[HTML][HTML] Visible watermarking for 3D models based on 3D Boolean operation
AB Li, H Chen, XL Xie - Egyptian Informatics Journal, 2024 - Elsevier
With the continuous expansion of the application field of 3D models and the convenience of
model storage, transmission, and replication, the problems of illegal reproduction, illegal …
model storage, transmission, and replication, the problems of illegal reproduction, illegal …
Noise-Tolerant Trajectory Distance Computation in the Presence of Inherent Noise for Video Surveillance Applications
As the importance of trajectory analysis arises in video surveillance, it becomes crucial to
define the dissimilarity measure between two trajectories. Although the Hausdorff distance …
define the dissimilarity measure between two trajectories. Although the Hausdorff distance …
A robust blockchain-based watermarking using edge detection and wavelet transform
PK Mannepalli, V Richhariya, SK Gupta… - Multimedia Tools and …, 2024 - Springer
Nowadays, image security is a crucial component of the scientific community. The
transparent marking is often used to keep medical imaging information from being stolen …
transparent marking is often used to keep medical imaging information from being stolen …
Robust 3D watermarking with high imperceptibility based on EMD on surfaces
J Hu, M Dai, X Wang, Q Xie, D Zhang - The Visual Computer, 2023 - Springer
The rising use of 3D digital products has increased the demand for copyright protection. In
this paper, we propose a novel and robust 3D watermarking method with high …
this paper, we propose a novel and robust 3D watermarking method with high …
Dual information hiding algorithm based on the regularity of 3D mesh model
S Ren, H Cheng, A Fan - Optoelectronics Letters, 2022 - Springer
Aiming at the problems of low embedding capacity and inflexibility of embedded information
in current three-dimensional (3D) model information hiding technology, a dual information …
in current three-dimensional (3D) model information hiding technology, a dual information …
High-capacity multi-MSB predictive reversible data hiding in encrypted domain for triangular mesh models
G Zhang, X Cheng, F Yang, A Wang, X Zhang… - Journal of Visual …, 2024 - Elsevier
Reversible data hiding in encrypted domain (RDH-ED) is widely used in sensitive fields
such as privacy protection and copyright authentication. However, the embedding capacity …
such as privacy protection and copyright authentication. However, the embedding capacity …
A peek into the metaverse: detecting 3D model clones in mobile games
3D models are indispensable assets in metaverse in general and mobile games in
particular. Yet, these 3D models can be readily extracted, duplicated, or cloned, a reality that …
particular. Yet, these 3D models can be readily extracted, duplicated, or cloned, a reality that …
[PDF][PDF] High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security.
Since 3D mesh security has become intellectual property, 3D watermarking algorithms have
continued to appear to secure 3D meshes shared by remote users and saved in distant …
continued to appear to secure 3D meshes shared by remote users and saved in distant …
点云投影采样及其同步三维信息隐藏方法
张释如, 温一帆, 文猛, 王锐, 王乐, 尉涛 - 计算机辅助设计与图形学学报 - jcad.cn
针对现有三维信息隐藏算法中顶点同步时间长和不稳定的情况, 提出一种基于投影采样的同步
三维点云信息隐藏方法. 主要贡献是提出一种点云投影采样方法, 可以消除水印嵌入坐标值后对 …
三维点云信息隐藏方法. 主要贡献是提出一种点云投影采样方法, 可以消除水印嵌入坐标值后对 …
Full-Reference Objective Quality Metric for Three-Dimensional Deformed Models
Three-dimensional data are generally represented by triangular meshes. The 3D data are
used in several fields including remote 3D games, 3D medical application, 3D virtual worlds …
used in several fields including remote 3D games, 3D medical application, 3D virtual worlds …