Paper
30 January 2012 3D multiresolution synchronization scheme based on feature point selection
Author Affiliations +
Proceedings Volume 8290, Three-Dimensional Image Processing (3DIP) and Applications II; 829013 (2012) https://doi.org/10.1117/12.910587
Event: IS&T/SPIE Electronic Imaging, 2012, Burlingame, California, United States
Abstract
Multimedia protection is one of the main research challenges in computer sciences. We can encrypt the media in order to make the content unreadable without a secret key of decryption, protect the file with Digital Right Management (DRM), or embed an hidden message in the file (watermarking and steganography). We are interested in data hiding applications for 3D mesh. In this domain, there are various problems, of which the synchronization of the message in the support host. The synchronization is the operation that allows to scan a mesh with a unique path and by selecting the same areas (vertices, triangles, quadrangles, for example) before and after the embedding even if the mesh has been noised. In this paper, we propose a new synchronization approach based on feature point selection in a low resolution of the 3D object. The building of the low resolution is made by decimation and the feature point selection is based on the discrete curvature computing. We evaluate the robustness of the synchronization in the low resolution and in the high resolution.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
N. Tournier, W. Puech, G. Subsol, and J.-P. Pedeboy "3D multiresolution synchronization scheme based on feature point selection", Proc. SPIE 8290, Three-Dimensional Image Processing (3DIP) and Applications II, 829013 (30 January 2012); https://doi.org/10.1117/12.910587
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Data hiding

Steganography

3D applications

Lawrencium

Multimedia

Symmetric-key encryption

RELATED CONTENT


Back to Top