Abstract
In this paper we propose a protection scheme for 3D geometry data. This field has got hardly any attention despite the fact that 3D data has severe industrial impact on the success of a product or business. With current reproduction techniques the loss of a 3D model virtually enables a malicious party to create copies of a product. We propose a protection mechanism for 3D data that provides fine grained access control, preview capabilities and reduced processing cost.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Scheenstra, A., Ruifrok, A., Veltkamp, R.C.: A survey of 3d face recognition methods. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 891–899. Springer, Heidelberg (2005)
Bronstein, E.M., Bronstein, M.M., Kimmel, R.: Expression-invariant 3d face recognition, pp. 62–69. Springer, Heidelberg (2003)
Chang, K.I., Bowyer, K.W., Flynn, P.J.: An evaluation of multi-modal 2d+3d face biometrics. IEEE PAMI, Los Alamitos (2005)
Gupta, S., Markey, M.K., Aggarwal, J., Bovik, A.C.: Three dimensional face recognition based on geodesic and euclidean distances. In: SPIE Symposium on Electronic Imaging: Vision Geometry XV (2007)
Ben Amor, B., Ouji, K., Ardebilian, M., Chen, L.: 3D Face recognition by ICP-based shape matching. In: The second International Conference on Machine Intelligence (ACIDCA-ICMI 2005). (2005)
Chou, C.M., Tseng, D.C.: Technologies for 3d model watermarking: A survey. International Journal of Computer Science and Network Security 7, 328–334 (2007)
Zafeiriou, S., Tefas, A., Pitas, I.: A blind robust watermarking scheme for copyright protection of 3d mesh models. III, 1569–1572 (2004)
Chao, M.W., Lin, C.H., Yu, C.W., Lee, T.Y.: A high capacity 3d steganography algorithm. IEEE Transactions on Visualization and Computer Graphics 15, 274–284 (2009)
Wang, Y.P., Hu, S.M.: A new watermarking method for 3d models based on integral invariants. IEEE Transactions on Visualization and Computer Graphics 15, 285–294 (2009)
Koller, D., Turitzin, M., Levoy, M., Tarini, M., Croccia, G., Cignoni, P., Scopigno, R.: Protected interactive 3d graphics via remote rendering. ACM Trans. Graph. 23, 695–703 (2004)
Cho, M., Kim, S., Sung, M., On, G.: 3d fingerprinting and encryption principle for collaboration. In: AXMEDIS 2006: Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Washington, DC, USA, pp. 121–127. IEEE Computer Society, Los Alamitos (2006)
Gschwandtner, M., Uhl, A.: Toward DRM for 3D geometry data. In: III. Edward, J.D., Wong, P.W., Dittmann, J., Memon, N.D. (eds.) Proceedings of SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, vol. 6819, p. 68190. SPIE (2008)
Pajarola, R., Rossignac, J.: Compressed progressive meshes. IEEE Transactions on Visualization and Computer Graphics 6, 79–93 (2000)
Floriani, et al: A survey on data structures for level-of-detail models. In: Advances in Multiresolution for Geometric Modelling, pp. 49–74 (2004)
Hoppe, H., DeRose, T., Duchamp, T., McDonald, J., Stuetzle, W.: Surface reconstruction from unorganized points. Computer Graphics 26, 71–78 (1992)
Garland, M., Heckbert, P.S.: Surface simplification using quadric error metrics. In: SIGGRAPH 1997: Proceedings of the 24th annual conference on Computer graphics and interactive techniques, pp. 209–216. ACM Press/Addison-Wesley Publishing Co. (1997)
Engel, D., Stütz, T., Uhl, A.: A survey on JPEG2000 encryption. Multimedia Systems (to appear 2009)
Massoudi, A., Lefèbvre, F., Vleeschouwer, C.D., Macq, B., Quisquater, J.J.: Overview on selective encryption of image and video, challenges and perspectives. EURASIP Journal on Information Security (2008)
Lu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: Proceedings of the IASTED International Conference on on Communications, Internet and Information Technology (CIIT 2003), Scottsdale, AZ, USA (2003)
Sharir, M., Welzl, E.: Random triangulations of planar point sets. In: SCG 2006: Proceedings of the twenty-second annual symposium on Computational geometry, pp. 273–281. ACM, New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gschwandtner, M., Uhl, A. (2009). Protected Progressive Meshes. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2009. Lecture Notes in Computer Science, vol 5876. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10520-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-10520-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10519-7
Online ISBN: 978-3-642-10520-3
eBook Packages: Computer ScienceComputer Science (R0)