中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/51631
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 78728/78728 (100%)
Visitors : 34317446      Online Users : 895
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/51631


    Title: HIDING DATA IN TRIANGLE MESHES BY REARRANGING REPRESENTATION ORDER
    Authors: Chung,IL;Chou,CM;Tseng,DC
    Contributors: 資訊工程學系
    Keywords: PUBLIC FRAGILE WATERMARKING;3D MODEL AUTHENTICATION;POLYGONAL MESHES;ALGORITHM;SCHEME
    Date: 2011
    Issue Date: 2012-03-27 18:57:59 (UTC+8)
    Publisher: 國立中央大學
    Abstract: This work presents a high-capacity scheme for embedding messages in triangle meshes by rearranging the vertex and face representation information in a mesh file. The main advantage of embedding messages in the representation domain is that the visual effect of the embedded models is identical to that of the original ones. In this paper, a vertex rearrangement scheme and a face rearrangement scheme for embedding messages are developed. After rearrangement, the secret messages are embedded in the new indices of vertices and faces of the host model. Moreover, the face rearrangement embedding scheme is integrated with a face formation type rearrangement scheme to increase embedding capacity. For a model with n vertices, the proposed method can yield an embedding capacity of approximately Sign bits per vertex. The bit-per-vertex (bpv) embedding capacity increases with the size of the mesh. The proposed method is robust against similarity transformations such as translation, rotation and uniform resizing. At last, a security enhancement algorithm is proposed to prevent malicious attackers retrieving the embedded information using a brute force method. Experimental results show that the proposed method is a high-capacity data-hiding approach without distortion.
    Relation: INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL
    Appears in Collections:[Department of Computer Science and information Engineering] journal & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML473View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明