首页> 外文学位 >Three-dimensional content protection techniques.
【24h】

Three-dimensional content protection techniques.

机译:三维内容保护技术。

获取原文
获取原文并翻译 | 示例

摘要

3-D models can be represented as meshes and point clouds, whereas 3-D motion data is defined by time varying 3-D points for every human joint or as a matrix which is multivariate and multi-attribute. Representation, data processing operations and dimensionality of these data sets makes it difficult to reuse of existing content protection (copyright protection and tamper detection-correction) watermarking and finger printing based methods related to images, video, text and audio. Therefore, this dissertation addresses the issues related to the design of schemes for 3-D content protection. Copyright protection techniques require robust watermark to withstand data processing operations, whereas watermarking and finger printing schemes aim to accurately identify tampering due to data processing operations.; To handle the case of robust watermarks and build generic schemes for different representation of 3D contents, clustering based spatial robust blind watermarking mechanisms have been proposed. In order to encode watermark related bits for a given set of n points with n! possible orders, we need to find an order. To find such an order, ordered groups of clusters of 3-D points are identified on the basis of time for motion data and proximity in 3-D space for 3-D models. Inside the clusters, 3-D based scalar quantities order the points locally and bits can be encoded or decoded using proposed extensions to 3-D quantization index modulations. The schemes are analyzed for robustness against uniform affine transforms (scaling, rotation and translation), cropping and reordering. Comparatively, the schemes are less robust against randomized noise addition and simplification attacks. These can be improved by using benchmarking in case of motion data, and encoding more bits per point for 3-D models. The encoding schemes can be customized to achieve high hiding capacity, imperceptible watermarks and security.; For tamper detection of motion data, large imperceptible fragile watermarks are encoded inside time based clusters, using 3-point and 1-point quantization index modulation based bit encoding. The watermarks can accurately detect and classify attacks such as order reversal, uniform affine transforms and noise addition. This scheme is improved by encoding watermarks in the localized domain, and benchmarking the bit encoding scheme. Watermarks are not lost during semantic invariant operations (uniform affine transform and noise additions), meanwhile detecting attacks such as noise addition, affine transforms and order reversal. Further, tamper detection probable correction methodology has been proposed that combines fragile watermarking and finger-printing. These schemes identify shuffling attacks on rows, columns or their elements and correct them. Random noise addition attacks can be detected using fragile watermarks and corrected using interpolation.; For tamper detection in 3-D models, the skeleton of the 3-D model is authenticated against cropping and noise addition attack, using a customized version of the clustering based approach for 3-D models. Watermarks are not lost during progressive compression-decompression and uniform affine transform, when the skeleton stays unaltered.
机译:3-D模型可以表示为网格和点云,而3-D运动数据是由每个人关节随时间变化的3-D点定义的,或表示为多变量和多属性的矩阵。这些数据集的表示,数据处理操作和维数使得难以重用与图像,视频,文本和音频有关的现有内容保护(版权保护和篡改检测校正)水印和指纹识别方法。因此,本论文解决了与3-D内容保护方案的设计有关的问题。版权保护技术需要强大的水印来承受数据处理操作,而水印和指纹方案则旨在准确识别由于数据处理操作而受到的篡改。为了处理鲁棒水印的情况并建立用于3D内容的不同表示的通用方案,已经提出了基于聚类的空间鲁棒盲水印机制。为了对给定的n个点集使用n!可能的订单,我们需要找到一个订单。为了找到这样的顺序,基于运动数据的时间和3-D模型在3-D空间中的接近度来标识3-D点群集的有序组。在群集内部,基于3D的标量在本地对点进行排序,并且可以使用对3D量化索引调制的扩展建议对位进行编码或解码。分析了这些方案在针对统一仿射变换(缩放,旋转和平移),裁剪和重新排序方面的鲁棒性。相比之下,这些方案对随机噪声添加和简化攻击的鲁棒性较低。通过在运动数据的情况下使用基准测试,并为3-D模型在每个点上编码更多位,可以改善这些问题。可以定制编码方案,以实现高隐藏能力,不易察觉的水印和安全性。对于篡改检测运动数据,使用基于3点和1点量化索引调制的位编码,在基于时间的群集内对较大的难以察觉的脆弱水印进行编码。水印可以准确地检测和分类攻击,例如顺序逆转,均匀仿射变换和噪声添加。通过在局部域中对水印进行编码并基准化位编码方案来改进此方案。在语义不变操作(均匀仿射变换和噪声添加)期间,不会丢失水印,同时检测诸如噪声添加,仿射变换和顺序反转之类的攻击。此外,已经提出了将脆弱的水印和指纹结合起来的篡改检测可能的校正方法。这些方案可以识别对行,列或其元素的改组攻击并进行纠正。随机噪声添加攻击可以使用脆弱的水印进行检测,并可以通过插值进行纠正。对于3-D模型中的篡改检测,使用针对3D模型的基于聚类方法的定制版本,对3-D模型的骨架进行了针对裁剪和添加噪声的验证。当骨骼保持不变时,在渐进式压缩,减压和均匀仿射变换期间,水印不会丢失。

著录项

  • 作者

    Agarwal, Parag.;

  • 作者单位

    The University of Texas at Dallas.;

  • 授予单位 The University of Texas at Dallas.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 196 p.
  • 总页数 196
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号