1 |
S. Katzenbeisser, A. Lemma, M.U. Celik, M. Van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Transactions on Information Forensics and Security, vol. 3 , issue 4, pp. 783-786, Dec. 2008.
DOI
|
2 |
A. Rial, Mina Deng, T. Bianchi, A. Piva, and B. Preneel, "A provably secure anonymous buyer-seller watermarking protocol," IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 920-931, Dec. 2008.
|
3 |
A. Rial, J. Balasch, and B. Preneel, "A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer," IEEE Transactions on Information Forensics and Security, vol. 6, issue 1, pp. 202-212, March 2011.
DOI
ScienceOn
|
4 |
L. Quan, C. Zheng, and Z. Zude, "Research on secure buyer-seller watermarking protocol," Journal of Systems Engineering and Electronics, vol. 19, issue 2, pp. 370-376, April 2008.
DOI
|
5 |
S.-G. Kwon, S.-H. Lee, K.-R. Kwon, E.-J. Lee, S.-Y. Ok and S.-H. Bae, "Mobile 3D game contents watermarking based on buyer-seller watermarking protocol," IEICE Transaction on Information and System, vol. E91-D, no.7, pp. 2018-2026, July 2008.
DOI
ScienceOn
|
6 |
PowerVR SGX, Khronos OpenGL ES 2.0 SDK, Imagination Technology, http://www.imgtec.com/, Accessed to Sept. 2012.
|
7 |
A. Jagannathan and E. L. Miller, "Three-dimensional surface mesh segmentation using curvedness-based region growing approach," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 12, pp. 2195-2204, Dec. 2007.
DOI
ScienceOn
|
8 |
N. Dyn, K. Hormann, S.J. Kim and D. Levin, "Optimizing 3D triangulations using discrete curvature analysis," Math. Methods for Curves and Surfaces: Oslo 2000, Vanderbilt University Press, pp. 135-146, 2001. http://www.researchgate.net/publication/228909965_Optimizing_3D_triangulations_using_discrete_curvature_analysis/file/9fcfd50aa804db9277.pdf&sa=X&scisig=AAGBfm1rmavfjLLjhh1CiWCN8spsifJABA&oi=scholarr&ei=83niUqjGG4rQkwXHuoFI&ved=0CCYQgAMoADAA
|
9 |
R. Ohbuchi, H. Masuda, and M. Aono, "Watermarking three-dimensional polygonal models through geometric and topological modifications," IEEE Journal on Selected Areas in Communications, vol. 16, issue 4, pp. 551-560, May 1998.
DOI
ScienceOn
|
10 |
O. Benedens, "Geometry-based watermarking of 3D models," IEEE Computer Graphics and Applications, pp. 46-55, Jan./Feb. 1999.
|
11 |
S.-H. Lee and K.-R. Kwon, "A watermarking for 3D-mesh using the patch CEGIs," Digital Signal Processing, vol. 17, issue 2, pp. 396-413, March 2007.
DOI
ScienceOn
|
12 |
S.-H. Lee and K.-R. Kwon, "Mesh watermarking based projection onto two convex sets," Multimedia Systems, vol. 13, no. 5-6, pp. 323-330, Feb. 2008.
DOI
ScienceOn
|
13 |
J.M. Konstantinides, A. Mademlis, P. Daras, P.A. Mitkas, M.G. Strintzis, "Blind robust 3-D mesh watermarking based on oblate spheroidal harmonics," IEEE Transactions on Multimedia, vol. 11, issue 1, pp. 23-38, Jan. 2009.
DOI
|
14 |
K. Kwangtaek, M. Barni, and H.Z. Tan, "Roughness-adaptive 3-D watermarking based on masking effect of surface roughness," IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 721-733, Dec. 2010.
DOI
|
15 |
S.-H. Lee and K.-R. Kwon, "CAD drawing watermarking scheme," Digital Signal Processing, vol. 20, issue 5, pp. 1379-1399, Sep. 2010.
DOI
|
16 |
Z. Sakr and N.D. Georganas, "Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location," ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 3, no. 3, article 18, Aug. 2007.
|
17 |
S.-H. Lee and K.-R. Kwon, "VRML animated model watermarking scheme using geometry and interpolator nodes," Computer-Aided Design, vol. 43, issue 8, pp. 1056-1073, Aug. 2011.
DOI
ScienceOn
|
18 |
S.-H. Lee and K.-R. Kwon, "Robust 3D mesh model hashing based on feature object," Digital Signal Processing, vol. 22, issue 5, pp. 744-759, Sep. 2012.
DOI
|
19 |
N. Memon and P.W. Wong, "A buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol.10, no.4, pp. 643-649, April 2001.
DOI
ScienceOn
|
20 |
C.L. Lei, P.L. Yu, P.L. Tasi, and M.W. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol.13, no.12, pp. 1618-1626, Dec. 2004.
DOI
ScienceOn
|
21 |
SIO2 Engine, SIO2Interactive.com, http://sio2interactive.com/, Accessed to Sept. 2012.
|
22 |
ShiVa3D, Stonetrip, http://www.stonetrip.com, Accessed to Sept. 2012.
|
23 |
Unity3D, Unity Technologies, http://www.unity3d.com, Accessed to Sept. 2012.
|
24 |
Corona DSK, Corona, http://www.coronasdk.com, Accessed to Sept. 2012.
|
25 |
Unreal Engine 3 (UDK), Unreal Technology, http://www.udk.com/mobile, Accessed to Sept. 2012.
|
26 |
Authentec, http://www.authentec.com/, Accessed to Sept. 2012.
|
27 |
BuyDRM, http://www.buydrm.com/, Accessed to Sept. 2012.
|
28 |
Discretix, http://www.discretix.com/, Accessed to Sept. 2012.
|
29 |
PlayReady, https://www.microsoft.com/playready/, Accessed to Sept. 2012.
|
30 |
L. Ming and A.G. Bors, "Surface-preserving robust watermarking of 3-D shapes," IEEE Transactions on Image Processing, vol. 20, issue 10, pp. 2813-2826, Oct. 2011.
DOI
|