An overview of attacks on 3D models

被引:0
作者
Moreno Saenz, J. [1 ]
Molina Vilchis, M. A. [1 ]
机构
[1] IPN, ESIME Culhuacan, Mexico City, DF, Mexico
来源
TELEMATIQUE | 2010年 / 9卷 / 02期
关键词
3D model; Attacks; Security; Watermarking;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Using three-dimensional models is increasingly common due to the great development that has recently occured in 3D modeling software, all these applications can be found from entertainment such as animated films and vedio games to virtual reality use in as diverse areas as medicine and engineering.Due to theis expensive production, it is necessary to make sure that the model is not altered for its use.because during distribution processes. in animation or conscious atttacks could damage the model. therefore, a plethora of techniques have emerged in order to hide information in the model. so that when it reaches that user, this information can be checked to determine if the 3D model is the original or not.
引用
收藏
页码:51 / 63
页数:13
相关论文
共 12 条
[1]  
Benedens O., 1999, COMPUTER GRAPHICS AP, V19, P1
[2]  
Chou C. M., 2007, INT J COMPUTER SCI N, V7, P2
[3]  
Corsinia M., 3D 3 WATERMARKING TE
[4]  
Cummins J, STEGANOGRAPHY DIGITA
[5]  
Eshraghi M., 2007, INT C IMM TEL
[6]  
Harte T., 2002, INT C IMAG, V3
[7]  
Karni Z., 2000, INT C COMP GRAPH INT
[8]  
Levoy M., 2009, DIGITAL MICHELANGELO
[9]  
Mao X, 2001, P SPIE, V4314
[10]  
Ohbuchi R., 1999, IEEE J SELECTED AREA, V16