• Title/Summary/Keyword: 3D convex model

Search Result 23, Processing Time 0.025 seconds

3D Mesh Model Watermarking Based on Projection

  • Lee Suk-Hwan;Kwon Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.12
    • /
    • pp.1572-1580
    • /
    • 2005
  • The common requirements for watermarking are usually invisibility, robustness, and capacity. We proposed the watermarking for 3D mesh model based on projection onto convex sets for invisibility and robustness among requirements. As such, a 3D mesh model is projected alternatively onto two convex sets until it converge a point. The robustness convex set is designed to be able to embed watermark into the distance distribution of vertices. The invisibility convex set is designed for the watermark to be invisible based on the limit range of vertex movement. The watermark can be extracted using the decision values and index that the watermark was embedded with. Experimental results verify that the watermarked mesh model has both robustness against mesh simplification, cropping, affine transformations, and vertex randomization and invisibility.

  • PDF

3D Mesh Watermarking Using Projection onto Convex Sets (볼록 집합 투영 기법을 이용한 3D 메쉬 워터마킹)

  • Lee Suk-Hwan;Kwon Seong-Geun;Kwon Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.2 s.308
    • /
    • pp.81-92
    • /
    • 2006
  • This paper proposes a robustness watermarking for 3D mesh model based on projection onto convex sets (POCS). After designing the convex sets for robustness and invisibility among some requirements for watermarking system, a 3D-mesh model is projected alternatively onto two constraints convex sets until the convergence condition is satisfied. The robustness convex set are designed for embedding the watermark into the distance distribution of the vertices to robust against the attacks, such as mesh simplification, cropping, rotation, translation, scaling, and vertex randomization. The invisibility convex set are designed for the embedded watermark to be invisible. The decision values and index that the watermark was embedded with are used to extract the watermark without the original model. Experimental results verify that the watermarked mesh model has invisibility and robustness against the attacks, such as translation, scaling, mesh simplification, cropping, and vertex randomization.

A Numerical Study on the Behavior of Convex and Concave Slopes in Plan View (볼록 및 오목 사면 형상에 따른 거동에 대한 수치해석 모형 연구)

  • 정우철;박형동;박연준;유광호
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2000.11b
    • /
    • pp.213-220
    • /
    • 2000
  • Numerical modeling of cut slope has some limits in simulating the real slopes. In the case of 2D analysis of slope stability, it is assumed that slope is simply straight even when it is concave or convex in plan view. In this study, 3D analysis in curved shape slopes has been conducted for the comparison with 2D analysis in terms of failure mode and factor of safety. For this, 3D analysis by FLAC3D was compared with 2D analysis in plane strain condition and axi-symmetric model condition by FLAC. It was also observed how safety factors of slopes were affected by the variation of the tensile strength and cohesion, which are important variables to decide whether the slope fails or not. 2D analysis of concave slopes under plane strain condition showed much smaller safety factors by 16-40 % errors depending on the radius of curvature of slopes, compared to the more realistic values from 3D analysis. In case of convex slopes, the lower values by 7-10 % has been reported. 2D analysis of axi-symmetric model showed also smaller safety factors by 6-10 % and by 2-4 %, in case of concave and convex slopes, respectively. Such results are expected to contribute to the better understanding of failure process and could be applied for improved design of slopes.

  • PDF

VISUALIZATION OF 3D DATA PRESERVING CONVEXITY

  • Hussain Malik Zawwar;Hussain Maria
    • Journal of applied mathematics & informatics
    • /
    • v.23 no.1_2
    • /
    • pp.397-410
    • /
    • 2007
  • Visualization of 2D and 3D data, which arises from some scientific phenomena, physical model or mathematical formula, in the form of curve or surface view is one of the important topics in Computer Graphics. The problem gets critically important when data possesses some inherent shape feature. For example, it may have positive feature in one instance and monotone in the other. This paper is concerned with the solution of similar problems when data has convex shape and its visualization is required to have similar inherent features to that of data. A rational cubic function [5] has been used for the review of visualization of 2D data. After that it has been generalized for the visualization of 3D data. Moreover, simple sufficient constraints are made on the free parameters in the description of rational bicubic functions to visualize the 3D convex data in the view of convex surfaces.

Robust Recognition of 3D Object Using Attributed Relation Graph of Silhouette's (실루엣 기반의 관계그래프 이용한 강인한 3차원 물체 인식)

  • Kim, Dae-Woong;Baek, Kyung-Hwan;Hahn, Hern-Soo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.25 no.7
    • /
    • pp.103-110
    • /
    • 2008
  • This paper presents a new approach of recognizing a 3D object using a single camera, based on the extended convex hull of its silhouette. It aims at minimizing the DB size and simplifying the processes for matching and feature extraction. For this purpose, two concepts are introduced: extended convex hull and measurable region. Extended convex hull consists of convex curved edges as well as convex polygons. Measurable region is the cluster of the viewing vectors of a camera represented as the points on the orientation sphere from which a specific set of surfaces can be measured. A measurable region is represented by the extended convex hull of the silhouette which can be obtained by viewing the object from the center of the measurable region. Each silhouette is represented by a relation graph where a node describes an edge using its type, length, reality, and components. Experimental results are included to show that the proposed algorithm works efficiently even when the objects are overlapped and partially occluded. The time complexity for searching the object model in the database is O(N) where N is the number of silhouette models.

A Study on Setting Darts and Split Lines of Upper Bodice Pattern on 3D Parametric Model dressed with Tight-fit Garment (밀착의형 3차원 파라메트릭 모델을 활용한 상반신 원형의 다트 및 절개분리선 설정에 관한 연구)

  • Park, Soon-Jee;Kim, Hye-Jin
    • Fashion & Textile Research Journal
    • /
    • v.12 no.4
    • /
    • pp.467-476
    • /
    • 2010
  • The purpose of this study was to develop a plausible methodology based on experimental data how to set up darts and split lines on 3D parametric body dressed with tight-fit garment. The results were as following: Through the process of making convex hull, the concave parts were straightened to make a convex hull, especially in the center part of bust, under breast part and scapular part. To figure out the optimum positions of darts and split lines, the inflection points of curve ratio were searched along the horizontal polylines of waist and bust. This procedures produced reliable results with low deviation. Using Rapidform, CATIA and Unigraphics, six patches of bodice patterns were drawn and aligned. Paired t-test results showed the outline and area between 3D surface and 2D were not significantly different, meaning this method could be adaptable when flattening 3D surfaces. The amount of waist dart measured on the pattern showed that the highest portion was allocated on 2nd dart(back), followed by 1st dart(back), 1st dart(front), 2nd dart(front)/side dart, and center back dart. A series of findings suggested that curve ration inflection point could be used as a guide to set up darts and split line on 3D parametric model with low deviation.

Exploration of Isovist Fields to Model 3D Visibility With Building Facade

  • Chang, Dong-Kuk;Park, Joo-Hee
    • Architectural research
    • /
    • v.13 no.3
    • /
    • pp.19-29
    • /
    • 2011
  • Visibility of a space have been defined in several different ways: such as the axial line covering a convex space, a convex space defining the fattest shape in a space and an Isovist field formed by a field of vision at a given vantage point. Isovist fields are referred to as a descriptive medium to describe a movement by reviewing and analyzing geometric properties in them. Many descriptive methods for analysis of three-dimensional isovist are applied to analyzing the morphological properties in a 3D space more realistically. Although these models are regarded as a more advanced method for describing spatial properties, they have pros and cons such as complex mathematical calculations and somewhat arbitrary calibration in addition to huge consumption of memory space. These difficulties lead to the development of a three-dimensional visual accessibility model that explores the implication of building shape on the calculation of isovist fields drawn on a 2D plane. We propose a conceptual framework of how to measure the isovist field not as a 3D volume but as a combination of 2D plane on the ground with the 3D building shape of it's facade.

3D Mesh Model Watermarking Based on POCS (POCS에 기반한 3D 메쉬 모델 워터마킹)

  • Lee Suk-Hwan;Kwon Ki-Ryong;Lee Kuhn-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11C
    • /
    • pp.1592-1599
    • /
    • 2004
  • In this paper, we proposed the 3D mesh watermarking using projection onto convex sets (POCS). 3D mesh is projected iteratively onto two constraint convex sets until it satisfy the convergence condition. These sets consist of the robustness set and the invisibility set that designed to embed watermark Watermark is extracted without original mesh by using the decision values and the index that watermark is embedded. Experimental results verified that the watermarked mesh have the robustness against mesh simplification, cropping, affine transformation, and vertex randomization as well as the invisibility.

MDS Coded Caching for Device-to-Device Content Sharing Against Eavesdropping

  • Shi, Xin;Wu, Dan;Wang, Meng;Yang, Lianxin;Wu, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4484-4501
    • /
    • 2019
  • In this paper, we put forward a delay-aware secure maximum distance separable (MDS) coded caching scheme to resist the eavesdropping attacks for device-to-device (D2D) content sharing by combining MDS coding with distributed caching. In particular, we define the average system delay to show the potential coupling of delay-content awareness, and learn the secure constraints to ensure that randomly distributed eavesdroppers cannot obtain enough encoded packets to recover their desired contents. Accordingly, we model such a caching problem as an optimization problem to minimize the average system delay with secure constraints and simplify it to its convex relaxation. Then we develop a delay-aware secure MDS coded caching algorithm to obtain the optimal caching policy. Extensive numerical results are provided to demonstrate the excellent performance of our proposed algorithm. Compared with the random coded caching scheme, uniform coded caching scheme and popularity based coded caching scheme, our proposed scheme has 3.7%, 3.3% and 0.7% performance gains, respectively.