The digital Michelangelo project: 3D scanning of large statues
Proceedings of the 27th annual conference on Computer graphics and interactive techniques
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Progressive compression for lossless transmission of triangle meshes
Proceedings of the 28th annual conference on Computer graphics and interactive techniques
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Watermarking 3D Objects for Verification
IEEE Computer Graphics and Applications
A fragile watermarking scheme for 3D meshes
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
A Reversible Data Hiding Approach to Mesh Authentication
WI '05 Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence
Fragile watermarking for authenticating 3-D polygonal meshes
IEEE Transactions on Multimedia
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Information-theoretic hashing of 3D objects using spectral graph theory
Expert Systems with Applications: An International Journal
Secure peer-to-peer 3D streaming
Multimedia Tools and Applications
Hi-index | 0.00 |
In this paper, a public-key scheme is proposed to authenticate 3D mesh models. It is well known that digital signature schemes can be used for data authentication by generating a separate signature and appending it to the file. Another way is divide the original data into two parts: the content to be authenticated and the cover content. In the embedding process, the signature of the first part is generated and imperceptibly embedded within the cover content to form the signed content. In the authentication process, a new hash value is produced from the signed content and compared with the value decrypted from the retrieved signature for tamper detection. Before we implement such a scheme on polygonal meshes, mesh partitioning technique is used to divide them into patches with a fixed amount of vertices. For each patch, a corresponding signature is generated to replace the least significant bits of vertex coordinates within it so that the tamper can be localized. The experimental results have shown the promising results.