Itier et al., 2015 - Google Patents
Joint synchronization and high capacity data hiding for 3D meshesItier et al., 2015
View PDF- Document ID
- 6381845859522761468
- Author
- Itier V
- Puech W
- Gesquiere G
- Pedeboy J
- Publication year
- Publication venue
- Three-Dimensional Image Processing, Measurement (3DIPM), and Applications 2015
External Links
Snippet
Three-dimensional (3-D) meshes are already profusely used in lot of domains. In this paper, we propose a new high capacity data hiding scheme for vertex cloud. Our approach is based on very small displacements of vertices, that produce very low distortion of the mesh …
- 238000006073 displacement reaction 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping | |
| Hsu et al. | Copyright protection scheme for digital images using visual cryptography and sampling methods | |
| Wang et al. | Hamming code based watermarking scheme for 3D model verification | |
| Li et al. | Robust copyright protection using multiple ownership watermarks | |
| Wang et al. | Reversible fragile watermarking for locating tampered blocks in 2D vector maps | |
| Kshirsagar et al. | Anatomized study of security solutions for multimedia: deep learning-enabled authentication, cryptography and information hiding | |
| Jang et al. | A crypto-marking method for secure vector map | |
| Joshi et al. | Simultaneous encryption of a color and a gray-scale image using byte-level encoding based on single-channel double random-phase encoding architecture in fractional Fourier domain | |
| Itier et al. | Joint synchronization and high capacity data hiding for 3D meshes | |
| Nishchal | Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding | |
| Borah et al. | Three-dimensional (3D) polygon mesh authentication using sequential bit substitution strategy | |
| Li et al. | Reversible data hiding for encrypted 3D model based on prediction error expansion | |
| Yang | Information analysis for steganography and steganalysis in 3D polygonal meshes | |
| Chuman et al. | A jigsaw puzzle solver-based attack on block-wise image encryption for privacy-preserving DNNs | |
| Essa et al. | Multibit least significant bit matching: a novel approach to image steganography | |
| Singh et al. | Rotation invariant moments and transforms for geometrically invariant image watermarking | |
| Tsai | An efficient 3D information hiding algorithm based on sampling concepts | |
| Aly | New quantum color image watermarking technique (NQCIWT) | |
| Tsai et al. | A Low‐Complexity Region‐Based Authentication Algorithm for 3D Polygonal Models | |
| Fan et al. | Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques | |
| Abubahia et al. | Partition clustering for GIS map data protection | |
| Pham et al. | Perceptual encryption based on features of interpolating curve for vector map | |
| Lee et al. | Optimal pixel-level self-repairing authentication method for grayscale images under a minimax criterion of distortion reduction | |
| Gottimukkala et al. | Image watermarking based on remainder value differencing and extended Hamming code | |
| Radhakrishnan et al. | On the security of the visual hash function |