Open Access
ARTICLE
High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security
1 Department of Computer Engineering, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj, 11942, Saudi Arabia
2 Department of Computer Engineering and Sciences, Higher School of Sciences and Technology of Hammam Sousse, University of Sousse, Sousse, 4011, Tunisia
3 LATIS Laboratory of Advanced Technology and Intelligent Systems, University of Sousse, Sousse, 4023, Tunisie
4 Control and Energy Management Laboratory (CEM Lab.), Ecole Nationale d Ingenieurs de Sfax (ENIS), Institut Superieur de Biotechnologie de Sfax (ISBS), University of Sfax, Sfax, 3038, Tunisia
* Corresponding Author: Wajdi Elhamzi. Email:
Computers, Materials & Continua 2022, 73(2), 4329-4347. https://doi.org/10.32604/cmc.2022.030954
Received 07 April 2022; Accepted 18 May 2022; Issue published 16 June 2022
Abstract
Since 3D mesh security has become intellectual property, 3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases. The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain, allowing us to greatly expand the size of the watermark. After that, our method does two rounds of insertion, each applying a different type of Clifford-wavelet transform. Before being placed into the Clifford-multiwavelet coefficients, the watermark, which is a mixture of the mesh description, source mesh signature (produced using SHA512), and a logo encrypted using the RSA (Ronald Shamir Adleman) technique, is encoded using Turbo-code. Using the Least Significant Bit method steps, data embedding involves modulation and insertion processes. Finally, the watermarked mesh is reconstructed using the inverse Clifford-multiwavelet transform. Due to the utilization of a hybrid insertion domain, our technique has demonstrated a very high insertion rate while retaining mesh quality. The mesh is watermarked, and the extracted data is acquired in real-time. Our approach is also resistant to the most common types of attacks. Our findings reveal that the current approach improves on previous efforts.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.