The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a novel algorithm for tamperproof watermarking of 3D models. Fragile watermarking is used to detect any kind of tamper i.e. unauthorized modifications in the model. The best and the simplest way to do this is by inserting a watermark at each and every vertex of the model. This poses as a challenge as insertion of watermark in every vertex can cause perceptible distortion and inserting...
The environment in which video motion needs to be tracked, places several constraints on the design of the tracking system. Current datasets which are used to evaluate and compare video motion tracking algorithms use a cumulative performance measure without thoroughly analyzing the effect of these different constraints imposed by the environment. There is need to build a heuristic framework which...
This paper describes a novel algorithm designed for tamper proofing of 3D models. Fragile watermarking is a known technique for detecting location of tamper in the artwork. However, to detect even minute changes, the watermark needs to be distributed throughout the 3D model. This poses as a challenge since watermarking all vertices can cause perceptible distortion. The proposed algorithm solves this...
This paper presents a novel 3D mesh watermarking scheme that utilizes a support vector machine(SVM) based classifier for watermark insertion. Artificial intelligence(AI)based approaches have been employed by watermarking algorithms for various host mediums such as images, audio, and video. However, AI based techniques are yet to be explored by researchers in the 3D domain for watermark insertion and...
This paper proposes a new DRM system for 3D graphics that makes use of biometric watermarking technology. The presented solution utilizes an image of a biometric trait e.g. face or fingerprint, and embeds it into the 3D graphics as a watermark. This biometric watermark is then used to authenticate a legitimate user. Details for the components of the DRM framework are presented. Adoption of biometric...
Watermarking based DRM implementations insert imperceptible information or watermark in digital media to trace owner of the content and deter the illegal distribution of media. In geometry based 3D watermarking algorithms, a watermark is inserted by modifying the coordinates of vertices in the mesh. It is a requirement of watermarking algorithms that this change in vertex coordinates shouldn't cause...
One of the characteristics of the Human Visual System (HVS) is to model the sensitivity of the human eye at each coordinate location in the image. This paper explores the use of fuzzy logic for building a non-linear HVS model for perceptual masking in wavelet domain. The fuzzy input variables corresponding to brightness, edge sensitivity, and texture are computed for each wavelet coefficient at different...
Neither the C nor the C++ languages support reflection and their meta-programming capabilities are very limited. Both of these problems can be addressed by adding a preprocessing step, which can analyze and modify the code before it is passed to the actual compiler. By using this method, we can simplify many typical C/C++ tasks without having to change the languages at all. In order to investigate...
Extracting microorganisms from their natural environment has become a popular technique. These metagenomic fragments lack enough information that can mark them into taxonomic groups. In this paper, we implement a fuzzy k-means classifier to separate fragments into taxonomic groups present in a metagenomic data set. The fuzzy classifier is used to group shotgun sequence fragments as small as 500 base...
The destructive capacity of wildfires and the dangers and limitations associated with observing actual wildfires has led researchers to develop mathematical models in order to better understand their behavior; unfortunately, current two-dimensional visualization techniques make discerning driving forces of a fire difficult and restrict comprehension to the trained eye. VFire is an immersive wildfire...
This paper presents a novel robust watermarking algorithm for 3D skinning mesh animations by embedding the watermark in skin weights in addition to key frames. This method can be used for copyright protection, tamper proofing or content annotation purposes. The proposed watermark is immune to noise attacks on key frames and skin weights, key frame dropping and frame modification and is perceptible...
Mobile devices are being widely and increasingly used in many areas of human activity. Designing applications for mobile devices has introduced several new challenges that are currently being addressed by interested researchers and developers. This paper explores different human-computer interaction challenges in designing an academic researcher's assistant (ARA) software application for mobile devices...
Watermarking algorithms have a basic requirement that the watermark amplitude should be as high as possible for robustness and at the same time the watermark should not introduce any perceptible artifacts. Thus, the design of watermarking algorithms involves a tradeoff between imperceptibility and robustness. This paper proposes a novel state of the art algorithm, which is based on wavelet and fuzzy...
The development of network-attached devices has ushered in an era of autonomous, multi-function equipment demanding minimal human interaction: the only requirements are data and electricity. Despite these advances, these machines continue underutilized in network environments due to operating system limitations regarding the management of these devices. These limitations force the use of these devices...
This paper presents details of the specification, design and functionality of the virtual UNR campus software (in short, VCampus), an interactive virtual environment that allows users to explore the 3D representation of the University of Nevada, Reno. VCampus provides a realistic-rendering of the university and allows users to obtain useful information such as building names and directories, university...
This paper gives an overview of a capstone course, CS426-Senior Projects, and focuses on the streamlined software engineering process followed to take student projects from initial concept to prototype implementation. The paper provides details on course structure, pointers to students' work, and observations on applying various educational tools. It also presents details on the software process designed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.