A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability
暂无分享,去创建一个
[1] Jean-Denis Durou,et al. Numerical methods for shape-from-shading: A new survey with benchmarks , 2008, Comput. Vis. Image Underst..
[2] Hsien-Hsin S. Lee,et al. A digital rights enabled graphics processing system , 2006, GH '06.
[3] Guanrong Chen,et al. Chaos-Based Encryption for Digital Images and Videos , 2004 .
[4] Yang Jie. Geodesic Distance for Support Vector Machines , 2005 .
[5] Gloria Haro. Shape from Silhouette Consensus , 2012, Pattern Recognit..
[6] Alexander M. Bronstein,et al. Numerical Geometry of Non-Rigid Shapes , 2009, Monographs in Computer Science.
[7] Richard P. Brent,et al. Modern Computer Arithmetic , 2010 .
[8] Ralph Howard,et al. Data encryption standard , 1987 .
[9] D. Eastlake,et al. XML Encryption Syntax and Processing , 2003 .
[10] José García Rodríguez,et al. Geometric 3D point cloud compression , 2014, Pattern Recognit. Lett..
[11] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[12] Concha Bielza,et al. Three-Dimensional Spatial Distribution of Synapses in the Neocortex: A Dual-Beam Electron Microscopy Study , 2013, Cerebral cortex.
[13] Atilla Baskurt,et al. A Comprehensive Survey on Three-Dimensional Mesh Watermarking , 2008, IEEE Transactions on Multimedia.
[14] Peter J. Diggle,et al. Statistical Analysis of Spatial and Spatio-Temporal Point Patterns , 2013 .
[15] Hong Heather Yu,et al. Multimedia Encryption , 2006, Encyclopedia of Multimedia.
[16] Andrey Bogdanov,et al. Analysis and design of block cipher constructions , 2010 .
[17] A. Ardeshir Goshtasby,et al. A Curvature-Adaptive Implicit Surface Reconstruction for Irregularly Spaced Points , 2012, IEEE Transactions on Visualization and Computer Graphics.
[18] Marc Eluard,et al. Geometry-preserving Encryption for 3D Meshes , 2013 .
[19] Michael R. Frey,et al. An Introduction to Stochastic Modeling (2nd Ed.) , 1994 .
[20] Shipeng Li,et al. Encryption and authentication for scalable multimedia: current state of the art and challenges , 2004, SPIE Optics East.
[21] Liu Nian-sheng,et al. Pseudo-randomness and complexity of binary sequences generated by the chaotic system , 2011 .
[22] Jean-Michel Muller,et al. Modern Computer Arithmetic , 2016, Computer.
[23] H. M. Taylor,et al. An introduction to stochastic modeling , 1985 .
[24] Dietrich Stoyan. Statistical Analysis of Spatial and Spatio‐Temporal Point Patterns, 3rd edition. P. J. Diggle (2013). Boca Raton: Chapman & Hall/CRC Monographs on Statistics and Applied Probability. 267 pages, ISBN: 978‐1‐4665‐6023‐9. , 2014 .
[25] Martial Hebert,et al. Statistical approaches to multi-scale point cloud processing , 2008 .
[26] Charalambos Poullis,et al. A Framework for Automatic Modeling from Point Cloud Data , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] J. Rice. Mathematical Statistics and Data Analysis , 1988 .
[28] Ljupco Kocarev,et al. Theory and practice of chaotic cryptography , 2007 .
[29] Kenneth Dixon,et al. Introduction to Stochastic Modeling , 2011 .
[30] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[31] Benoit M. Macq,et al. From 3D Mesh Data Hiding to 3D Shape Blind and Robust Watermarking: A Survey , 2007, Trans. Data Hiding Multim. Secur..
[32] Marc Levoy,et al. Protected interactive 3D graphics via remote rendering , 2004, ACM Trans. Graph..
[33] Jian Yang,et al. Protect Interactive 3D Models via Vertex Shader Programming , 2005, ICEC.
[34] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[35] Radu Bogdan Rusu,et al. 3D is here: Point Cloud Library (PCL) , 2011, 2011 IEEE International Conference on Robotics and Automation.
[36] Levoy Marc,et al. 2 – THE EARLY HISTORY OF POINT-BASED GRAPHICS , 2007 .
[37] Alexander M. Bronstein,et al. Efficient Computation of Isometry-Invariant Distances Between Surfaces , 2006, SIAM J. Sci. Comput..