计算机与现代化 ›› 2021, Vol. 0 ›› Issue (06): 120-126.

• 信息安全 • 上一篇    

混沌加密的三维网格模型盲水印算法

  

  1. (太原科技大学计算机科学与技术学院,山西太原030032)
  • 出版日期:2021-07-05 发布日期:2021-07-05
  • 作者简介:姚晓璐(1993—),女,山西运城人,硕士研究生,研究方向:大数据与智能软件开发,三维模型数字水印算法,E-mail: 1301125578@qq.com; 张国有(1972—),男,山西忻州人,副教授,博士,研究方向:群机器人控制与建模,群体智能,软件体系结构,软件建模,E-mail: zhangguoyou@tyust.edu.cn; 王江帆(1997—),女,山西运城人,硕士研究生,研究方向:大数据与智能软件开发,三维模型数字水印算法,E-mail: 1311954672@qq.com; 崔健(1996—),男,江苏宿迁人,硕士研究生,研究方向:大数据与智能软件开发、三维模型数字水印算法,E-mail: 1308401575@qq.com。
  • 基金资助:
    山西省自然科学基金资助项目(201801D121133)

Blind Watermarking Algorithm of 3D Mesh Models Based on Logistic Chaotic Encryption

  1. (School of Computer Science and Technology, Taiyuan University of Science and Technology, Taiyuan 030032, China)
  • Online:2021-07-05 Published:2021-07-05

摘要: 从保护三维模型数据的版权信息为出发点,提出一种基于Logistic混沌加密的三维模型盲水印方法。该算法首先采用点阵字体生成的二值图像作为水印信息,对水印图像进行置乱加密处理,然后利用网格简化的方法对三维网格模型进行多分层显示,计算中层每个顶点的局部集面积,再修改中层面积较小且密集的顶点进行水印信息嵌入,最后根据该顶点的邻域的曲率自适应地嵌入水印强度。水印的检测是水印嵌入的逆过程。实验结果表明,该算法对仿射变换、简化、平滑等攻击具有鲁棒性,不仅达到了保护三维模型版权的目的,而且提高了水印系统的安全性。

关键词: 三维模型, 混沌加密, 网格简化, 局部集, 盲水印

Abstract: In order to protect the copyright information of 3D model data, a blind watermarking method based on Logistic chaotic encryption is proposed. Firstly, the binary image generated by dot matrix font is used as watermark information, and the watermark image is scrambled and encrypted. Then, the mesh simplification method is used to display the 3D mesh model in multiple layers, and the local set area of each vertex in the middle layer is calculated, and then the watermark information is embedded by modifying the small and dense vertices in the middle layer. Finally, the watermark strength is adaptively embedded according to the curvature of the neighborhood of the vertex. Watermark extraction is the  inversion process of watermark embedding. Experimental results show that the algorithm is robust to affine transformation, simplification, and smooth attacks, which not only achieves the purpose of protecting the copyright of the three-dimensional model, but also improves the security of the watermark system.

Key words: three-dimensional model, chaotic encryption, grid simplification, local set, blind watermarking