Digital Signal Processing
Gaze-directed volume rendering
I3D '90 Proceedings of the 1990 symposium on Interactive 3D graphics
Space-variant active vision: definition, overview and examples
Neural Networks - Special issue: automatic target recognition
Optimal isosurface extraction from irregular volume data
Proceedings of the 1996 symposium on Volume visualization
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Proceedings of the 26th annual conference on Computer graphics and interactive techniques
Computer
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way
Enhancing videoconferencing using spatially varying sensing
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
A numerically stable fragile watermarking scheme for authenticating 3D models
Computer-Aided Design
Hi-index | 0.00 |
3D volume data has been increasingly used in many applications. The digital nature of the data allows easy creation, copying and distribution. However, it also allows ease of manipulation which can enable wilful or inadvertent misrepresentation of the content. For an application like medical imaging, this can have serious diagnostic and legal implications. Thus there is a strong need to establish the integrity of a particular volume data-set. We argue that the traditional data authentication mechanisms like digital signatures or cryptographic methods are not very useful in this context due to their extreme fragility. What is required is a method that can detect the integrity for allowable content-preserving manipulations. We have developed a novel authentication procedure which is robust against benign content manipulation. The volume data can be robustly authenticated under normal operations such as scaling, resampling and additive Gaussian noise. On the other hand, it offers protection against any malefic or unintentional data manipulation which significantly changes the content of the volume data-set. Such manipulations include cropping, changing of voxel values etc. Our method uses segmentation, wavelet-based foveation, and encryption to achieve this. We have implemented the method and tested its robustness for several manipulations.