2014 4th International Conference on Image Processing Theory, Tools and Applications (IPTA) 2014
DOI: 10.1109/ipta.2014.7001949
|View full text |Cite
|
Sign up to set email alerts
|

A securing access approach to virtual worlds based on 3D mesh watermarking of avatar's face

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Another research direction is how to ensure that avatars themselves, as digital entities, can be protected from unauthorized access by imposters, and how the identity of the users can be managed within the social VR system. Although some authors have called for access control and identity management for avatars in social VR (Gavrilova and Yampolskiy, 2010;Yampolskiy et al, 2012;Bader and Ben Amara, 2014a;Bader and Ben Amara, 2016;Bader and Ben Amara, 2017;Freeman et al, 2020) are the only authors we found that explored this topic and proposed technical solutions.…”
Section: Access Control and Identity Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…Another research direction is how to ensure that avatars themselves, as digital entities, can be protected from unauthorized access by imposters, and how the identity of the users can be managed within the social VR system. Although some authors have called for access control and identity management for avatars in social VR (Gavrilova and Yampolskiy, 2010;Yampolskiy et al, 2012;Bader and Ben Amara, 2014a;Bader and Ben Amara, 2016;Bader and Ben Amara, 2017;Freeman et al, 2020) are the only authors we found that explored this topic and proposed technical solutions.…”
Section: Access Control and Identity Managementmentioning
confidence: 99%
“…In response to the problems mentioned above, we hope to find corresponding protection mechanisms or potential countermeasures in the literature. While 13 papers (Gavrilova and Yampolskiy, 2010;Boukhris et al, 2011;Mohamed and Yampolskiy, 2012;Yampolskiy et al, 2012;Bader and Ben Amara, 2014a;Bader and Ben Amara, 2014b;Bader and Ben Amara, 2016;Bader and Ben Amara, 2017;Falchuk et al, 2018;Pfeuffer et al, 2019;John et al, 2020;Lake, 2020) have explicitly addressed one or several identity and privacy issues and proposed corresponding protection mechanisms, works that have presented techniques or design guidelines that provide potential solutions in the area of virtual reality are also included and analyzed. Based on their characteristics and objectives, we have subdivided them into the following categories.…”
Section: Protectionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Accordingly, digital watermarking has emerged as an alternative to overcome the aforementioned limitations. Watermarking is defined as the process of invisibly incorporating a watermark in a digital content and may be used for a lot of applications, including copyright protection, copy control, indexing, authentication and integrity, E‐commerce, broadcast control, transaction management, and copyright communication . For the authentication and integrity preservation of biometric data, a first biometric modality is used as a host and receives a watermark that can be a second biometric modality which will consolidate the recognition performance of the system.…”
Section: Introductionmentioning
confidence: 99%