Author: Hang Zhou
Publisher: Springer Nature
ISBN: 9811977208
Category : Computers
Languages : en
Pages : 197
Book Description
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
Triangle Mesh Watermarking and Steganography
Author: Hang Zhou
Publisher: Springer Nature
ISBN: 9811977208
Category : Computers
Languages : en
Pages : 197
Book Description
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
Publisher: Springer Nature
ISBN: 9811977208
Category : Computers
Languages : en
Pages : 197
Book Description
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications
Author: Al-Haj, Ali Mohammad
Publisher: IGI Global
ISBN: 1615209042
Category : Education
Languages : en
Pages : 565
Book Description
"This book introduces readers to state-of-art research in multimedia watermarking in the different disciplines of watermarking, addressing the different aspects of advanced watermarking research; modeling and theoretical analysis, advanced embedding and extraction techniques, software and hardware implementations, and performance evaluations of watermarking systems"--Provided by publisher.
Publisher: IGI Global
ISBN: 1615209042
Category : Education
Languages : en
Pages : 565
Book Description
"This book introduces readers to state-of-art research in multimedia watermarking in the different disciplines of watermarking, addressing the different aspects of advanced watermarking research; modeling and theoretical analysis, advanced embedding and extraction techniques, software and hardware implementations, and performance evaluations of watermarking systems"--Provided by publisher.
Computational Science and Its Applications - ICCSA 2006
Author: Marina Gavrilova
Publisher: Springer Science & Business Media
ISBN: 354034070X
Category : Computers
Languages : en
Pages : 1272
Book Description
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006, held in Glasgow, UK in May 2006.The five volumes present a total of 664 papers selected from over 2300 submissions. The papers present a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in virtually all sciences making use of computational techniques. The topics of the refereed papers are structured according to the five major conference themes: computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies.Moreover, submissions from 31 Workshops and technical sessions in the areas, such as information security, mobile communication, grid computing, modeling, optimization, computational geometry, virtual reality, symbolic computations, molecular structures, Web systems and intelligence, spatial analysis, bioinformatics and geocomputations, contribute to this publication.
Publisher: Springer Science & Business Media
ISBN: 354034070X
Category : Computers
Languages : en
Pages : 1272
Book Description
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006, held in Glasgow, UK in May 2006.The five volumes present a total of 664 papers selected from over 2300 submissions. The papers present a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in virtually all sciences making use of computational techniques. The topics of the refereed papers are structured according to the five major conference themes: computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies.Moreover, submissions from 31 Workshops and technical sessions in the areas, such as information security, mobile communication, grid computing, modeling, optimization, computational geometry, virtual reality, symbolic computations, molecular structures, Web systems and intelligence, spatial analysis, bioinformatics and geocomputations, contribute to this publication.
Curves and Surfaces
Author: Jean-Daniel Boissonnat
Publisher: Springer
ISBN: 3642274137
Category : Computers
Languages : en
Pages : 758
Book Description
This volume constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Curves and Surfaces, held in Avignon, in June 2010. The conference had the overall theme: "Representation and Approximation of Curves and Surfaces and Applications". The 39 revised full papers presented together with 9 invited talks were carefully reviewed and selected from 114 talks presented at the conference. The topics addressed by the papers range from mathematical foundations to practical implementation on modern graphics processing units and address a wide area of topics such as computer-aided geometric design, computer graphics and visualisation, computational geometry and topology, geometry processing, image and signal processing, interpolation and smoothing, scattered data processing and learning theory and subdivision, wavelets and multi-resolution methods.
Publisher: Springer
ISBN: 3642274137
Category : Computers
Languages : en
Pages : 758
Book Description
This volume constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Curves and Surfaces, held in Avignon, in June 2010. The conference had the overall theme: "Representation and Approximation of Curves and Surfaces and Applications". The 39 revised full papers presented together with 9 invited talks were carefully reviewed and selected from 114 talks presented at the conference. The topics addressed by the papers range from mathematical foundations to practical implementation on modern graphics processing units and address a wide area of topics such as computer-aided geometric design, computer graphics and visualisation, computational geometry and topology, geometry processing, image and signal processing, interpolation and smoothing, scattered data processing and learning theory and subdivision, wavelets and multi-resolution methods.
Multimedia Security 1
Author: William Puech
Publisher: John Wiley & Sons
ISBN: 1119901790
Category : Computers
Languages : en
Pages : 322
Book Description
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
Publisher: John Wiley & Sons
ISBN: 1119901790
Category : Computers
Languages : en
Pages : 322
Book Description
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
Security, Steganography, and Watermarking of Multimedia Contents
Information Hiding
Author: Stefan Katzenbeisser
Publisher: Artech House
ISBN: 1608079295
Category : Computers
Languages : en
Pages : 319
Book Description
A successor to the popular Artech House title Information Hiding Techniques for Steganography and Digital Watermarking, this comprehensive and up-to-date new resource gives the reader a thorough review of steganography, digital watermarking and media fingerprinting with possible applications to modern communication, and a survey of methods used to hide information in modern media. This book explores Steganography, as a means by which two or more parties may communicate using invisible or subliminal communication. "Steganalysis" is described as methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to watermarking and its methods, a means of hiding copyright data in images and discusses components of commercial multimedia applications that are subject to illegal use. This book demonstrates a working knowledge of watermarking’s pros and cons, and the legal implications of watermarking and copyright issues on the Internet.
Publisher: Artech House
ISBN: 1608079295
Category : Computers
Languages : en
Pages : 319
Book Description
A successor to the popular Artech House title Information Hiding Techniques for Steganography and Digital Watermarking, this comprehensive and up-to-date new resource gives the reader a thorough review of steganography, digital watermarking and media fingerprinting with possible applications to modern communication, and a survey of methods used to hide information in modern media. This book explores Steganography, as a means by which two or more parties may communicate using invisible or subliminal communication. "Steganalysis" is described as methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to watermarking and its methods, a means of hiding copyright data in images and discusses components of commercial multimedia applications that are subject to illegal use. This book demonstrates a working knowledge of watermarking’s pros and cons, and the legal implications of watermarking and copyright issues on the Internet.
Perception and Re-Synchronization Issues for the Watermarking of 3D Shapes
Author: Patrice Rondao Alface
Publisher: Presses univ. de Louvain
ISBN: 9782874630378
Category : Science
Languages : en
Pages : 444
Book Description
Digital watermarking is the art of embedding secret messages in multimedia contents in order to protect their intellectual property. While the watermarking of image, audio and video is reaching maturity, the watermarking of 3D virtual objects is still a technology in its infancy.In this thesis, we focus on two main issues. The first one is the perception of the distortions caused by the watermarking process or by attacks on the surface of a 3D model. The second one concerns the development of techniques able to retrieve a watermark without the availability of the original data and after common manipulations and attacks.Since imperceptibility is a strong requirement, assessing the visual perception of the distortions that a 3D model undergoes in the watermarking pipeline is a key issue. In this thesis, we propose an image-based metric that relies on the comparison of 2D views with a Mutual Information criterion. A psychovisual experiment has validated the results of this metric for the most common watermarking attacks.The other issue this thesis deals with is the blind and robust watermarking of 3D shapes. In this context, three different watermarking schemes are proposed. These schemes differ by the classes of 3D watermarking attacks they are able to resist to. The first scheme is based on the extension of spectral decomposition to 3D models. This approach leads to robustness against imperceptible geometric deformations. The weakness of this technique is mainly related to resampling or cropping attacks. The second scheme extends the first to resampling by making use of the automatic multiscale detection of robust umbilical points. The third scheme then addresses the cropping attack by detecting robust prong feature points to locally embed a watermark in the spatial domain.
Publisher: Presses univ. de Louvain
ISBN: 9782874630378
Category : Science
Languages : en
Pages : 444
Book Description
Digital watermarking is the art of embedding secret messages in multimedia contents in order to protect their intellectual property. While the watermarking of image, audio and video is reaching maturity, the watermarking of 3D virtual objects is still a technology in its infancy.In this thesis, we focus on two main issues. The first one is the perception of the distortions caused by the watermarking process or by attacks on the surface of a 3D model. The second one concerns the development of techniques able to retrieve a watermark without the availability of the original data and after common manipulations and attacks.Since imperceptibility is a strong requirement, assessing the visual perception of the distortions that a 3D model undergoes in the watermarking pipeline is a key issue. In this thesis, we propose an image-based metric that relies on the comparison of 2D views with a Mutual Information criterion. A psychovisual experiment has validated the results of this metric for the most common watermarking attacks.The other issue this thesis deals with is the blind and robust watermarking of 3D shapes. In this context, three different watermarking schemes are proposed. These schemes differ by the classes of 3D watermarking attacks they are able to resist to. The first scheme is based on the extension of spectral decomposition to 3D models. This approach leads to robustness against imperceptible geometric deformations. The weakness of this technique is mainly related to resampling or cropping attacks. The second scheme extends the first to resampling by making use of the automatic multiscale detection of robust umbilical points. The third scheme then addresses the cropping attack by detecting robust prong feature points to locally embed a watermark in the spatial domain.
Transactions on Data Hiding and Multimedia Security II
Author: Yun Q. Shi
Publisher: Springer
ISBN: 3540730923
Category : Computers
Languages : en
Pages : 124
Book Description
This second issue in the LNCS Transactions on Data Hiding and Multimedia Security contains five papers dealing with a wide range of topics related to multimedia security. Coverage includes an introduction to Fingercasting, which allows joint fingerprinting and decryption of broadcast messages; a presentation on estimation attack on content-based video fingerprinting; and a survey on various blind and robust watermarking schemes for 3D shapes.
Publisher: Springer
ISBN: 3540730923
Category : Computers
Languages : en
Pages : 124
Book Description
This second issue in the LNCS Transactions on Data Hiding and Multimedia Security contains five papers dealing with a wide range of topics related to multimedia security. Coverage includes an introduction to Fingercasting, which allows joint fingerprinting and decryption of broadcast messages; a presentation on estimation attack on content-based video fingerprinting; and a survey on various blind and robust watermarking schemes for 3D shapes.