[HTML][HTML] Visible watermarking for 3D models based on 3D Boolean operation

AB Li, H Chen, XL Xie - Egyptian Informatics Journal, 2024 - Elsevier
With the continuous expansion of the application field of 3D models and the convenience of
model storage, transmission, and replication, the problems of illegal reproduction, illegal …

Noise-Tolerant Trajectory Distance Computation in the Presence of Inherent Noise for Video Surveillance Applications

Y Kwon, J Moon, Y Chung - IEEE Access, 2024 - ieeexplore.ieee.org
As the importance of trajectory analysis arises in video surveillance, it becomes crucial to
define the dissimilarity measure between two trajectories. Although the Hausdorff distance …

A robust blockchain-based watermarking using edge detection and wavelet transform

PK Mannepalli, V Richhariya, SK Gupta… - Multimedia Tools and …, 2024 - Springer
Nowadays, image security is a crucial component of the scientific community. The
transparent marking is often used to keep medical imaging information from being stolen …

Robust 3D watermarking with high imperceptibility based on EMD on surfaces

J Hu, M Dai, X Wang, Q Xie, D Zhang - The Visual Computer, 2023 - Springer
The rising use of 3D digital products has increased the demand for copyright protection. In
this paper, we propose a novel and robust 3D watermarking method with high …

Dual information hiding algorithm based on the regularity of 3D mesh model

S Ren, H Cheng, A Fan - Optoelectronics Letters, 2022 - Springer
Aiming at the problems of low embedding capacity and inflexibility of embedded information
in current three-dimensional (3D) model information hiding technology, a dual information …

High-capacity multi-MSB predictive reversible data hiding in encrypted domain for triangular mesh models

G Zhang, X Cheng, F Yang, A Wang, X Zhang… - Journal of Visual …, 2024 - Elsevier
Reversible data hiding in encrypted domain (RDH-ED) is widely used in sensitive fields
such as privacy protection and copyright authentication. However, the embedding capacity …

A peek into the metaverse: detecting 3D model clones in mobile games

C Zuo, C Wang, Z Lin - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
3D models are indispensable assets in metaverse in general and mobile games in
particular. Yet, these 3D models can be readily extracted, duplicated, or cloned, a reality that …

[PDF][PDF] High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security.

W Elhamzi, M Jallouli, Y Bouteraa - Computers, Materials & …, 2022 - cdn.techscience.cn
Since 3D mesh security has become intellectual property, 3D watermarking algorithms have
continued to appear to secure 3D meshes shared by remote users and saved in distant …

点云投影采样及其同步三维信息隐藏方法

张释如, 温一帆, 文猛, 王锐, 王乐, 尉涛 - 计算机辅助设计与图形学学报 - jcad.cn
针对现有三维信息隐藏算法中顶点同步时间长和不稳定的情况, 提出一种基于投影采样的同步
三维点云信息隐藏方法. 主要贡献是提出一种点云投影采样方法, 可以消除水印嵌入坐标值后对 …

Full-Reference Objective Quality Metric for Three-Dimensional Deformed Models

N Elloumi, H Loukil, MS Bouhlel - International Journal of Image …, 2024 - World Scientific
Three-dimensional data are generally represented by triangular meshes. The 3D data are
used in several fields including remote 3D games, 3D medical application, 3D virtual worlds …