No Cover Image

Journal article 276 views 617 downloads

Survey: 3D watermarking techniques

Ertugrul Gul Orcid Logo, Gary Tam Orcid Logo

Journal of Visual Communication and Image Representation, Volume: 112, Start page: 104572

Swansea University Author: Gary Tam Orcid Logo

  • 70204.VOR.pdf

    PDF | Version of Record

    © 2025 The Authors. This is an open access article distributed under the terms of the Creative Commons CC-BY license.

    Download (4.51MB)

Abstract

In today’s world, 3D multimedia data is widely utilized in diverse fields such as military, medical, and remote sensing. The advancement of multimedia technologies, however, exposes 3D multimedia content to an increasing risk of malicious interventions. It has become highly essential to implement se...

Full description

Published in: Journal of Visual Communication and Image Representation
ISSN: 1047-3203 1095-9076
Published: Elsevier Inc. 2025
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa70204
first_indexed 2025-08-20T13:12:14Z
last_indexed 2025-08-30T06:27:42Z
id cronfa70204
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2025-08-29T11:34:51.6559595</datestamp><bib-version>v2</bib-version><id>70204</id><entry>2025-08-20</entry><title>Survey: 3D watermarking techniques</title><swanseaauthors><author><sid>e75a68e11a20e5f1da94ee6e28ff5e76</sid><ORCID>0000-0001-7387-5180</ORCID><firstname>Gary</firstname><surname>Tam</surname><name>Gary Tam</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2025-08-20</date><deptcode>MACS</deptcode><abstract>In today&#x2019;s world, 3D multimedia data is widely utilized in diverse fields such as military, medical, and remote sensing. The advancement of multimedia technologies, however, exposes 3D multimedia content to an increasing risk of malicious interventions. It has become highly essential to implement security measures ensuring the authenticity and copyright protection of 3D multimedia content. Watermarking is considered one of the most reliable and practical approaches for this purpose. This work provides an in-depth and up-to-date overview of various 3D watermarking methods, covering different data forms, including 3D images, 3D videos, 3D meshes, point clouds, and NeRF. We have categorized these methods from multiple perspectives, comparing their respective advantages and disadvantages. The study also identifies attacks based on data type and discusses metrics for evaluating the methods according to their intended use and data type. We further present observations, research issues, challenges, and future directions for 3D watermarking. This includes strength factor optimization, copyright concerns related to 3D printed objects, detection and recovery of tampered areas, and watermarking in 4D (3D Dynamic) and NeRF domains.</abstract><type>Journal Article</type><journal>Journal of Visual Communication and Image Representation</journal><volume>112</volume><journalNumber/><paginationStart>104572</paginationStart><paginationEnd/><publisher>Elsevier Inc.</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1047-3203</issnPrint><issnElectronic>1095-9076</issnElectronic><keywords>3D watermarking; 3D image/video; 3D mesh/point cloud; NeRF</keywords><publishedDay>1</publishedDay><publishedMonth>11</publishedMonth><publishedYear>2025</publishedYear><publishedDate>2025-11-01</publishedDate><doi>10.1016/j.jvcir.2025.104572</doi><url/><notes>Review</notes><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm>SU Library paid the OA fee (TA Institutional Deal)</apcterm><funders>This study received support from the Scientific and Technical Research Council of Turkey (TUBITAK) under the 2219 postdoctoral fellowship support program, project number 1059B192202811. Tam acknowledges partial support from a Royal Society fund (IEC/NSFC/211159). Additionally, the study received partial visiting researcher support from the Faculty of Engineering at Swansea University. The authors express gratitude to TUBITAK, Kayseri University, and Swansea University for their support.</funders><projectreference>1059B192202811, IEC/NSFC/211159</projectreference><lastEdited>2025-08-29T11:34:51.6559595</lastEdited><Created>2025-08-20T14:05:58.4717326</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Ertugrul</firstname><surname>Gul</surname><orcid>0000-0002-5591-3435</orcid><order>1</order></author><author><firstname>Gary</firstname><surname>Tam</surname><orcid>0000-0001-7387-5180</orcid><order>2</order></author></authors><documents><document><filename>70204__35001__efbfead85ccc42eb90ce43b7fb54137e.pdf</filename><originalFilename>70204.VOR.pdf</originalFilename><uploaded>2025-08-29T11:31:37.1981606</uploaded><type>Output</type><contentLength>4733065</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>&#xA9; 2025 The Authors. This is an open access article distributed under the terms of the Creative Commons CC-BY license.</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>http://creativecommons.org/licenses/by/4.0/</licence></document></documents><OutputDurs/></rfc1807>
spelling 2025-08-29T11:34:51.6559595 v2 70204 2025-08-20 Survey: 3D watermarking techniques e75a68e11a20e5f1da94ee6e28ff5e76 0000-0001-7387-5180 Gary Tam Gary Tam true false 2025-08-20 MACS In today’s world, 3D multimedia data is widely utilized in diverse fields such as military, medical, and remote sensing. The advancement of multimedia technologies, however, exposes 3D multimedia content to an increasing risk of malicious interventions. It has become highly essential to implement security measures ensuring the authenticity and copyright protection of 3D multimedia content. Watermarking is considered one of the most reliable and practical approaches for this purpose. This work provides an in-depth and up-to-date overview of various 3D watermarking methods, covering different data forms, including 3D images, 3D videos, 3D meshes, point clouds, and NeRF. We have categorized these methods from multiple perspectives, comparing their respective advantages and disadvantages. The study also identifies attacks based on data type and discusses metrics for evaluating the methods according to their intended use and data type. We further present observations, research issues, challenges, and future directions for 3D watermarking. This includes strength factor optimization, copyright concerns related to 3D printed objects, detection and recovery of tampered areas, and watermarking in 4D (3D Dynamic) and NeRF domains. Journal Article Journal of Visual Communication and Image Representation 112 104572 Elsevier Inc. 1047-3203 1095-9076 3D watermarking; 3D image/video; 3D mesh/point cloud; NeRF 1 11 2025 2025-11-01 10.1016/j.jvcir.2025.104572 Review COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University SU Library paid the OA fee (TA Institutional Deal) This study received support from the Scientific and Technical Research Council of Turkey (TUBITAK) under the 2219 postdoctoral fellowship support program, project number 1059B192202811. Tam acknowledges partial support from a Royal Society fund (IEC/NSFC/211159). Additionally, the study received partial visiting researcher support from the Faculty of Engineering at Swansea University. The authors express gratitude to TUBITAK, Kayseri University, and Swansea University for their support. 1059B192202811, IEC/NSFC/211159 2025-08-29T11:34:51.6559595 2025-08-20T14:05:58.4717326 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Ertugrul Gul 0000-0002-5591-3435 1 Gary Tam 0000-0001-7387-5180 2 70204__35001__efbfead85ccc42eb90ce43b7fb54137e.pdf 70204.VOR.pdf 2025-08-29T11:31:37.1981606 Output 4733065 application/pdf Version of Record true © 2025 The Authors. This is an open access article distributed under the terms of the Creative Commons CC-BY license. true eng http://creativecommons.org/licenses/by/4.0/
title Survey: 3D watermarking techniques
spellingShingle Survey: 3D watermarking techniques
Gary Tam
title_short Survey: 3D watermarking techniques
title_full Survey: 3D watermarking techniques
title_fullStr Survey: 3D watermarking techniques
title_full_unstemmed Survey: 3D watermarking techniques
title_sort Survey: 3D watermarking techniques
author_id_str_mv e75a68e11a20e5f1da94ee6e28ff5e76
author_id_fullname_str_mv e75a68e11a20e5f1da94ee6e28ff5e76_***_Gary Tam
author Gary Tam
author2 Ertugrul Gul
Gary Tam
format Journal article
container_title Journal of Visual Communication and Image Representation
container_volume 112
container_start_page 104572
publishDate 2025
institution Swansea University
issn 1047-3203
1095-9076
doi_str_mv 10.1016/j.jvcir.2025.104572
publisher Elsevier Inc.
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 1
active_str 0
description In today’s world, 3D multimedia data is widely utilized in diverse fields such as military, medical, and remote sensing. The advancement of multimedia technologies, however, exposes 3D multimedia content to an increasing risk of malicious interventions. It has become highly essential to implement security measures ensuring the authenticity and copyright protection of 3D multimedia content. Watermarking is considered one of the most reliable and practical approaches for this purpose. This work provides an in-depth and up-to-date overview of various 3D watermarking methods, covering different data forms, including 3D images, 3D videos, 3D meshes, point clouds, and NeRF. We have categorized these methods from multiple perspectives, comparing their respective advantages and disadvantages. The study also identifies attacks based on data type and discusses metrics for evaluating the methods according to their intended use and data type. We further present observations, research issues, challenges, and future directions for 3D watermarking. This includes strength factor optimization, copyright concerns related to 3D printed objects, detection and recovery of tampered areas, and watermarking in 4D (3D Dynamic) and NeRF domains.
published_date 2025-11-01T05:30:15Z
_version_ 1851097995667308544
score 11.089572