Loading…

Watermarking 3D objects for verification

We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objec...

Full description

Saved in:
Bibliographic Details
Published in:IEEE computer graphics and applications 1999-01, Vol.19 (1), p.36-45
Main Authors: Boon-Lock Yeo, Yeung, M.M.
Format: Magazinearticle
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3
cites cdi_FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3
container_end_page 45
container_issue 1
container_start_page 36
container_title IEEE computer graphics and applications
container_volume 19
creator Boon-Lock Yeo
Yeung, M.M.
description We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models.
doi_str_mv 10.1109/38.736467
format magazinearticle
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671311829</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>736467</ieee_id><sourcerecordid>28839652</sourcerecordid><originalsourceid>FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3</originalsourceid><addsrcrecordid>eNqF0D1PwzAQBmALgUQpDKxMmVAZUnxnxx8jKp9SJRYQo2WcM0ppm2KnSPx7glIxwnJ30vvohpexU-BTAG4vhZlqoaTSe2wEVWVK0JXaZyOOGvsb1CE7ynnBOa8q4CM2efEdpZVP7836rRDXRfu6oNDlIrap-KTUxCb4rmnXx-wg-mWmk90es-fbm6fZfTl_vHuYXc3LIMF2pakVgJRRqxD6WaMkG8hGY0iirqE23JCJEr0nQOQeASWXMZDHoH0QY3Y-_N2k9mNLuXOrJgdaLv2a2m12aIywqsL_oUaurIUeTv6EoDQIAIO2pxcDDanNOVF0m9T05Xw54O6nXyeMG_rt7dlgGyL6dbvwG5eUc0k</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>1671311829</pqid></control><display><type>magazinearticle</type><title>Watermarking 3D objects for verification</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Boon-Lock Yeo ; Yeung, M.M.</creator><creatorcontrib>Boon-Lock Yeo ; Yeung, M.M.</creatorcontrib><description>We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models.</description><identifier>ISSN: 0272-1716</identifier><identifier>EISSN: 1558-1756</identifier><identifier>DOI: 10.1109/38.736467</identifier><identifier>CODEN: ICGADZ</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analogies ; Categories ; Data encapsulation ; Data security ; Filtering ; Frequency ; Gaussian distribution ; Mathematical models ; Object detection ; Protection ; Robustness ; Three dimensional ; Three dimensional models ; Two dimensional ; Watermarking</subject><ispartof>IEEE computer graphics and applications, 1999-01, Vol.19 (1), p.36-45</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3</citedby><cites>FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/736467$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,27923,54794</link.rule.ids></links><search><creatorcontrib>Boon-Lock Yeo</creatorcontrib><creatorcontrib>Yeung, M.M.</creatorcontrib><title>Watermarking 3D objects for verification</title><title>IEEE computer graphics and applications</title><addtitle>CG-M</addtitle><description>We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models.</description><subject>Analogies</subject><subject>Categories</subject><subject>Data encapsulation</subject><subject>Data security</subject><subject>Filtering</subject><subject>Frequency</subject><subject>Gaussian distribution</subject><subject>Mathematical models</subject><subject>Object detection</subject><subject>Protection</subject><subject>Robustness</subject><subject>Three dimensional</subject><subject>Three dimensional models</subject><subject>Two dimensional</subject><subject>Watermarking</subject><issn>0272-1716</issn><issn>1558-1756</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>1999</creationdate><recordtype>magazinearticle</recordtype><recordid>eNqF0D1PwzAQBmALgUQpDKxMmVAZUnxnxx8jKp9SJRYQo2WcM0ppm2KnSPx7glIxwnJ30vvohpexU-BTAG4vhZlqoaTSe2wEVWVK0JXaZyOOGvsb1CE7ynnBOa8q4CM2efEdpZVP7836rRDXRfu6oNDlIrap-KTUxCb4rmnXx-wg-mWmk90es-fbm6fZfTl_vHuYXc3LIMF2pakVgJRRqxD6WaMkG8hGY0iirqE23JCJEr0nQOQeASWXMZDHoH0QY3Y-_N2k9mNLuXOrJgdaLv2a2m12aIywqsL_oUaurIUeTv6EoDQIAIO2pxcDDanNOVF0m9T05Xw54O6nXyeMG_rt7dlgGyL6dbvwG5eUc0k</recordid><startdate>199901</startdate><enddate>199901</enddate><creator>Boon-Lock Yeo</creator><creator>Yeung, M.M.</creator><general>IEEE</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>199901</creationdate><title>Watermarking 3D objects for verification</title><author>Boon-Lock Yeo ; Yeung, M.M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Analogies</topic><topic>Categories</topic><topic>Data encapsulation</topic><topic>Data security</topic><topic>Filtering</topic><topic>Frequency</topic><topic>Gaussian distribution</topic><topic>Mathematical models</topic><topic>Object detection</topic><topic>Protection</topic><topic>Robustness</topic><topic>Three dimensional</topic><topic>Three dimensional models</topic><topic>Two dimensional</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Boon-Lock Yeo</creatorcontrib><creatorcontrib>Yeung, M.M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore Digital Library</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE computer graphics and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Boon-Lock Yeo</au><au>Yeung, M.M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Watermarking 3D objects for verification</atitle><jtitle>IEEE computer graphics and applications</jtitle><stitle>CG-M</stitle><date>1999-01</date><risdate>1999</risdate><volume>19</volume><issue>1</issue><spage>36</spage><epage>45</epage><pages>36-45</pages><issn>0272-1716</issn><eissn>1558-1756</eissn><coden>ICGADZ</coden><abstract>We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models.</abstract><pub>IEEE</pub><doi>10.1109/38.736467</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0272-1716
ispartof IEEE computer graphics and applications, 1999-01, Vol.19 (1), p.36-45
issn 0272-1716
1558-1756
language eng
recordid cdi_proquest_miscellaneous_1671311829
source IEEE Electronic Library (IEL) Journals
subjects Analogies
Categories
Data encapsulation
Data security
Filtering
Frequency
Gaussian distribution
Mathematical models
Object detection
Protection
Robustness
Three dimensional
Three dimensional models
Two dimensional
Watermarking
title Watermarking 3D objects for verification
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T10%3A14%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Watermarking%203D%20objects%20for%20verification&rft.jtitle=IEEE%20computer%20graphics%20and%20applications&rft.au=Boon-Lock%20Yeo&rft.date=1999-01&rft.volume=19&rft.issue=1&rft.spage=36&rft.epage=45&rft.pages=36-45&rft.issn=0272-1716&rft.eissn=1558-1756&rft.coden=ICGADZ&rft_id=info:doi/10.1109/38.736467&rft_dat=%3Cproquest_ieee_%3E28839652%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c419t-8d61144f76cc4f7d24e9ce9f88e427d1d808e8f42aae1220a212404fcea2c7ac3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1671311829&rft_id=info:pmid/&rft_ieee_id=736467&rfr_iscdi=true