Loading…
Watermarking 3D objects for verification
We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objec...
Saved in:
Published in: | IEEE computer graphics and applications 1999-01, Vol.19 (1), p.36-45 |
---|---|
Main Authors: | , |
Format: | Magazinearticle |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3 |
---|---|
cites | cdi_FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3 |
container_end_page | 45 |
container_issue | 1 |
container_start_page | 36 |
container_title | IEEE computer graphics and applications |
container_volume | 19 |
creator | Boon-Lock Yeo Yeung, M.M. |
description | We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models. |
doi_str_mv | 10.1109/38.736467 |
format | magazinearticle |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671311829</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>736467</ieee_id><sourcerecordid>28839652</sourcerecordid><originalsourceid>FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3</originalsourceid><addsrcrecordid>eNqF0D1PwzAQBmALgUQpDKxMmVAZUnxnxx8jKp9SJRYQo2WcM0ppm2KnSPx7glIxwnJ30vvohpexU-BTAG4vhZlqoaTSe2wEVWVK0JXaZyOOGvsb1CE7ynnBOa8q4CM2efEdpZVP7836rRDXRfu6oNDlIrap-KTUxCb4rmnXx-wg-mWmk90es-fbm6fZfTl_vHuYXc3LIMF2pakVgJRRqxD6WaMkG8hGY0iirqE23JCJEr0nQOQeASWXMZDHoH0QY3Y-_N2k9mNLuXOrJgdaLv2a2m12aIywqsL_oUaurIUeTv6EoDQIAIO2pxcDDanNOVF0m9T05Xw54O6nXyeMG_rt7dlgGyL6dbvwG5eUc0k</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>1671311829</pqid></control><display><type>magazinearticle</type><title>Watermarking 3D objects for verification</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Boon-Lock Yeo ; Yeung, M.M.</creator><creatorcontrib>Boon-Lock Yeo ; Yeung, M.M.</creatorcontrib><description>We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models.</description><identifier>ISSN: 0272-1716</identifier><identifier>EISSN: 1558-1756</identifier><identifier>DOI: 10.1109/38.736467</identifier><identifier>CODEN: ICGADZ</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analogies ; Categories ; Data encapsulation ; Data security ; Filtering ; Frequency ; Gaussian distribution ; Mathematical models ; Object detection ; Protection ; Robustness ; Three dimensional ; Three dimensional models ; Two dimensional ; Watermarking</subject><ispartof>IEEE computer graphics and applications, 1999-01, Vol.19 (1), p.36-45</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3</citedby><cites>FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/736467$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,27923,54794</link.rule.ids></links><search><creatorcontrib>Boon-Lock Yeo</creatorcontrib><creatorcontrib>Yeung, M.M.</creatorcontrib><title>Watermarking 3D objects for verification</title><title>IEEE computer graphics and applications</title><addtitle>CG-M</addtitle><description>We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models.</description><subject>Analogies</subject><subject>Categories</subject><subject>Data encapsulation</subject><subject>Data security</subject><subject>Filtering</subject><subject>Frequency</subject><subject>Gaussian distribution</subject><subject>Mathematical models</subject><subject>Object detection</subject><subject>Protection</subject><subject>Robustness</subject><subject>Three dimensional</subject><subject>Three dimensional models</subject><subject>Two dimensional</subject><subject>Watermarking</subject><issn>0272-1716</issn><issn>1558-1756</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>1999</creationdate><recordtype>magazinearticle</recordtype><recordid>eNqF0D1PwzAQBmALgUQpDKxMmVAZUnxnxx8jKp9SJRYQo2WcM0ppm2KnSPx7glIxwnJ30vvohpexU-BTAG4vhZlqoaTSe2wEVWVK0JXaZyOOGvsb1CE7ynnBOa8q4CM2efEdpZVP7836rRDXRfu6oNDlIrap-KTUxCb4rmnXx-wg-mWmk90es-fbm6fZfTl_vHuYXc3LIMF2pakVgJRRqxD6WaMkG8hGY0iirqE23JCJEr0nQOQeASWXMZDHoH0QY3Y-_N2k9mNLuXOrJgdaLv2a2m12aIywqsL_oUaurIUeTv6EoDQIAIO2pxcDDanNOVF0m9T05Xw54O6nXyeMG_rt7dlgGyL6dbvwG5eUc0k</recordid><startdate>199901</startdate><enddate>199901</enddate><creator>Boon-Lock Yeo</creator><creator>Yeung, M.M.</creator><general>IEEE</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>199901</creationdate><title>Watermarking 3D objects for verification</title><author>Boon-Lock Yeo ; Yeung, M.M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Analogies</topic><topic>Categories</topic><topic>Data encapsulation</topic><topic>Data security</topic><topic>Filtering</topic><topic>Frequency</topic><topic>Gaussian distribution</topic><topic>Mathematical models</topic><topic>Object detection</topic><topic>Protection</topic><topic>Robustness</topic><topic>Three dimensional</topic><topic>Three dimensional models</topic><topic>Two dimensional</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Boon-Lock Yeo</creatorcontrib><creatorcontrib>Yeung, M.M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore Digital Library</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE computer graphics and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Boon-Lock Yeo</au><au>Yeung, M.M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Watermarking 3D objects for verification</atitle><jtitle>IEEE computer graphics and applications</jtitle><stitle>CG-M</stitle><date>1999-01</date><risdate>1999</risdate><volume>19</volume><issue>1</issue><spage>36</spage><epage>45</epage><pages>36-45</pages><issn>0272-1716</issn><eissn>1558-1756</eissn><coden>ICGADZ</coden><abstract>We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models.</abstract><pub>IEEE</pub><doi>10.1109/38.736467</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0272-1716 |
ispartof | IEEE computer graphics and applications, 1999-01, Vol.19 (1), p.36-45 |
issn | 0272-1716 1558-1756 |
language | eng |
recordid | cdi_proquest_miscellaneous_1671311829 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Analogies Categories Data encapsulation Data security Filtering Frequency Gaussian distribution Mathematical models Object detection Protection Robustness Three dimensional Three dimensional models Two dimensional Watermarking |
title | Watermarking 3D objects for verification |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T10%3A14%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Watermarking%203D%20objects%20for%20verification&rft.jtitle=IEEE%20computer%20graphics%20and%20applications&rft.au=Boon-Lock%20Yeo&rft.date=1999-01&rft.volume=19&rft.issue=1&rft.spage=36&rft.epage=45&rft.pages=36-45&rft.issn=0272-1716&rft.eissn=1558-1756&rft.coden=ICGADZ&rft_id=info:doi/10.1109/38.736467&rft_dat=%3Cproquest_ieee_%3E28839652%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1671311829&rft_id=info:pmid/&rft_ieee_id=736467&rfr_iscdi=true |