KEYWORDS: 3D modeling, Bismuth, Video, Digital watermarking, Optical spheres, Solid modeling, Databases, Computer aided design, Data modeling, Visual process modeling
3D models and applications are of utmost interest in both science and industry. With the increment of their usage, their number and thereby the challenge to correctly identify them increases. Content identification is commonly done by cryptographic hashes. However, they fail as a solution in application scenarios such as computer aided design (CAD), scientific visualization or video games, because even the smallest alteration of the 3D model, e.g. conversion or compression operations, massively changes the cryptographic hash as well. Therefore, this work presents a robust hashing algorithm for 3D mesh data. The algorithm applies several different bit extraction methods. They are built to resist desired alterations of the model as well as malicious attacks intending to prevent correct allocation. The different bit extraction methods are tested against each other and, as far as possible, the hashing algorithm is compared to the state of the art. The parameters tested are robustness, security and runtime performance as well as False Acceptance Rate (FAR) and False Rejection Rate (FRR), also the probability calculation of hash collision is included. The introduced hashing algorithm is kept adaptive e.g. in hash length, to serve as a proper tool for all applications in practice.
KEYWORDS: Digital watermarking, Video, Image compression, Visualization, Video compression, Raster graphics, Detection and tracking algorithms, Neodymium, Video surveillance, Computer security
Digital watermarking is a promising solution to video game piracy. In this paper, based on the analysis of special challenges and requirements in terms of watermarking textures in video games, a novel watermarking scheme for DDS textures in video games is proposed. To meet the performance requirements in video game applications, the proposed algorithm embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding. Furthermore, the embedding approach achieves high watermark payload to handle collusion secure fingerprinting codes with extreme length. Hence, the scheme is resistant to collusion attacks, which is indispensable in video game applications. The proposed scheme is evaluated in aspects of transparency, robustness, security and performance. Especially, in addition to classical objective evaluation, the visual quality and playing experience of watermarked games is assessed subjectively in game playing.
KEYWORDS: Digital watermarking, Video, Multimedia, Information security, Transparency, 3D modeling, Video surveillance, Prototyping, Video processing, Internet
The publishers of video games suffer from illegal piracy and information leakage caused by end-consumers, "release groups" or insiders shortly after or even before the official release of a new video game. Mechanisms to prevent or at least postpone this illegal redistribution are DRM or copy protection mechanisms. However, these mechanisms are very unpopular, because they restrict the customers in playing the game and demand a high administration effort from the developers and/or distributors. Even worse, most copy protection mechanisms have proven to be insecure as "patches" for circumvention usually are available quickly and easy to get. To satisfy the challenges of security and usability, this work introduces the idea of using digital watermarking to protect all available and suitable media types and software binaries contained in a video game. A three-layered watermarking deployment approach along the production chain is proposed to detect leakage in the release phase as well as during the development process of a boxed video game. The proposed approach features both copyright watermarking and collusion secure fingerprints embedded as transaction watermark messages in components of video games. We discuss the corresponding new challenges and opportunities. In addition, a prototype watermarking algorithm is presented to demonstrate the adaption necessity of classical image watermarking when applied to video games to satisfy the requirements for transparency, security as well as performance. The watermark capacity is significantly increased while inter-media and inter-file embedding is enabled and the associated synchronization challenge is solved by robust hashes.
KEYWORDS: Digital watermarking, Detection and tracking algorithms, Multimedia, Forensic science, Information technology, Information security, Electronic imaging, Current controlled current source, Transparency
Digital transaction watermarking today is a widely accepted mechanism to discourage illegal distribution of
multimedia. The transaction watermark is a user-specific message that is embedded in all copies of one content
and thus makes it individual. Therewith it allows to trace back copyright infringements. One major threat on
transaction watermarking are collusion attacks. Here, multiple individualized copies of the work are compared
and/or combined to attack the integrity or availability of the embedded watermark message. One solution to
counter such attacks are mathematical codes called collusion secure fingerprinting codes. Problems arise when
applying such codes to multimedia files with small payload, e.g. short audio tracks or images. Therefore the
code length has to be shortened which increases the error rates and/or the effort of the tracing algorithm. In this
work we propose an approach whether to use as an addition to probabilistic fingerprinting codes for a reduction
of the effort and increment of security, as well as a new separate method providing shorter codes at a very fast
and high accurate tracing algorithm.
KEYWORDS: Digital watermarking, Magnesium, Clouds, Error analysis, Resistance, Sensors, Error control coding, Transparency, Information security, Detection and tracking algorithms
Digital transaction watermarking today is a widely accepted mechanism to trace back copyright infringements.
Here, copies of a work are individualized by embedding user-specific watermark messages. One major threat on
transaction watermarking are collusion attacks. Here, multiple individualized copies of the work are compared
and/or combined to attack the integrity or availability of the embedded watermark message. In this work, we
show how Patchwork embedding can be adapted to provide a maximum of resistance against collusion attacks
at reduced payload and improved robustness.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.