A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models
暂无分享,去创建一个
Yuan-Yu Tsai | Yao-Hsien Huang | Tsung-Chieh Cheng | Yuan-Yu Tsai | Tsung-Chieh Cheng | Yao-Hsien Huang
[1] Shyr-Shen Yu,et al. Hamming Code Based Watermarking Scheme for 3D Model Verification , 2014, 2014 International Symposium on Computer, Consumer and Control.
[3] Chung-Ming Wang,et al. Reversible Data Hiding for Point-Sampled Geometry , 2007, J. Inf. Sci. Eng..
[4] Yuan-Yu Tsai. An adaptive steganographic algorithm for 3D polygonal models using vertex decimation , 2012, Multimedia Tools and Applications.
[5] Chin-Chen Chang,et al. A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..
[6] Jun-Hai Yong,et al. A numerically stable fragile watermarking scheme for authenticating 3D models , 2008, Comput. Aided Des..
[7] Shyr-Shen Yu,et al. A HIGH VERIFICATION CAPACITY REVERSIBLE FRAGILE WATERMARKING SCHEME FOR 3D MODELS , 2011 .
[8] Yu-Chen Hu,et al. A novel reversible image authentication scheme for digital images , 2014, Signal Process..
[9] Che-Wei Lee,et al. A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding , 2013, Signal Process..
[10] Din-Chang Tseng,et al. Affine-Transformation-Invariant Public Fragile Watermarking for 3D Model Authentication , 2009, IEEE Computer Graphics and Applications.
[11] Paolo Cignoni,et al. Metro: Measuring Error on Simplified Surfaces , 1998, Comput. Graph. Forum.
[12] Ya-Wen Yang,et al. A Spherical Coordinate Based Fragile Watermarking Scheme for 3D Models , 2013, IEA/AIE.
[13] Boon-Lock Yeo,et al. Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.
[14] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[15] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[16] T. Y. Chen,et al. ADAPTIVE AUTHENTICATION SCHEMES FOR 3D MESH MODELS , 2009 .
[17] G. Charith K. Abhayaratne,et al. Scalable watermark extraction for real-time authentication of JPEG 2000 images , 2011, Journal of Real-Time Image Processing.