跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.84) 您好!臺灣時間:2024/12/14 19:05
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:劉漢緯
研究生(外文):Han-Wei Liu
論文名稱:3D模型浮水印之透通性研究
論文名稱(外文):A Research of Transparency of Watermark for 3D Model
指導教授:楊永仁楊永仁引用關係
學位類別:碩士
校院名稱:玄奘大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:95
語文別:中文
中文關鍵詞:智慧財產權保護數位浮水印透通性計算機圖學浮水印關鍵詞透通性財產權著作權
相關次數:
  • 被引用被引用:1
  • 點閱點閱:284
  • 評分評分:
  • 下載下載:30
  • 收藏至我的研究室書目清單書目收藏:0
保護著作權的首要課題,就是原創作者如何去證明某項數位資料的全部或其一部份確實為其所創作。而最直接的作法就是將作者的電子簽章做為浮水印嵌入其創作裡,若發生版權爭議時,創作者可將浮水印取出,用以證明此媒體的所有權。近年來由於虛擬實境技術的諸多應用已逐漸扮演舉足輕重的角色,因此3D模型浮水印技術也越來越受到重視,由於此種媒體具有拓樸結構的特性,若在嵌入浮水印時無法保證3D模型其拓樸結構,結果不但是拓樸結構的破壞,同時也代表浮水印不具備重要的透通性,衍生出新的數位媒體在加入浮水印時所產生的問題。因此,我們利用模型的骨幹點資訊來記錄3D模型的拓樸結構,使得在嵌入浮水印的過程中可以檢測其影響程度,以保證模型在嵌入浮水印後的透通性。

關鍵詞:智慧財產權保護、數位浮水印、透通性、計算機圖學
摘 要 I
ABSTRACT II
目 錄 III
圖 目 錄 V
第一章 緒論 1
1.1 浮水印技術簡介 1
1.2 3D 模型的浮水印嵌入與取出 3
1.3 浮水印應具備之特性 5
1.4 內容概述 7
第二章 文獻探討 9
2.1 3D模型浮水印簡介 9

2.1.1 2D影像浮水印技術與3D模型浮水印技術比較 9
2.1.2 3D模型浮水印分類 11
2.1.3 空間域的浮水印技術 13
2.1.4 頻率域的浮水印技術 14
2.2 模型與影像品質檢測工具 17
第三章 利用骨幹點資訊對浮水印做透通性檢測 21
3.1 浮水印之透通性檢測方法 22
3.2 建構3D模型骨幹 24
3.3 利用骨幹點將模型頂點分群 27
3.4 區域間的碰撞偵測 30
3.5 發生拓樸結構破壞處理方法 33

3.5.1 空間域處理方法 34
3.5.2 頻率域處理方法 34
第四章 實驗結果 36
第五章 結論與未來目標 41
參考文獻 43
[1]王崇任, “利用碎形維度計算對連續影像進行壓縮”中山大學應用數學所碩士論文, 1999.

[2]林純宇, “虛擬觸感環境之發展與評估” 中山大學機械與電機工 程學系碩士論文, 2004.

[3]梁晉坤, 楊士萱, “MPEG4 二維網目動畫在轉換域的浮水印技術” 第14屆全國資訊安全會議, 台灣科技大學, June 2004.

[4]張寧中, “可見式數位浮水印系統之分析與設計” 中原大學電機工程學系碩士學位論文, 2001.

[5]廖俊彥, 楊士萱, 謝金雲, “MPEG4 二維網目的數位浮水印技術” 2001 National Computer Symposium (NCS'2001), Taipei, Taiwan, December, 2001.

[6]盧秉堂, “以骨幹資訊改良之3D 模型簡化法”中原大學資訊工程學系碩士學位論文, 2004.

[7]鐘岳峰, “基於小波轉換之強健且低破壞性的數位浮水印嵌入法” 台灣科技大學電子工程系碩士學位論文, 2002.

[8]D. Attali, J.O. Lachaud. “Constructing ISO-surface satisfying the delaunay constraint: application to the skeleton computation.” In: Proc. Image Analysis and Processing, Washington, DC, USA: IEEE CS Press, 382~387, 1999.

[9]I. Bitter, A. E. Kaufman and M. Sato. “Penalized-distance volumetric skeleton algorithm.” IEEE Trans. on Visualization and Computer Graphics, 7(3): 195~206, 2001.

[10]O. Benedens, “Watermarking of 3D polygon based models with robustness against mesh simplification” Security and watermarking of Multimedia Contents, January 1999.

[11]O. Benedens, “Geometry-based watermarking of 3D model” IEEE Computer Graphics and Applications, Vol. 19, pp. 46-55, January, 1999.

[12]O. Benedens, “Towards blind detection of robust watermarks in polygonal models” Eurographics 2000, Vol.19, No.3, 2000.

[13]D. Cotting, T. Weyrich, M. Pauly and M. Gross, “Robust watermarking of point-sampled geometry”, Proceedings of International Conference on Shape Modeing and Applications 2004, SMI04, Genova, Italy, pp. 233-242, June 7-9, 2004.

[14]J.-L. Dugelay, E. Garcia and C. Mallauran, “Protection of 3-D object usage through texture watermarking”, EUSIPCO'2002, 11th European Signal Processing Conference, Toulouse, France, Volume III, pp 93-96, September 3-6, 2002.

[15]N. Golyandina, V. Nekrutkin and A. Zhigljavsky, “Analysis of Time Series Structure–SSA and Related Techniques”, Chapman & Hall/CRC, 2001.

[16]A. Kalivas, A. Tefas and I. Pitas. “Watermarking of 3d models using principal component analysis”, ACM Press, In Proceedings of Acoustics, Speech and Signal Processing (ICASSP 2003), Vol. 5, pp. 676-679, 2003.

[17]S. Kanai, H. Date and T. Kishinami. “Digital watermarking for 3d polygons using multiresolution wavelet decomposition” Sixth IFIP WG 5.2 GEO-6, 1998.

[18]Pin-Chou Liu, Fu-Che Wu, Wan-Chun Ma and Rung-Huei Liang, Ming Ouhyoung “Automatic animation skeleton construction using repulsive force field.” Pacific Graphics, 2003.

[19]L.-Li, Z-Pan, M. Zhang and K-Ye, “Watermarking subdivision surfaces based on addition property of fourier transform”, Proceedings of the 2nd international conference on Computer graphics and interactive techniques in Australasia and Southe East Asia, June 2004.

[20]G. C. Langelaar, I. Setyawan and R. L. Lagendijk, “Watermarking digital image and video data. A state-of-the-art overview”, IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 20-46, September 2000.

[21]Y. Maret, T. Ebrahimi, “Data hiding on 3D polygonal meshes “, Proceedings of the 2004 multimedia and security workshop on Multimedia and security, September 2004.

[22]K. Murotani, K. Sugihara, “Watermarking 3D polygonal meshes using the singular spectrum analysis”, Proceedings of the 10th IMA International Conference on The Mathematics of Surfaces, Leeds, UK, pp. 85-98, September 2003.

[23]Matthew Moore, Jane Wihlelms, “Collision detection and respones for computer animation” ACM SIGGRAPH, Vol.22, No.4, pages 289-298, August 1988.

[24]R. Ohbuchi, H. Masuda, and M.Aono. “Watermarking three-dimensional polygonal models” ACM, Multimedia 97, 1997.

[25]R. Ohbuchi, S. Takahashi, T. Miyazawa, and A. Mukaiyama, “Watermarking 3D polygonal meshes in the mesh spectral domain”, Proceedings of the Graphics Interface 2001, Ontario, Canada, pp. 9-17, June 2001.

[26]E. Praun, H. Hoppe and A. Finkelstein, “Robust mesh watermarking”, ACM SIGGRAPH, pp. 69-76, July 1999.
[27]A. Tefas, G. Louizis and I.Pitas, “3D image watermarking robust to geometric distortions”, Proc. of IEEE International, Conference on Acoustics Speech and Signal Processing 2002 (ICASSP 2002), Orlando, Florida, USA, May 2002.

[28]A. Telea, A. Vilanova. “A robust level-set algorithm for centerline extraction.” In: Proc. EG/IEEE VisSym 2003, New York: ACM Press, pp. 185~195, 2003.

[29]F. Uccheddu, M. Corsini and M. Barni, “Wavelet-based blind watermarking of 3D models”, Proceedings of the 2004 multimedia and security workshop on Multimedia and security, September 2004.

[30]F.C. Wu, W.C. Ma, P.C. Liou, R.H. Liang and M. Ouhyoung. “Skeleton extraction of 3D objects with visible repulsive force.” In: L. Kobbelt, P. Schrder, H. Hoppe, eds. Eurographics Symposium on Geometry processing. New York: ACM Press, 2003.

[31]L. Wade, R. E. Parent. “Automated generation of control skeletons for use in animation.” The Visual Computer, 18(2): 97~110, 2002.

[32]B.-L. Yeo, M.M. Yeung, “Watermarking 3D objects for verification,” IEEE Computer Graphics and Applications, vol.19, no. 1, pp. 36-45, 1999.

[33]Y. Zhou, A.W. Toga. “Efficient skeletonization of volumetric objects.” IEEE Trans. on Visualization and Computer Graphics, 5(3): 196~209, 1999.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top