Paper Title:
Three Dimensional Point Clouds Watermarking Algorithm Based on Sphere Degenerated Octree
  Abstract

To ensure the security and integrity of three dimensional point clouds model during transmission in the network, according to their own characteristics, after the pretreatment of PCA (Primary Component Analysis), three dimensional point clouds watermarking embedding algorithm based on sphere degenerated octree was proposed, and the octree that contained the original point clouds model was subdivided multilevel from top to bottom, and the nodes of the octree were ordered. And three dimensional point clouds watermarking extraction algorithm was proposed, and the original point clouds model and the watermarked model were registered accurately, and the occurrence of synchronization error was avoided. Experimental results showed that the presented algorithm was robust to many attacks such as rotation, translation, uniform scaling, vertices reordering, simplifying, noise and cropping under blind detection.

  Info
Periodical
Advanced Materials Research (Volumes 314-316)
Chapter
Digital Manufacture and Management
Edited by
Jian Gao
Pages
2064-2070
DOI
10.4028/www.scientific.net/AMR.314-316.2064
Citation
J. X. Liu, H. G. Cui, X. Dai, "Three Dimensional Point Clouds Watermarking Algorithm Based on Sphere Degenerated Octree", Advanced Materials Research, Vols. 314-316, pp. 2064-2070, 2011
Online since
August 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zong Hui Wang, Shu Su Shi, Li Cheng Yu, Wen Zhi Chen
Chapter 16: Geographic Information and Remote Sensing Science
Abstract:FCD-based traffic navigation system is getting more and more attention from countries all over the world. Shortest path algorithm is one of...
2880
Authors: Ravinder Kumar, Pravin Chandra, M. Hanmandlu
Chapter 7: Machining
Abstract:This paper presents a fast and reliable algorithm for fingerprint verification. Our proposed fingerprint verification algorithm is based on...
888
Authors: Gang Zhu Qiao, Jian Chao Zeng
Chapter 12: Computer-Aided Design, Manufacturing and Engineering
Abstract:The path loss exponent shows the effect of space environment on the RF signals in wireless communication model. In most RSSI based location...
4530
Authors: Xue Feng Wu, Yu Fan
Chapter 6: Mechatronics
Abstract:A new algorithms for parameters of an image irregular boundary circle parameters is presented, which is based on “Curve-Approximate Method”...
639
Authors: Yan Wei Wang, Si Qing Zhang, Bing Lin, Hong Liang, Yan Ming Pan
Chapter 4: Modeling, Automation and Related Themes
Abstract:Feature Point Extraction Method of X-ray Image Based on Scale Invariant is proposed in this paper for industrial X-ray image with low...
667