Topology authentication for piping isometric drawings
暂无分享,去创建一个
Zhiyong Su | Xin Yang | Guangjie Liu | Weiqing Tang | Weiqing Li | Weiqing Tang | Zhiyong Su | Weiqing Li | Guangjie Liu | Xin Yang
[1] Ki-Ryong Kwon,et al. A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex , 2003, IWDW.
[2] Zhiyong Peng,et al. Watermarking 2D Vector Maps on Spatial Topology Domain , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[3] Ki-Ryong Kwon,et al. Copyright protection of architectural CAD drawing using the multiple watermarking scheme , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[4] Ki-Ryong Kwon,et al. Watermarking for 3D CAD Drawings Based on Three Components , 2006, SSPR/SPR.
[5] Hiroshi Masuda,et al. 8. Managing CAD Data as a Multimedia Data Type Using Digital Watermarking , 2000, Knowledge Intensive CAD.
[6] Din-Chang Tseng,et al. Affine-Transformation-Invariant Public Fragile Watermarking for 3D Model Authentication , 2009, IEEE Computer Graphics and Applications.
[7] Nam Ik Cho,et al. Watermarking Algorithms for 3D NURBS Graphic Data , 2004, EURASIP J. Adv. Signal Process..
[8] Deepa Kundur,et al. Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.
[9] Daniel P. Huttenlocher,et al. Fast affine point matching: an output-sensitive method , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[10] Ross E. Swaney,et al. Optimization of process plant layout with pipe routing , 2005, Comput. Chem. Eng..
[11] Nana Wang,et al. Reversible fragile watermarking for 2-D vector map authentication with localization , 2012, Comput. Aided Des..
[12] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[13] Daniel R. Fuhrmann,et al. Sampling theorems for linear time-varying systems with bandlimited inputs , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[14] Ki-Ryong Kwon,et al. 3D CAD Drawing Watermarking Based on Three Components , 2006, 2006 International Conference on Image Processing.
[15] Ki-Ryong Kwon,et al. CAD drawing watermarking scheme , 2010, Digit. Signal Process..
[16] Jun-Hai Yong,et al. A numerically stable fragile watermarking scheme for authenticating 3D models , 2008, Comput. Aided Des..
[17] Hao-Tian Wu,et al. Reversible Watermarking by Modulation and Security Enhancement , 2010, IEEE Transactions on Instrumentation and Measurement.
[18] Michael Lederhose,et al. CAPD - computer-aided plant design , 2004, Comput. Chem. Eng..
[19] Rui Yang,et al. Geometric Invariant Audio Watermarking Based on an LCM Feature , 2011, IEEE Transactions on Multimedia.
[20] Hao-Tian Wu,et al. A Sequential Quantization Strategy for Data Embedding and Integrity Verification , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[21] Caiming Zhang,et al. A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models , 2012, TOMCCAP.
[22] Zhiyong Su,et al. Watermarking 3D CAPD models for topology verification , 2013, Comput. Aided Des..
[23] Koichi Harada. Parity enhanced topology based spot area watermarking method for copyright protection of layered 3D triangular mesh data , 2006 .
[24] Ralf Steinmetz. Editorial note and call for nominations: Nicolas D. Georganas best paper award , 2012, TOMCCAP.
[25] William Puech,et al. Topological synchronization mechanism for robust watermarking on 3D semi-regular meshes , 2011, 2011 IEEE International Conference on Multimedia and Expo.
[26] Zhiyong Su,et al. Authenticating topological integrity of process plant models through digital watermarking , 2013, Multimedia Tools and Applications.
[27] Zhiyong Su,et al. Topology authentication for CAPD models based on Laplacian coordinates , 2013, Comput. Graph..
[28] Y.-L. Chen,et al. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.
[29] Xin Li,et al. Hardware Implementation of a Digital Watermarking System for Video Authentication , 2013, IEEE Transactions on Circuits and Systems for Video Technology.
[30] Fei Peng,et al. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion , 2011, Comput. Aided Des..
[31] Hiroshi Masuda,et al. A shape-preserving data embedding algorithm for NURBS curves and surfaces , 1999, 1999 Proceedings Computer Graphics International.
[32] Fei Peng,et al. A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation , 2010, Comput. Aided Des..