Creation of 3-D digital models is an expensive process and the owners of these models are reluctant to make the models publically available. A typical example is the case of interactive web applications where these models can be downloaded and used illegally without their consent. Watermarking addresses the issue of copyright protection of 3-D models by inserting the copyright information (watermark) robustly and invisibly in 3-D models without creating a visually discernable impact on the model. This watermark may be useful as a proof of ownership of a 3-D model. The first contribution of this thesis is the design and development of a novel watermarking system for copyright protection of 3-D triangle models. The proposed method inserts the...
Abstract—In this paper, two novel methods suitable for blind 3D mesh object watermarking application...
A new watermarking method for 3D model robust to geometric attacks is presented. The algorithm first...
Almost all of the steganographic techniques developed so far require considerable processing, as muc...
This paper presents a watermarking algorithm suitable for embedding private watermarks into three di...
Two methods are presented which allow to embed public readable watermarks into three dimensional mod...
Goals of this work are to summarize the process and existing methods of 3D models watermarking, to c...
3-D object security is increasingly brought to the attention of the public by the expansion of new m...
International audienceThis paper presents a robust watermarking algorithm applied to 3D compressed p...
Two watermarking algorithms for 3D nonuniform rational B-spline (NURBS) graphic data are proposed: o...
International audienceThis chapter presents the challenges of the data hiding methods, as well as th...
State-of-the-art blind and robust 3D watermarking schemes already withstand combinations of a wide v...
Despite the increasing interest in digital watermarking of multimedia data, watermarking of 3D geome...
Abstract. Designing a powerful fragile watermarking technique for au-thenticating 3-D polygonal mesh...
With the increase of three-dimensional (3D) printing applications in many areas of life, a large amo...
Watermarking schemes for copyright protection of point cloud representation of 3D models operate onl...
Abstract—In this paper, two novel methods suitable for blind 3D mesh object watermarking application...
A new watermarking method for 3D model robust to geometric attacks is presented. The algorithm first...
Almost all of the steganographic techniques developed so far require considerable processing, as muc...
This paper presents a watermarking algorithm suitable for embedding private watermarks into three di...
Two methods are presented which allow to embed public readable watermarks into three dimensional mod...
Goals of this work are to summarize the process and existing methods of 3D models watermarking, to c...
3-D object security is increasingly brought to the attention of the public by the expansion of new m...
International audienceThis paper presents a robust watermarking algorithm applied to 3D compressed p...
Two watermarking algorithms for 3D nonuniform rational B-spline (NURBS) graphic data are proposed: o...
International audienceThis chapter presents the challenges of the data hiding methods, as well as th...
State-of-the-art blind and robust 3D watermarking schemes already withstand combinations of a wide v...
Despite the increasing interest in digital watermarking of multimedia data, watermarking of 3D geome...
Abstract. Designing a powerful fragile watermarking technique for au-thenticating 3-D polygonal mesh...
With the increase of three-dimensional (3D) printing applications in many areas of life, a large amo...
Watermarking schemes for copyright protection of point cloud representation of 3D models operate onl...
Abstract—In this paper, two novel methods suitable for blind 3D mesh object watermarking application...
A new watermarking method for 3D model robust to geometric attacks is presented. The algorithm first...
Almost all of the steganographic techniques developed so far require considerable processing, as muc...