ADAPTIVE AUTHENTICATION SCHEMES FOR 3D MESH MODELS

被引:0
|
作者
Chen, Te-Yu [2 ]
Hwang, Min-Shiang [1 ]
Jan, Jinn-Ke [2 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 402, Taiwan
关键词
3D models; Fragile watermarking; 3D (mesh) model authentication; Tamper detection; Distortion control; FRAGILE WATERMARKING;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of computer technology and the increasing attractiveness of the 3D model, the 3D model has been applied widely in many different fields, such as engineering, medicine, entertainment, etc. Thus, security threats to 3D models must be seriously considered. Many researchers have proposed solutions to security issues with cryptography and still images. However, they are unsuitable for 3D models, because of the 3D models' special characteristics. In this paper, we propose two schemes to solve the problem, of authentication in 3D mesh models. first, our schemes can detect and locate any unauthorized modification precisely. Second, both schemes have the features of being public and having the short key. Third, the distortion is controllable and is proven to be k(1)/3 on average, where k(1) is a key specified by users. In addition, after being slightly modified, both schemes can deal with point-sampled geometry and be robust to affine transformations.
引用
收藏
页码:4561 / 4572
页数:12
相关论文
共 50 条
  • [1] Adaptive authentication schemes for 3D mesh models
    Chen, Te-Yu
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    International Journal of Innovative Computing, Information and Control, 2009, 5 (12): : 4561 - 4572
  • [2] Public authentication of 3D mesh models
    Wu, Hao-Tian
    Cheung, Yiu-Ming
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS), 2006, : 940 - +
  • [3] 3D adaptive mesh refinement
    Merrouche, A
    Selman, A
    Knopf-Lenoir, C
    COMMUNICATIONS IN NUMERICAL METHODS IN ENGINEERING, 1998, 14 (05): : 397 - 407
  • [4] Hash Function for 3D Mesh Model Authentication
    Lee, Suk-Hwan
    Kwon, Ki-Ryong
    Kim, Dong Kyue
    Kwon, Oh-Jun
    2015 21ST KOREA-JAPAN JOINT WORKSHOP ON FRONTIERS OF COMPUTER VISION, 2015,
  • [5] 3D adaptive central schemes: Part I. Algorithms for assembling the dual mesh
    Noelle, S
    Rosenbaum, W
    Rumpf, M
    APPLIED NUMERICAL MATHEMATICS, 2006, 56 (06) : 778 - 799
  • [6] A 3D adaptive mesh moving scheme
    Kanchi, Harish
    Masud, Arif
    INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN FLUIDS, 2007, 54 (6-8) : 923 - 944
  • [7] Entropy stable adaptive moving mesh schemes for 2D and 3D special relativistic hydrodynamics
    Duan, Junming
    Tang, Huazhong
    JOURNAL OF COMPUTATIONAL PHYSICS, 2021, 426
  • [8] Volumetric Segmentation of 3D Mesh Models
    Sun, Guangsheng
    Yan, Jingqi
    INTERNATIONAL ACADEMIC CONFERENCE ON THE INFORMATION SCIENCE AND COMMUNICATION ENGINEERING (ISCE 2014), 2014, : 114 - 120
  • [9] Robust watermarking of 3D mesh models
    Song, HS
    Cho, NI
    Kim, J
    PROCEEDINGS OF THE 2002 IEEE WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2002, : 332 - 335
  • [10] Correspondences matching on 3D mesh models
    Li, Samuel Sai-Man
    Wang, Charlie C. L.
    Hui, Kin-Chuen
    PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE 2007, VOL 6, PTS A AND B, 2008, : 849 - 858