Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/311535.311540acmconferencesArticle/Chapter ViewAbstractPublication PagessiggraphConference Proceedingsconference-collections
Article
Free access

Robust mesh watermarking

Published: 01 July 1999 Publication History
First page of PDF

References

[1]
BENEDENS, O. Geometry-based watermarking of 3d models. IEEE Computer Graphics and Applications (Jan. 1999), 46-55.]]
[2]
BESL, P. J., AND MCKAY, N. D. A method for registration of 3-d shapes. IEEE Transactions on Pattern Analysis and Machine Intelligence 14, 2 (Feb. 1992), 239-256.]]
[3]
CHEN,Y.,AND MEDIONI, G. Object modelling by registration of multiple range images. Image and Vision Computing 10, 3 (Apr. 1992), 145-155.]]
[4]
COX, I. J., KILLIAN, J., LEIGHTON,T.,AND SHAMOON, T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 12, 6 (1997), 1673-1687.]]
[5]
CRAVER, S., MEMON, N., YEO, B.-L., AND YEUNG, M. M. Resolving rightful ownership with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16,4 (May 1998), 573-586.]]
[6]
ECK, M., DEROSE,T.,DUCHAMP,T.,HOPPE, H., LOUNSBERY, M., AND STUETZLE, W. Multiresolution analysis of arbitrary meshes. In ACM SIGGRAPH 95 Conference Proceedings (Aug. 1995), pp. 173-182.]]
[7]
FAUGERAS, O. D. The representation, recognition, and locating of 3-d objects. International Journal on Robotic Research 5, 3 (1986), 27-52.]]
[8]
HOPPE, H. Progressive meshes. In ACM SIGGRAPH 96 Conference Proceedings (Aug. 1996), pp. 99-108.]]
[9]
KOBBELT, L., CAMPAGNA, S., AND SEIDEL, H.-P. A general framework for mesh decimation. In Proceedings of Graphics Interface (1998).]]
[10]
KOBBELT, L., CAMPAGNA, S., VORSATZ, J., AND SEIDEL, H.-P. Interactive multi-resolution modeling on arbitrary meshes. In ACM SIGGRAPH 98 Conference Proceedings (July 1998), pp. 105-114.]]
[11]
LEE,A.W.F.,SWELDENS,W.,SCHRODER,P.,COWSAR, L., AND DOBKIN, D. MAPS: Multiresolution adaptive parameterization of surfaces. In ACM SIGGRAPH 98 Conference Proceedings (July 1998), pp. 95-104.]]
[12]
MAILLOT, J., YAHIA, H., AND VERROUST, A. Interactive texture mapping. In Computer Graphics (SIGGRAPH 93 Proceedings), vol. 27, pp. 27-34.]]
[13]
MEMON, N., AND WONG, P. W. Protecting digital media content. Communications of the ACM 41, 7 (July 1998), 35-43.]]
[14]
NIKOLAIDIS, N., AND PITAS, I. Copyright protection of images using robust digital signatures. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (May 1996), pp. 2168-2171.]]
[15]
OHBUCHI, R., MASUDA, H., AND AONO, M. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE Journal on Selected Areas in Communications 16, 4 (May 1998), 551-559.]]
[16]
PETITCOLAS, F. A., ANDERSON, R. J., AND KUHN, M. G. Attacks on copyright marking systems. In Second Workshop on Information Hiding (Apr. 1998).]]
[17]
PODILCHUK, C. I., AND ZENG, W. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications 16, 4 (May 1998), 525-539.]]
[18]
POPOVIC, J., AND HOPPE, H. Progressive simplicial complexes. In ACM SIGGRAPH 97 Conference Proceedings (Aug. 1997), pp. 217-224.]]
[19]
PRESS, W. H., TEULKOLSKY, S. A., VETTERLING,W.T.,AND FLANNERY, B. P. Numerical Recipes in C, 2nd ed. Cambridge University Press, 1996.]]
[20]
SCHNEIER,B.Applied Cryptography: protocols, algorithms, and source code in C, 2nd ed. John Wiley & Sons, Inc., 1996.]]
[21]
SCHYNDEL,R.V.,TIRKEL, A., AND OSBORNE, C. A digital watermark. In Proceedings of ICIP (Nov. 1994), IEEE Press, pp. 86-90.]]
[22]
STONE, H. S. Analysis of attacks on image watermarks with randomized coefficients. Tech. rep., NEC Research Institute, May 1996.]]
[23]
TAUBIN, G. A signal processing approach to fair surface design. In ACM SIGGRAPH 95 Conference Proceedings (Aug. 1995), pp. 351-358.]]
[24]
WOODS, K. Generating ROC curves for artificial neural networks. IEEE Transactions on medical imaging 16, 3 (June 1997), 329-337.]]
[25]
YEUNG, M. M., AND YEO, B.-L. Fragile watermarking of 3d objects. In International Conference on Image Processing (1998).]]

Cited By

View all
  • (2024)Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design FilesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653276(211-220)Online publication date: 19-Jun-2024
  • (2024)Protecting NeRFs’ Copyright via Plug-And-Play Watermarking Base ModelComputer Vision – ECCV 202410.1007/978-3-031-73247-8_4(57-73)Online publication date: 1-Nov-2024
  • (2024)GeometrySticker: Enabling Ownership Claim of Recolorized Neural Radiance FieldsComputer Vision – ECCV 202410.1007/978-3-031-72673-6_24(438-454)Online publication date: 22-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGGRAPH '99: Proceedings of the 26th annual conference on Computer graphics and interactive techniques
July 1999
463 pages
ISBN:0201485605

Sponsors

Publisher

ACM Press/Addison-Wesley Publishing Co.

United States

Publication History

Published: 01 July 1999

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. copyright protection
  2. steganography

Qualifiers

  • Article

Conference

SIGGRAPH99
Sponsor:

Acceptance Rates

SIGGRAPH '99 Paper Acceptance Rate 52 of 320 submissions, 16%;
Overall Acceptance Rate 1,822 of 8,601 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)165
  • Downloads (Last 6 weeks)40
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design FilesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653276(211-220)Online publication date: 19-Jun-2024
  • (2024)Protecting NeRFs’ Copyright via Plug-And-Play Watermarking Base ModelComputer Vision – ECCV 202410.1007/978-3-031-73247-8_4(57-73)Online publication date: 1-Nov-2024
  • (2024)GeometrySticker: Enabling Ownership Claim of Recolorized Neural Radiance FieldsComputer Vision – ECCV 202410.1007/978-3-031-72673-6_24(438-454)Online publication date: 22-Oct-2024
  • (2024)Noise-NeRF: Hide Information in Neural Radiance Field Using Trainable NoiseArtificial Neural Networks and Machine Learning – ICANN 202410.1007/978-3-031-72335-3_22(320-334)Online publication date: 17-Sep-2024
  • (2023)A Dual Blind Watermarking Method for 3D Models Based on Normal FeaturesEntropy10.3390/e2510136925:10(1369)Online publication date: 22-Sep-2023
  • (2023)CopyRNeRF: Protecting the CopyRight of Neural Radiance Fields2023 IEEE/CVF International Conference on Computer Vision (ICCV)10.1109/ICCV51070.2023.02047(22344-22354)Online publication date: 1-Oct-2023
  • (2023)StegaNeRF: Embedding Invisible Information within Neural Radiance Fields2023 IEEE/CVF International Conference on Computer Vision (ICCV)10.1109/ICCV51070.2023.00047(441-453)Online publication date: 1-Oct-2023
  • (2022)Ownership Protection on Digital Elevation Model (DEM) Using Transform-Based WatermarkingISPRS International Journal of Geo-Information10.3390/ijgi1103020011:3(200)Online publication date: 16-Mar-2022
  • (2022)Three-Dimensional Mesh Steganography and Steganalysis: A ReviewIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2021.307513628:12(5006-5025)Online publication date: 1-Dec-2022
  • (2022)Deep 3D-to-2D Watermarking: Embedding Messages in 3D Meshes and Extracting Them from 2D Renderings2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)10.1109/CVPR52688.2022.00979(10021-10030)Online publication date: Jun-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media