2006
DOI: 10.1016/j.cad.2006.06.009
|View full text |Cite
|
Sign up to set email alerts
|

A public fragile watermarking scheme for 3D model authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 66 publications
(48 citation statements)
references
References 14 publications
0
48
0
Order By: Relevance
“…The creation information and logo of a creator are embedded in an electronic file in the form of unaware watermark which cannot be removed during sharing, and the watermark can be detected by a special software package [11,12]. Various watermarking methods were developed for the intellectual property protection of 2D/ 3D CAD models [13][14][15][16][17][18][19][20][21][22][23]. However, in a CPD environment, CAD models are needed to be shared safely, and watermark is not appropriate for sharing design information (design knowledge, parameters and so on) in a secure means.…”
Section: Watermarkmentioning
confidence: 99%
“…The creation information and logo of a creator are embedded in an electronic file in the form of unaware watermark which cannot be removed during sharing, and the watermark can be detected by a special software package [11,12]. Various watermarking methods were developed for the intellectual property protection of 2D/ 3D CAD models [13][14][15][16][17][18][19][20][21][22][23]. However, in a CPD environment, CAD models are needed to be shared safely, and watermark is not appropriate for sharing design information (design knowledge, parameters and so on) in a secure means.…”
Section: Watermarkmentioning
confidence: 99%
“…In the first article on 3D model watermarking in 1997 Ohbuchi et al (1997b), one solution to the localization problem called indexed localization was given, and this has also been employed by many later 3D model watermarking algorithms such as Yeo and Yeung (1999); Benedens and Busch (2000); Benedens (2000); Cayre et al (2004); Chou and Tseng (2006); Wang and Hu (2009). Methods of this kind divide the watermark into several parts, give each part of the watermark a subscript, and embed each part the of watermark together with its subscript and a marker.…”
Section: Accepted M Manuscriptmentioning
confidence: 99%
“…They also proposed a more controllable modification scheme with a better attack localization capability. Chou and Tseng [9] solved the causality problem by introducing the adjusting vertex method. In their watermarking algorithm, vertex is accurately controlled so that severe distortions, which are possible in [7], [8], are avoided.…”
Section: B Fragile Techniquesmentioning
confidence: 99%