[go: up one dir, main page]

Itier et al., 2015 - Google Patents

Joint synchronization and high capacity data hiding for 3D meshes

Itier et al., 2015

View PDF
Document ID
6381845859522761468
Author
Itier V
Puech W
Gesquiere G
Pedeboy J
Publication year
Publication venue
Three-Dimensional Image Processing, Measurement (3DIPM), and Applications 2015

External Links

Snippet

Three-dimensional (3-D) meshes are already profusely used in lot of domains. In this paper, we propose a new high capacity data hiding scheme for vertex cloud. Our approach is based on very small displacements of vertices, that produce very low distortion of the mesh …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Wang et al. Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping
Hsu et al. Copyright protection scheme for digital images using visual cryptography and sampling methods
Wang et al. Hamming code based watermarking scheme for 3D model verification
Li et al. Robust copyright protection using multiple ownership watermarks
Wang et al. Reversible fragile watermarking for locating tampered blocks in 2D vector maps
Kshirsagar et al. Anatomized study of security solutions for multimedia: deep learning-enabled authentication, cryptography and information hiding
Jang et al. A crypto-marking method for secure vector map
Joshi et al. Simultaneous encryption of a color and a gray-scale image using byte-level encoding based on single-channel double random-phase encoding architecture in fractional Fourier domain
Itier et al. Joint synchronization and high capacity data hiding for 3D meshes
Nishchal Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding
Borah et al. Three-dimensional (3D) polygon mesh authentication using sequential bit substitution strategy
Li et al. Reversible data hiding for encrypted 3D model based on prediction error expansion
Yang Information analysis for steganography and steganalysis in 3D polygonal meshes
Chuman et al. A jigsaw puzzle solver-based attack on block-wise image encryption for privacy-preserving DNNs
Essa et al. Multibit least significant bit matching: a novel approach to image steganography
Singh et al. Rotation invariant moments and transforms for geometrically invariant image watermarking
Tsai An efficient 3D information hiding algorithm based on sampling concepts
Aly New quantum color image watermarking technique (NQCIWT)
Tsai et al. A Low‐Complexity Region‐Based Authentication Algorithm for 3D Polygonal Models
Fan et al. Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques
Abubahia et al. Partition clustering for GIS map data protection
Pham et al. Perceptual encryption based on features of interpolating curve for vector map
Lee et al. Optimal pixel-level self-repairing authentication method for grayscale images under a minimax criterion of distortion reduction
Gottimukkala et al. Image watermarking based on remainder value differencing and extended Hamming code
Radhakrishnan et al. On the security of the visual hash function