3d-gsw: 3d gaussian splatting watermark for protecting copyrights in radiance fields
Recently, 3D Gaussian splatting has been getting a lot of attention as an innovative method
for representing 3D space due to rapid rendering and image quality. However, copyright …
for representing 3D space due to rapid rendering and image quality. However, copyright …
A Traitor Tracing and Access Control Method for Encrypted 3D Models Based on CP-ABE and Fair Watermark
With the rapid development of the metaverse, massive amounts of 3D data are created and
outsourced in the cloud, and ciphertext policy attribute-based encryption (CP-ABE) is widely …
outsourced in the cloud, and ciphertext policy attribute-based encryption (CP-ABE) is widely …
Robust 3D object watermarking scheme using shape features for copyright protection
This article utilizes the discrete wavelet transformation to introduce an advanced 3D object
watermarking model depending on the characteristics of the object's vertices. The model …
watermarking model depending on the characteristics of the object's vertices. The model …
A Dual Blind Watermarking Method for 3D Models Based on Normal Features
Q Tang, Y Li, Q Wang, W He, X Peng - Entropy, 2023 - mdpi.com
Digital watermarking technology is an important means to effectively protect three-
dimensional (3D) model data. Among them,“blind detection” and “robustness” are key and …
dimensional (3D) model data. Among them,“blind detection” and “robustness” are key and …
Splats in Splats: Embedding Invisible 3D Watermark within Gaussian Splatting
3D Gaussian splatting (3DGS) has demonstrated impressive 3D reconstruction performance
with explicit scene representations. Given the widespread application of 3DGS in 3D …
with explicit scene representations. Given the widespread application of 3DGS in 3D …
MSB-Based Reversible Data-Hiding in Encrypted 3D Object Using a Hamiltonian Path
E Reinders, BJ Van Rensburg… - 2023 IEEE 25th …, 2023 - ieeexplore.ieee.org
Nowadays, 3D objects are frequently stored and shared online, where they become
vulnerable to attacks. Therefore, applying security measures such as encryption is crucial …
vulnerable to attacks. Therefore, applying security measures such as encryption is crucial …