2015
DOI: 10.1007/s11042-015-3032-4
|View full text |Cite
|
Sign up to set email alerts
|

Protection of 3D models using cross recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…In this section, we compare our proposed method with recent state-of-the-art S3DOS schemes: methods by Elsheh and Hamza [10], Anbarasi and Mala [11], Tsai [13] and Lee et al [14]. Table V presents several properties we want to [10], [11], [13], [14].…”
Section: E Comparison With Previous Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, we compare our proposed method with recent state-of-the-art S3DOS schemes: methods by Elsheh and Hamza [10], Anbarasi and Mala [11], Tsai [13] and Lee et al [14]. Table V presents several properties we want to [10], [11], [13], [14].…”
Section: E Comparison With Previous Methodsmentioning
confidence: 99%
“…Through their application, Lee et al presented an efficient method to obtain a group of n 3D objects when at least k of them have been downloaded in high quality [14]. This method's objective is to ease 3D object visualization by letting at the users a render of a simplified version when the original object is downloaded.…”
Section: Secret 3d Object Sharing Schemesmentioning
confidence: 99%
See 3 more Smart Citations