3D Model Permutation Steganography for Access Rights Management

碩士 === 國立臺南大學 === 數位學習科技學系碩士在職專班 === 98 === In this study, an approach to hiding a secret message and, in the mean time, managing access rights in a 3D humanoid mesh model is proposed. First of all, a humanoid model is divided into several segments according to the requirement of access rights. Thes...

Full description

Bibliographic Details
Main Authors: Ching-ping Li, 李靖平
Other Authors: Hsin-Chih Lin
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/71974744395001181703
id ndltd-TW-098NTNT5395052
record_format oai_dc
spelling ndltd-TW-098NTNT53950522015-10-13T18:35:36Z http://ndltd.ncl.edu.tw/handle/71974744395001181703 3D Model Permutation Steganography for Access Rights Management 基於三維模型排列藏密法之存取權管理 Ching-ping Li 李靖平 碩士 國立臺南大學 數位學習科技學系碩士在職專班 98 In this study, an approach to hiding a secret message and, in the mean time, managing access rights in a 3D humanoid mesh model is proposed. First of all, a humanoid model is divided into several segments according to the requirement of access rights. These segments are then modeled as a directed acyclic graph, representing their mapping relationships, including one-to-one, one-to-many, many-to-one, and many-to-many, which can be derived from those connectivity segments. Afterward, a secret message can be hidden in each segment. The proposed approach is error-free since it does not modify the geometry of the cover model. As for extracting the secret message in each segment, it would be extremely difficult unless a complete decoding so far and a correct key are available. According to the workflow deployment, the proposed method can also enhance the security and provide an efficient procedure to reduce steps of redundant information hiding. Hsin-Chih Lin 林信志 2010 學位論文 ; thesis 41 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺南大學 === 數位學習科技學系碩士在職專班 === 98 === In this study, an approach to hiding a secret message and, in the mean time, managing access rights in a 3D humanoid mesh model is proposed. First of all, a humanoid model is divided into several segments according to the requirement of access rights. These segments are then modeled as a directed acyclic graph, representing their mapping relationships, including one-to-one, one-to-many, many-to-one, and many-to-many, which can be derived from those connectivity segments. Afterward, a secret message can be hidden in each segment. The proposed approach is error-free since it does not modify the geometry of the cover model. As for extracting the secret message in each segment, it would be extremely difficult unless a complete decoding so far and a correct key are available. According to the workflow deployment, the proposed method can also enhance the security and provide an efficient procedure to reduce steps of redundant information hiding.
author2 Hsin-Chih Lin
author_facet Hsin-Chih Lin
Ching-ping Li
李靖平
author Ching-ping Li
李靖平
spellingShingle Ching-ping Li
李靖平
3D Model Permutation Steganography for Access Rights Management
author_sort Ching-ping Li
title 3D Model Permutation Steganography for Access Rights Management
title_short 3D Model Permutation Steganography for Access Rights Management
title_full 3D Model Permutation Steganography for Access Rights Management
title_fullStr 3D Model Permutation Steganography for Access Rights Management
title_full_unstemmed 3D Model Permutation Steganography for Access Rights Management
title_sort 3d model permutation steganography for access rights management
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/71974744395001181703
work_keys_str_mv AT chingpingli 3dmodelpermutationsteganographyforaccessrightsmanagement
AT lǐjìngpíng 3dmodelpermutationsteganographyforaccessrightsmanagement
AT chingpingli jīyúsānwéimóxíngpáiliècángmìfǎzhīcúnqǔquánguǎnlǐ
AT lǐjìngpíng jīyúsānwéimóxíngpáiliècángmìfǎzhīcúnqǔquánguǎnlǐ
_version_ 1718034872967102464