A numerically stable fragile watermarking scheme for authenticating 3D models

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A numerically stable fragile watermarking scheme for authenticating 3D models

This paper analyzes the numerically instable problem in the current 3D fragile watermarking schemes. Some existing fragile watermarking schemes apply the floating-point arithmetic to embed the watermarks. However, these schemes fail to work properly due to the numerically instable problem, which is common in the floating-point arithmetic. This paper proposes a numerically stable fragile waterma...

متن کامل

A Pca and Perturb Based Fragile Watermarking Scheme for 3d Models

In this paper, a new fragile watermarking scheme that enables the verification of 3D models for detecting unauthorized alterations is presented. The principal component analysis (PCA) is adopted to produce the PCA coordinate system and make the system robust to similarity transformation attacks. Before watermark embedding, the coordinates of illegitimate intervals are slightly perturbed to ensu...

متن کامل

A High Verification Capacity Reversible Fragile Watermarking Scheme for 3d Models

The protection and authentication problems for three dimensional (3D) models have become more and more important. The capability of accurately verifying, locating, and recovering any tampered vertex is one of the most important issues. Published fragile watermarking 3D model schemes have a main drawback, the synchronization problem. To increase the capacity of verification and overcome this dra...

متن کامل

Fragile Watermarking Scheme for Accepting Image Compression

As images are commonly transmitted or stored in compressed form such as JPEG lossy compression, image authentication demands techniques that can distinguish incidental modifications (e.g., compression) from malicious ones. In this paper, we propose an effective technique for image authentication which can prevent malicious manipulations but allow JPEG compression. An image is divided into block...

متن کامل

Hierarchical Fragile Watermarking Scheme For Image Authentication

In this paper, a simple hierarchical fragile watermarking scheme for image authentication is proposed. The important features and parity bits of an image are embedded by modifying the pixel value of the host image. Once an image is tampered by other users or corrupted by transmission, the parity bits and important features can be used to detect and recover the image. The method is effective bec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer-Aided Design

سال: 2008

ISSN: 0010-4485

DOI: 10.1016/j.cad.2008.03.001