Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
SIGGRAPH '96 Proceedings of the 23rd annual conference on Computer graphics and interactive techniques
Proceedings of the 26th annual conference on Computer graphics and interactive techniques
Progressive geometry compression
Proceedings of the 27th annual conference on Computer graphics and interactive techniques
Watermarking 3D Objects for Verification
IEEE Computer Graphics and Applications
Geometry-Based Watermarking of 3D Models
IEEE Computer Graphics and Applications
Watermarking 3D polygonal meshes in the mesh spectral domain
GRIN'01 No description on Graphics interface 2001
A fragile watermarking scheme for 3D meshes
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Fragile watermarking for authenticating 3-D polygonal meshes
IEEE Transactions on Multimedia
Watermarking three-dimensional polygonal models through geometric and topological modifications
IEEE Journal on Selected Areas in Communications
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
A class of authentication digital watermarks for secure multimedia communication
IEEE Transactions on Image Processing
A numerically stable fragile watermarking scheme for authenticating 3D models
Computer-Aided Design
Affine-transformation-invariant public fragile watermarking for 3D model authentication
IEEE Computer Graphics and Applications - Special issue title on demystifying visual analytics impaired driving in virtual spaces
Optimization approach for 3D model watermarking by linear binary programming
Computer Aided Geometric Design
CAD drawing watermarking scheme
Digital Signal Processing
Reversible data hiding algorithm based on prediction error
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
A highly adaptable capacity and invisibility 3D watermarking based on four-points sets
Proceedings of the 12th ACM workshop on Multimedia and security
Robust and blind watermarking scheme for three dimensional anaglyph images
Computers and Electrical Engineering
Hi-index | 0.00 |
A public fragile watermarking scheme based on the sensitivity of vertex geometry is proposed for 3D model authentication. In the 3D fragile watermarking embedding, slightly perturbing the positions of a subset of vertices is usually needed to keep them in some predefined relationship with their neighboring vertices. Two problems frequently arise in the embedding stage: the causality problem and the convergence problem. The causality problem arises while the neighboring relationship of a former processed vertex is influenced by the perturbing of its latter processed neighboring vertices. The convergence problem means that the original model has been heavily distorted before some vertices reach the predefined relationship. In this paper, we propose a multi-function vertex embedding method and an adjusting-vertex method to overcome these two problems. The proposed method does not need the original model and watermarks for authentication; moreover, the key for extracting watermarks is relatively smaller than that of previous works. For some artistic or technical models, sometimes it is very important to control the distortion ratio caused by watermark embedding. Our method can control the average distortion by the keys used in watermark embedding. Experimental and analytic results on various kinds of 3D models show the effectiveness of the scheme.