between the vertices of a surface mesh and its center of mass using a quadratic programming formulation.We study two conventional security mechanisms, namely (i) obfuscating the support of the content used for watermarking and (ii) relying on random projections to obfuscate the watermarking subspace. The different attacks surveyed throughout the paper clearly highlight the limitations of this family of 3D watermarking systems with respect to security.