3D Model Permutation Steganography for Access Rights Management
碩士 === 國立臺南大學 === 數位學習科技學系碩士在職專班 === 98 === In this study, an approach to hiding a secret message and, in the mean time, managing access rights in a 3D humanoid mesh model is proposed. First of all, a humanoid model is divided into several segments according to the requirement of access rights. Thes...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/71974744395001181703 |
id |
ndltd-TW-098NTNT5395052 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NTNT53950522015-10-13T18:35:36Z http://ndltd.ncl.edu.tw/handle/71974744395001181703 3D Model Permutation Steganography for Access Rights Management 基於三維模型排列藏密法之存取權管理 Ching-ping Li 李靖平 碩士 國立臺南大學 數位學習科技學系碩士在職專班 98 In this study, an approach to hiding a secret message and, in the mean time, managing access rights in a 3D humanoid mesh model is proposed. First of all, a humanoid model is divided into several segments according to the requirement of access rights. These segments are then modeled as a directed acyclic graph, representing their mapping relationships, including one-to-one, one-to-many, many-to-one, and many-to-many, which can be derived from those connectivity segments. Afterward, a secret message can be hidden in each segment. The proposed approach is error-free since it does not modify the geometry of the cover model. As for extracting the secret message in each segment, it would be extremely difficult unless a complete decoding so far and a correct key are available. According to the workflow deployment, the proposed method can also enhance the security and provide an efficient procedure to reduce steps of redundant information hiding. Hsin-Chih Lin 林信志 2010 學位論文 ; thesis 41 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺南大學 === 數位學習科技學系碩士在職專班 === 98 === In this study, an approach to hiding a secret message and, in the mean time, managing access rights in a 3D humanoid mesh model is proposed. First of all, a humanoid model is divided into several segments according to the requirement of access rights. These segments are then modeled as a directed acyclic graph, representing their mapping relationships, including one-to-one, one-to-many, many-to-one, and many-to-many, which can be derived from those connectivity segments. Afterward, a secret message can be hidden in each segment. The proposed approach is error-free since it does not modify the geometry of the cover model. As for extracting the secret message in each segment, it would be extremely difficult unless a complete decoding so far and a correct key are available. According to the workflow deployment, the proposed method can also enhance the security and provide an efficient procedure to reduce steps of redundant information hiding.
|
author2 |
Hsin-Chih Lin |
author_facet |
Hsin-Chih Lin Ching-ping Li 李靖平 |
author |
Ching-ping Li 李靖平 |
spellingShingle |
Ching-ping Li 李靖平 3D Model Permutation Steganography for Access Rights Management |
author_sort |
Ching-ping Li |
title |
3D Model Permutation Steganography for Access Rights Management |
title_short |
3D Model Permutation Steganography for Access Rights Management |
title_full |
3D Model Permutation Steganography for Access Rights Management |
title_fullStr |
3D Model Permutation Steganography for Access Rights Management |
title_full_unstemmed |
3D Model Permutation Steganography for Access Rights Management |
title_sort |
3d model permutation steganography for access rights management |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/71974744395001181703 |
work_keys_str_mv |
AT chingpingli 3dmodelpermutationsteganographyforaccessrightsmanagement AT lǐjìngpíng 3dmodelpermutationsteganographyforaccessrightsmanagement AT chingpingli jīyúsānwéimóxíngpáiliècángmìfǎzhīcúnqǔquánguǎnlǐ AT lǐjìngpíng jīyúsānwéimóxíngpáiliècángmìfǎzhīcúnqǔquánguǎnlǐ |
_version_ |
1718034872967102464 |