中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/51558
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 70585/70585 (100%)
Visitors : 23044757      Online Users : 554
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/51558


    Title: Multi-Layer Reversible Data-Hiding Scheme on 3D Mesh Models
    Authors: Chung,IL;Chou,CM;Tseng,DC
    Contributors: 資訊工程學系
    Keywords: PUBLIC FRAGILE WATERMARKING;POLYGONAL MESHES;AUTHENTICATION;ALGORITHM;DOMAIN
    Date: 2010
    Issue Date: 2012-03-27 18:56:13 (UTC+8)
    Publisher: 國立中央大學
    Abstract: Most high-capacity, 3D data-hiding schemes introduce irreversible changes into the host model. For artistic or technical models, not modifying the original mesh models is sometimes very important. This work describes a novel, multi-layer, reversible data-hiding scheme for 3D mesh models. The proposed scheme starts with finding an independent set of vertices for embedding data. The prediction residues of the vertices and the secret bit string are then encoded using the arithmetic coding method. The embedding procedure is done by substituting part of the mantissa of these vertices with the coded arithmetic decimal numbers. A maximum distortion constraint is set for each embedding vertex, such that the distortion on the cover model is controlled to be imperceptible. Users can construct a multi-layer embedding scheme by repeatedly applying the single-layer embedding procedure until the secret bit string is completely embedded. By integrating the arithmetic encoder and the substitution operation, the proposed method achieves 4-8 bits/vertex embedding capacity while reserving the ability of rebuilding the original model. Experimental results show that the proposed scheme can successfully reconstruct the original model while extracting the secret bit string.
    Relation: JOURNAL OF INTERNET TECHNOLOGY
    Appears in Collections:[Department of Computer Science and information Engineering] journal & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML270View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明