A multi-secret sharing scheme for 3D solid objects
暂无分享,去创建一个
[1] Shunzhi Zhu,et al. A Real-Time 3D Collision Detection Encryption Algorithm Based on Improved RC5 , 2011 .
[2] A. Ben Hamza,et al. Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..
[3] Myungjin Cho,et al. Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.
[4] Boon-Lock Yeo,et al. Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.
[5] A. Ben Hamza,et al. Robust Approaches to 3D Object Secret Sharing , 2010, ICIAR.
[6] A. Ben Hamza,et al. Information-theoretic hashing of 3D objects using spectral graph theory , 2009, Expert Syst. Appl..
[7] Myungjin Cho,et al. Optical Encryption and Information Authentication of 3D Objects Considering Wireless Channel Characteristics , 2013 .
[8] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[9] Bin Ren,et al. The 3-dimensional cellular automata for HIV infection , 2014 .
[10] Svyatoslav Igorevich Ivanov,et al. 3D Cellular automata for modeling of spray freeze drying process , 2011 .
[11] William Puech,et al. Wavelet-based high-capacity watermarking of 3-D irregular meshes , 2014, Multimedia Tools and Applications.
[12] Emmanuel Fernandes,et al. Geometric soft hash functions for 2D and 3D objects , 2004, IS&T/SPIE Electronic Imaging.
[13] Julio C. Rodriguez-Quinonez,et al. Optical monitoring of scoliosis by 3D medical laser scanner , 2014 .
[14] Ki-Ryong Kwon,et al. Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol , 2014, KSII Trans. Internet Inf. Syst..
[15] Sylaiou Styliani,et al. Virtual museums, a survey and some issues for consideration , 2009 .
[16] Dengfu Chen,et al. A three-dimensional cellular automata model coupled with finite element method and thermodynamic database for alloy solidification , 2013 .
[17] Atilla Baskurt,et al. Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation , 2007, Information Hiding.
[18] Palash Sarkar,et al. A brief history of cellular automata , 2000, CSUR.
[19] Karthik Ramani,et al. Shape-based clustering for 3D CAD objects: A comparative study of effectiveness , 2009, Comput. Aided Des..
[20] Din-Chang Tseng,et al. A public fragile watermarking scheme for 3D model authentication , 2006, Comput. Aided Des..
[21] Peng-Zhi Pan,et al. Modeling the cracking process of rocks from continuity to discontinuity using a cellular automaton , 2012, Comput. Geosci..
[22] Yu-Ming Cheng,et al. An adaptive steganographic algorithm for 3D polygonal meshes , 2007, The Visual Computer.
[23] Ki-Ryong Kwon,et al. Multiple 3D Medical Data Watermarking for Healthcare Data Management , 2010, Journal of Medical Systems.
[24] Bahrain Javidi,et al. Optical watermarking of 3D objects for authentication in transmission and storage , 2003, The 16th Annual Meeting of the IEEE Lasers and Electro-Optics Society, 2003. LEOS 2003..
[25] A. Ben Hamza,et al. Secret sharing of 3D models using Blakely scheme , 2010, 2010 25th Biennial Symposium on Communications.
[26] Adi Shamir,et al. How to share a secret , 1979, CACM.
[27] Sergio D. Felicelli,et al. Modeling dendritic solidification of Al–3%Cu using cellular automaton and phase-field methods , 2013 .
[28] Benoît Macq,et al. 3D Objects Watermarking and Tracking of Their Visual Representations , 2011, MMEDIA 2011.
[29] Chen-Ming Fan,et al. Error Detecting Code Based Fragile Watermarking Scheme for 3D Models , 2014, 2014 International Symposium on Computer, Consumer and Control.
[30] Prabir Bhattacharya,et al. Watermarking 3D models using spectral mesh compression , 2009, Signal Image Video Process..
[31] A. Ben Hamza,et al. Entropic hashing of 3D objects using Laplace-Beltrami operator , 2008, 2008 15th IEEE International Conference on Image Processing.
[32] Ian Hughes. Virtual worlds, augmented reality, blended reality , 2012, Comput. Networks.
[33] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[34] Fabio Bruno,et al. From 3D reconstruction to virtual reality: A complete methodology for digital archaeological exhibition , 2010 .
[35] Byoungho Kim,et al. Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging. , 2014, Applied optics.