Proceedings Computer Graphics International CGI-99 1999
DOI: 10.1109/cgi.1999.777952
|View full text |Cite
|
Sign up to set email alerts
|

A shape-preserving data embedding algorithm for NURBS curves and surfaces

Abstract: Existing data embedding algorithms for polygonal meshes and their attributes can't be applied to the majority of (geometric) computer aided design (CAD) applications, for two major reasons. First, these CAD systems employ parametric curves and surfaces, not polygonal meshes, as their main shape-defining primitives. Second, most CAD applications do not tolerate modifications of model topology and/or geometry that are introduced by existing data embedding algorithms.This paper proposes a new data embedding algor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
32
0

Year Published

2000
2000
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(32 citation statements)
references
References 19 publications
0
32
0
Order By: Relevance
“…In CAD domain, information assurance research has been partially addressed through the development of 3D digital watermarking [16,17,19]. It has been used to ensure the integrity of a model as well as provide a foundation for proof of copyright infringement.…”
Section: Information Assurance and Access Control In 3d Modelsmentioning
confidence: 99%
“…In CAD domain, information assurance research has been partially addressed through the development of 3D digital watermarking [16,17,19]. It has been used to ensure the integrity of a model as well as provide a foundation for proof of copyright infringement.…”
Section: Information Assurance and Access Control In 3d Modelsmentioning
confidence: 99%
“…Benedens and Busch introduced three different algorithms, each of them having robustness to certain attacks while being suitable for specific applications [22]. Algorithms that embed data in surfaces described by NURBS use changes in control points [16] or reparameterization [23]. Wavelet decomposition of polygons was used for 3-D watermarking in [24], [25].…”
mentioning
confidence: 99%
“…Some of the 3-D watermarking algorithms are based on displacing vertex locations [16], [19], [20] or on changing the local mesh connectivity [21], [23]. Minimization of local norms has been considered in the context of 3-D watermarking in [22], [29].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the balance between imperceptibility and robustness is needed while designing a watermarking method in accordance to the practical applications. According to the aimed application, the distinguish is made between the robust watermarking (used for the copyright protection) and the fragile watermarking (used for integrity of content) [2].…”
Section: Introductionmentioning
confidence: 99%