3D Model Permutation Steganography for Access Rights Management
碩士 === 國立臺南大學 === 數位學習科技學系碩士在職專班 === 98 === In this study, an approach to hiding a secret message and, in the mean time, managing access rights in a 3D humanoid mesh model is proposed. First of all, a humanoid model is divided into several segments according to the requirement of access rights. Thes...
Main Authors: | Ching-ping Li, 李靖平 |
---|---|
Other Authors: | Hsin-Chih Lin |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/71974744395001181703 |
Similar Items
-
Piecewise Permutation Steganography for 3D Humanoid Mesh Models
by: Lin-shan Jhu, et al. -
Deep Image Steganography Using Transformer and Recursive Permutation
by: Li, T., et al.
Published: (2022) -
Breaking Permutation-Based Mesh Steganography and Security Improvement
by: Yimin Wang, et al.
Published: (2019-01-01) -
Watermarking and Steganography of 3-D models
by: Salman, Muhammad
Published: (2009) -
Efficient Steganography Algorithms for 3D Models
by: Chih-Shin Kang, et al.
Published: (2005)