Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








33 Hits in 8.0 sec

Blind Watermarking for 3D Printed Objects by Locally Modifying Layer Thickness

Arnaud Delmotte, Kenichiro Tanaka, Hiroyuki Kubo, Takuya Funatomi, Yasuhiro Mukaigawa
2019 IEEE transactions on multimedia  
We propose a new blind watermarking algorithm for 3D printed objects that has applications in metadata embedding, robotic grasping, counterfeit prevention, and crime investigation.  ...  Our method can be used on fused deposition modeling (FDM) 3D printers and works by modifying the printed layer thickness on small patches of the surface of an object.  ...  At extraction time, the method retrieves the printing axis and slice positions by analyzing the layer artifacts.  ... 
doi:10.1109/tmm.2019.2962306 fatcat:mxq4bm4ux5ejziwldjysl2u7da

Embedding Information into or onto Additively Manufactured Parts: A Review of QR Codes, Steganography and Watermarking Methods

Muhammad Usama, Ulas Yaman
2022 Materials  
The four categories discussed are 3D QR codes, 3D watermarking, steganography and nonclassified methods.  ...  The paper gives a detailed review of the approaches adopted for embedding information into/onto additively manufactured parts.  ...  [11] proposed a blind watermarking technique for 3D digital models focused on the transform domain.  ... 
doi:10.3390/ma15072596 pmid:35407928 pmcid:PMC9000573 fatcat:wv6su7iwbbezbilcbi3foxlkre

Copyright Protection of 3D Digitized Artistic Sculptures by Adding Unique Local Inconspicuous Errors by Sculptors

Ivana Vasiljević, Ratko Obradović, Isidora Đurić, Branislav Popkonstantinović, Igor Budak, Luka Kulić, Zoran Milojević
2021 Applied Sciences  
This research aims to suggest a method for protecting these 3D models from abuse while making them available on the Internet.  ...  It is based on the digitization of the sculpture altered by adding local clay details proposed by the sculptor and on sharing on the Internet a 3D model obtained by digitizing the sculpture with a built-in  ...  Digital Domain techniques are non-blind watermarking, blind watermarking, and watermark inside a printed 3D object.  ... 
doi:10.3390/app11167481 fatcat:pbsgxdwmqnakdarwifwtdqjkia

Bridging the Digital and Physical: Increasing Engagement with the Grateful Dead Archive at UC Santa Cruz

Alix Norton, Kristina Golubiewski-Davis, Ann Hubble, Reed Scriven
2019 Journal of Archival Organization  
What are the blind spots, particularly for tackling 3D/VR preservation?  ...  In addition to 3D CAD models, there are hundreds or even thousands of detailed 2D-layer drawings produced for particular aspects of a building; there are 3D printed objects, and there are project "outputs  ...  In his fellowship, he is developing guidelines for curating research data associated with virtual reality technologies and 3D models, and is researching the impact of virtual reality and 3D tools on research  ... 
doi:10.1080/15332748.2019.1642703 fatcat:vnjgzt5q7zap3l2gxifc3yansu

The use of computational intelligence in digital watermarking: Review, challenges, and new trends

Darwish, A. Abraham
2011 Neural Network World  
Yeung, A novel blind multiple watermarking technique for images, IEEE Trans. Circuit Syst.  ...  <http://www.cl.cam.ac.uk/ fapp2/watermarking/image− watermarking/>, 1997. [27] Francesca Uccheddu, Robust and Imperceptible Watermarking of 3D meshes, Ingegneria Informatica, Multimedialita’ e delle  ... 
doi:10.14311/nnw.2011.21.017 fatcat:bygr6l7srzhijduwlh2or4zekm

Currency security and forensics: a survey

J. Chambers, W. Yan, A. Garhwal, M. Kankanhalli
2014 Multimedia tools and applications  
By its definition, the word 'currency' refers to an agreed medium for exchange, a nation's currency is the formal medium enforced by the elected governing entity.  ...  At its core is a thin clear plastic film covered by subsequent layers for added durability.  ...  The previous point illustrates the first layer of the three layers of banknote security. Specifically the first layer is that which by the first glance and touch humans can identify.  ... 
doi:10.1007/s11042-013-1809-x fatcat:7xqvdrf4ifeyxheuljp7fhsq5i

Digital Image Watermarking Techniques: A Review

Mahbuba Begum, Mohammad Shorif Uddin
2020 Information  
This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications.  ...  In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images.  ...  A threedimensional (3D) mesh watermarking scheme has been proposed by Hamidi et al. [48] , which protects copyright information based on mesh saliency and a wavelet transform.  ... 
doi:10.3390/info11020110 fatcat:nzo5ex2a3ves3hfjycmlgesf3q

Neural Radiance Fields: Past, Present, and Future [article]

Ansh Mittal
2024 arXiv   pre-print
The various aspects like modeling and interpreting 3D environments and surroundings have enticed humans to progress their research in 3D Computer Vision, Computer Graphics, and Machine Learning.  ...  Augmented Reality and Virtual Reality-based 3D models have gained traction from res with more than 1000 preprints related to NeRFs published.  ...  These properties make them well-suited for modeling and analyzing 3D data, particularly when the data is noisy or incomplete.  ... 
arXiv:2304.10050v2 fatcat:ixgkwqkt25gqdipgq4er6pdej4

A 3D Simplification Method based on Dual Point Sampling

Juan Cao, Yitian Zhao, Ran Song, Yingchun Zhang
2013 Journal of Multimedia  
Print-and-scan attack is a challenging problem for most of digital watermarks.  ...  The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers and editors for their invaluable suggestions. This work was jointly supported by the National Natural  ... 
doi:10.4304/jmm.8.3.191-197 fatcat:z5gmzeiwqfadlakggntajifdru

Cell Segmentation in Cervical Smear Images using Polar Coordinates GVF Snake with Radiating Edge Map

Xu Chuanyun, Zhang Yang, Wang Sen
2013 Journal of Multimedia  
Print-and-scan attack is a challenging problem for most of digital watermarks.  ...  The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers and editors for their invaluable suggestions. This work was jointly supported by the National Natural  ... 
doi:10.4304/jmm.8.3.213-219 fatcat:fb5tm3tguvgmxblj3eygm7pqmu

Surveillance on Manycasting Over Optical Burst Switching (OBS) Networks under Secure Sparse Regeneration

C.Veera lakshmi
2013 IOSR Journal of Electronics and Communication Engineering  
Sometimes, there is an opportunity for the attacker to join the group. Service provided to the attacker is restricted by providing two levels of security.  ...  Each application requires its own QoS threshold attributes like physical layer properties, delay as a result of transmission and reliability of the link.  ...  Also the author would like to thank reviewers for their valuable comments to improve the quality of the paper.  ... 
doi:10.9790/2834-0460108 fatcat:5qasfbq4n5cbpln42h3pa3cucq

AnisoTag: 3D Printed Tag on 2D Surface via Reflection Anisotropy [article]

Zehua Ma, Hang Zhou, Weiming Zhang
2023 pre-print
In the past few years, the widespread use of 3D printing technology enables the growth of the market of 3D printed products.  ...  We evaluate AnisoTag with various 3D printer brands, filaments, and printing parameters, demonstrating its superior usability, accessibility, and reliability for practical usage.  ...  ACKNOWLEDGMENTS We thank CHI23's anonymous reviewers for their constructive feedback that helped improve the paper. We thank Chenxi Sun for the help in the prototype implementation.  ... 
doi:10.1145/3544548.3581024 arXiv:2301.10599v1 fatcat:ocbhuyl7fjdepcnlrhvwc745di

Effects of errorless learning on the acquisition of velopharyngeal movement control

Andus Wing-Kuen Wong, Tara Whitehill, Estella Ma, Rich Masters
2012 Journal of the Acoustical Society of America  
A method for an optimal selection of frequencies in the smoothing process for the case of one reflection is presented, followed by formulations for smoothing in the more general case.  ...  analyzing spatial directions in room impulse responses captured with source and receiver of adjustable directivity.  ...  The importance of the bottom layer in double-layer porous asphalt for noise reduction.  ... 
doi:10.1121/1.4708235 fatcat:7wzupz5u2nd6nc7ttvbpxwvunm

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
This paper forms the basis of understanding the difficulty of the domain and the amount of efficiency achieved by the various methods recently.  ...  Precise diagnosis of these diseases on time is very significant for maintaining a healthy life.  ...  The Solar-Stirling engine systems can be the better option for off-grid power generation.  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe

Advanced workflow management technologies

Gregory Alan Bolcer, Richard N. Taylor
1998 Software Process: Improvement and Practice  
However, these communities have yet to identify the union of cross-discipline requirements for a supporting technical infrastructure addressing the level of flexibility, scalability, and support for evolution  ...  Special thanks is reserved for Mark Bergman and Peter Kammer for helping shape the issues, outline, and arguments, and of course, David Rosenblum, David Redmiles, and Michael Leon for their review and  ...  Digital watermarks can guarantee uniqueness in order to better control artifacts.  ... 
doi:10.1002/(sici)1099-1670(199809)4:3<125::aid-spip100>3.0.co;2-j fatcat:qvpqnaalrncevepn4psozu7syy
« Previous Showing results 1 — 15 out of 33 results