6 CONCLUSION AND FUTURE
OUTLOOK
In this work, we propose a new hybrid crypto- wa-
termarking algorithm for 3D multiresolution meshes.
The particularity of this work is, on one side, the hy-
brid watermarking applied on 3D meshes. In fact, the
mesh is watermarked in the multiresolution and the
spatial domain.On the other side, the second particu-
larity is to combine cryptography with 3D watermark-
ing to secure 3D multiresolution meshes. This choice
is justified by the efficiency that cryptography and hy-
brid watermarking have proven in securing images.
Our system allows a high insertion rate (logo en-
crypted with RSA algorithm and RSA keys). The en-
crypted logo is inserted after applying wavelet trans-
form, Transformation to spherical system and mod-
ulation. After that the watermarked mesh should be
reconstructed. As for the second iteration, RSA keys
are inserted into the mesh resulting from the first iter-
ation by modifying vertices coordinates. Experimen-
tal results prove that our hybrid crypto- watermarking
approach has kept the mesh quality despite the high
insertion rate. Applying the most popular attacks to
the watermarked meshes did not prevent the correct
extraction of the logo and RSA keys.
As perspectives, we want to extend our work by
adding to it an intelligent module allowing to set au-
tomatically the coefficients to be used during insertion
using the method of quantification that are fixed em-
pirically in this work.
REFERENCES
Benyamin, N., Sattar, M., Seyed, M., S., and Mohammad,
R., M. (2014). A simple, sensitive and secure image
encryption algorithm based on hyper-chaotic system
with only one round diffusion process. Multimedia
Tools and Applications, 71(3).
Dae, J., C. (2015). Watermarking scheme of mpeg-4 laser
object for mobile device. International Journal of Se-
curity and Its Applications., 9(1):305 – 312.
H., A., K., P., W., E., and T., A. M. (2018). Current ad-
vances, trends and challenges of machine learning and
knowledge extraction: From machine learning to ex-
plainable ai. Lecture Notes in Computer Science book
series, 11015:1–8.
Hachicha, S., Sayahi, I., Elkefi, A., and Ben Amar, C.
(2020). Gpu-based blind watermarking scheme for
3d multiresolution meshes using unlifted butterfly
wavelet transformation. Circuits, Systems, and Signal
Processing, pages 1533–1560.
Hitendra, G., Krishna, Kr., K., Manish, G., and Suneeta,
A. (2014). Uniform selection of vertices for water-
mark embedding in 3-d polygon mesh using ieee754
floating point representation. In International Confer-
ence on Communication Systems and Network Tech-
nologies, pages 788 – 792.
Jen-Tse, W., Yi-Ching, C., Shyr-Shen, Y., and Chun-
Yuan, Y. (2014). Hamming code based watermark-
ing scheme for 3d model verification. In Interna-
tional Symposium on Computer, Consumer and Con-
trol, pages 1095 – 1098.
Lamiaa, B., Saleh, H., I., and Abdelhalim, M., B. (2015).
Enhanced watermarking scheme for 3d mesh models.
In International Conference on Information Technol-
ogy, pages 612 – 619.
Ouled Zaid, A., Hachani, M., and Puech, W. (2015).
Wavelet-based high-capacity watermarking of 3-d ir-
regular meshes. Multimed Tools and Applications,
74(15):5897 – 5915.
Sayahi, I., Elkefi, A., and Ben Amar, C. (2016a). Blind wa-
termarking algorithm based on spiral scanning method
and error correcting codes. International Journal of
Multimedia Tools and applications, pages 1– 24.
Sayahi, I., Elkefi, A., and Ben Amar, C. (2016b). Blind wa-
termarking algorithm for 3d multiresolution meshes
based on spiral scanning method. International Jour-
nal of Computer Science and Information Security,
14(6):331 – 342.
Sayahi, I., Elkefi, A., and Ben Amar, C. (2016c). A
multi-resolution approach for blind watermarking of
3d meshes using scanning spiral method. In Inter-
national Conference on Computational Intelligence in
Security for Information Systems, pages 526 – 537.
Sayahi, I., Elkefi, A., and Ben Amar, C. (2017). Join cryp-
tography and digital watermarking for 3d multiresolu-
tion meshes security. In International Conference on
Image Analysis and Processing, pages 637–647.
Sayahi, I., Elkefi, A., and Ben Amar, C. (2019). Crypto-
watermarking system for safe transmission of 3d mul-
tiresolution meshes. International Journal of Multi-
media Tools and applications, pages 13877–13903.
Sayahi, I., Elkefi, A., Koubaa, M., and Ben Amar, C.
(2015). Robust watermarking algorithm for 3d mul-
tiresolution meshes. In International Conference
on Computer Vision Theory and Applications, pages
150–157.
Tariq, S. and Ayesha, Q. (2016). Encrypting grayscale im-
ages using s8 sboxes chosen by logistic map. Interna-
tional Journal of Computer Science and Information
Security, 14(4):440–444.
Tjoa, S., Buttinger, C., and Holzinger, K. Kieseberg, P.
(2020). Penetration testing artificial intelligence.
ERCIM News, 123:36–37.
Viterbi, A. (1971). Convolutional codes and their perfor-
mance in communication systems. IEEE Transactions
on Communication Technology, 19(5):751 – 772.
Xiao, Z. and Qing, Z. (2012). A dct-based dual water-
marking algorithm for three-dimensional mesh mod-
els. In International Conference on Consumer Elec-
tronics, Communications and Networks, pages 1509 –
1513.
Y., G., Ji., K., W., H., P., C., and H., X. (2020). An
asymmetric image encryption algorithm based on a
ICSOFT 2021 - 16th International Conference on Software Technologies
406