A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS
|
|
- Georgia McKinney
- 6 years ago
- Views:
Transcription
1 A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS Saoussen Ben Jabra and Ezzeddine Zagrouba Institut Supérieur d informatique, Abou Raihane Bayrouni, 2080 l Ariana, Tunisia. Saoussen.bj@laposte.net, ezzeddine.zagrouba@fsm.rnu.tn ABSTRACT In this paper, a robust 3D mesh watermarking algorithm based on feature regions is proposed. In this algorithm, three classes of watermarking are combined. First, we segment the original image to many different regions. These regions will be classified to three classes: concave, convex and plane regions. For every type of regions we will choose a feature region which maximizes the curvature criteria. Finally, every feature region will be marked with the adequate algorithm based on its type. The experimentations show that our watermarking is robust against numerous attacks including RST transformations, additive random noise, cropping, simplification and remeshing. In plus, it gives a good invisibility and a blind extraction.. Index Terms 3D mesh, watermarking, feature regions, robustness, invisibility 1. INTRODUCTION With the development of internet, some information, such as text, image, sound, video and 3D model, is exchanged and transferred conveniently on internet. In this environment, an important issue is the copyright protection of these digital data and prevents unauthorized duplication of them. Digital watermarking technique is one of effective methods of protection copyright and information security. In fact, Digital watermarking, derived of the steganography, has been considered as a good technique to resolve the problem of copyright. It consists of inserting (generally under invisible shape) a signature into an image, then to try to get it back after any possible attacks on the image. It can be blind or not depending on whether the original image is needed at extraction or not. Usually, the signature must be robust it means that it must resist against the malicious attacks; this type of watermarking is designed to copyright protection applications. The watermarking can also be fragile for authentification applications. Robustness is often measured in terms of the number of watermarking attacks categories the watermark is able to resist. Most common categories of attacks are RST transformations (rotation, translation, scaling), geometrical attacks (noise addition, surface smoothing), resampling attacks (connectivity modifications such as simplification, subdivision, remeshing) and cropping. The remaining sections of this paper are organized as follows. A brief review of the 3D watermarking schemes is given in section 2. The proposed watermarking embedding scheme is described in section 3 and the experimental results are provided in section 4. Finally, section 5 summaries the proposed work and present the future work. 2. 3D WATERMARKING OVERVIEW 3D images are mostly represented by polygonal meshes. Basically, a mesh is a collection of polygonal facets. It possesses three different combinatorial elements: vertices, edges and facets. It can also be completely described by two kinds of information: the geometry information defines essentially the coordinates of all its vertices, while the connectivity (topology) information describes the adjacency relations between the different elements. Although there are many other 3D representations (such parametric surface, implicit surface and voxels), 3D mesh has been the most popular used representation of 3D objects thanks to its simplicity and usability. Compared to other audiovisual multimedia such as image, audio and video, 3D watermarking is relatively new and is not yet a mature technology. This situation is caused by the complexity of the meshes and the possible manipulations which can attack the watermarked meshes. Existing techniques concerning 3D meshes can be classified in two main categories, depending whether the watermark is embedded in the spatial domain or in the spectral domain. The spatial methods can modify geometry (point positions) or topology (connectivity). Harte et al. [1] have proposed a blind watermarking scheme to embed a watermark in the point positions. One bit is assigned to each point: 1 if the point is outside a bounding volume defined by its point neighborhood and 0 otherwise. This bounding volume may be either defined by a set of bounding planes or by a bounding ellipsoid. The Vertex Flood Algorithm (VFA) [2] embeds information in point positions. Designed for public watermarking, its high capacity is its main feature. Given a point p in the mesh, all points are clustered in subsets (Sk) accordingly with their distance to p. This point is the barycenter of a reference triangle R whose edges are the
2 closest to a predefined edge length ratio. Each non-empty subset is subdivided in m + 2 intervals in order to encode m bits. The distance of each point in a subset is modified so that it is placed on the middle of one of the m+2 intervals. Decoding does not need the original mesh and is simply achieved by reading point positions in the subintervals of each subset. Geometric algorithms can resist to geometrical attacks (translation, rotation, zooming and a combination of them). For extraction, geometric watermarking mostly can be blind. There exist very few watermarking methods using the mesh topology. Among this class of watermarking schemes, Ohbuchi et al. [3] have proposed four different watermarking algorithms. These schemes are Triangle Similarity Quadruple (TSQ), Tetrahedral Volume Ratio (TVR), Triangle Strip Peeling Sequence (TSPS) and Macro Density Pattern (MDP). TSQ modifies ratios between triangle edge lengths or triangle height and basis lengths. The invariant used by TVR is the ratio between an initial tetrahedron volume and the volume of tetrahedron given by an edge and its two incident triangles. These ratios are slightly modified to embed the watermark. The third scheme, TSPS, encodes data in triangle strips given the orientation of the triangles. Finally, Ohbuchi's MDP is a visual watermarking method which embeds the signature by changing the local density of points. The Triangle Flood Algorithm (TFA) is another connectivity-driven watermarking scheme developed by Oliver Benedens [4]. This scheme uses connectivity and geometric information to generate a unique traversal of all the mesh triangles. Point positions are modified to embed the watermark by altering the height of the triangles and also to enable the regeneration of the traversal. Topologic algorithms can resist to topologic attacks (simplification and remeshing). For extraction, topologic watermarking mostly can be blind. The spectral schemes methods embed information in a mesh transform domain. These transforms can be the mesh spectral decomposition, the wavelet transform or the spherical wavelet transform. The first scheme based on spectral decomposition has been proposed by Ohbuchi et al. in 2002 [5]. The signature was added to the low pseudo-frequency coefficients to obtain a good invisibility. Kanai et al. [6] have proposed the first scheme embedding in the wavelet transform domain. The watermark bits are embedded by modifying the least significant bits of the wavelet coefficients modulus. In order to minimize the visual impact of the watermark embedding, a selection of wavelet coefficients based on geometric thresholds is proposed. Watermark extraction is performed through the comparison of wavelet coefficients of the original and watermarked versions of the model. Extending this scheme, a blind watermarking algorithm has been presented more recently [6] that can ignore the original mesh information on the detector side. Spectral watermarking can resist to the cropping and filtering. The watermarking can use other proprieties of the 3D mesh like texture, 3D silhouettes... [7] separate the texture from the original 3D mesh and uses a 2D watermarking to insert the signature in the texture. This scheme is robust against the 2D attacks. Bennour et al. [8] propose a very different approach. They embed the watermark in 3D silhouettes of the mesh and retrieve it in 2D rendered views of the model. Therefore, no 3D data is necessary at the decoding side. Watermarking can also modify NURBS surfaces used in aided design conception for industry. A NURBS surface is composed by a set of control points denoted by P, a vector of weights denoted by w, and a knot vector denoted by U. The greater a weight component, the closer the NURBS surface to the corresponding control point. The U vector determines the influence area for a control point. The principle in [9] is to change the weight and the knot vectors so as to preserve the overall geometry. Such an algorithm is required mainly when marking CAD models, where the smallest alteration of the geometry would lead to errors in production. In [10], they consider that the NURBS may afford a natural extension from 2D to 3D data: they advanced a method where the mark is not embedded directly into the 3D model but into some virtual images derived from the 3D model. These algorithms can resist to 2D attacks and they are not blind. 3. PROPOSED APPROACH Based on the comparative study of the existing watermarking methods we observed that every class presents his own advantages and inconveniences. Besides, it is very difficult to find a method that verifies a good compromise between good invisibility of the marked image, robustness to the maximum attacks and blind detection. The idea that we conceived consists to profit from the advantages of three classes by combining them in one scheme. The three classes are topologic, geometric and spectral class. This choice allow us to obtain a robustness against geometric attacks due to the use of the geometric class, a robustness against remeshing and simplification thanks to the topologic class and a robustness against cropping and filtering by using the spectral class. In addition, these three classes have a blind detection. To combine these schemes, we applied an unrefined segmentation on the original image to obtain many different regions. These last ones will be classified to three classes: convex, concave and plane regions based on their curvature values. Then we select a feature region from every class to represent it. This feature region must maximize the curvature criterion for every class. Finally, every feature region will be marked using the adequate
3 scheme. The choice of the algorithm for every region will be based on the comparative study and experimental tests. The general algorithm of insertion decomposes into many stages: segmentation, region classification, feature region extraction and regions marking. The general algorithm of insertion is presented in fig 1. Convex regions Most Convex region Original image Segmentation Regions classification Concave regions Feature region extraction Most Concave region Plane regions Most plane region 3.1. Step 1: 3D Segmentation The first step in our approach is to decompose the original image into many regions. For obtain this decomposition, we applied a 3D segmentation algorithm. In fact, 3D Segmentation consists to transform an original 3D mesh into connected subsets of mesh called regions. There exist many 3D segmentation algorithms but we have implemented an algorithm which have the same principle of the segmentation proposed by L.Guillaume[11] because it decomposes the object into almost constant curvature triangle regions with precise edge boundaries. This will help us in the second step because our classification will be based on curvature measure. The general idea of this segmentation algorithm is composed of several steps. Firstly, discrete curvature is calculated for each vertex according to the work of Meyer et al [12]. Then vertices are classified into clusters according to their principal curvatures values. A region growing algorithm is then processed assembling triangles into connected labelled regions according to the vertex clusters. Holes between regions are filled taking into account boundary criteria. Finally a region adjacency graph is processed and reduced in order to merge similar regions according to several criteria (curvature similarity, size, common perimeter) Step 2: Regions classification The classification of the different regions given by the segmentation is achieved by using two measures: Gaussian and mean curvatures. In fact, these two measures permit to classify the regions in three classes: convex regions having positive mean curvature and positive Gaussian curvature, concave regions having a negative mean curvature and positive Gaussian curvature and plane regions having Gaussian curvature almost equal to zero. Estimating the mean curvature on a triangulated surface can be done by using the following formula: Topologic scheme Geometric scheme Spectral scheme Where angles αj and βj are two angles opposite to the edge e(i, j), A is the Voronoi surface in the point X and N(i) is the neighbourhood of the point X. The Gaussian curvature can be calculated using the following formula: Marked image Fig. 1. General architecture Where n is the number of triangles where i is a component. For every region we calculated the mean and the Gaussian curvature for every vertex. After the mean and Gaussian curvature of the region consist of the mean of the vertices curvatures.
4 3.3. Step 3: Feature region extraction In this step, we will order every class of regions and we will select one region from each class to represent it and to be marked with the adequate algorithm. This selected region will be chosen because it maximizes the curvature criterion for every class. This region will be the feature region. In fact, from the class of convex regions we will select the most convex region. This region must have the maximum of mean curvature with a positive Gaussian curvature. From the concave class the most concave region is the region which has the minimum of median curvature with a positive Gaussian curvature. For plane class the chosen region must have the most Gaussian curvature near to zero. After this step, we obtain three regions which represent the feature regions for our watermarking. In table 1, we present the curvature values to select a feature region from every class. TABLE I FEATURE EXTRACTION FOR EVERY CLASS Region type Feature region Convex max(km) &Km >0 & Kg >0 Concave max( Km ) &Km <0 & Kg >0 Plane Kg nearest to Step 4: Region watermarking Our main goal is to obtain a scheme of watermarking robust against the maximum of attacks, blind and invisible. To get the maximum of robustness, the idea consists to profit from the advantages of many classes of watermarking. So, we choose to use three schemes in one algorithm. These three schemes are: geometric, topologic and spectral scheme. These three schemes are chosen because the first permit to get robustness against geometric attacks, the second permit to the signature to be robust against remeshing and simplification and the last scheme allow obtaining robustness against filtering and compression. In more, the repetition of the signature in three regions helps us to detect the signature after a cropping of the marked image because if one marked region was destroyed by the cropping we can find the signature in the two others marked regions. In the other hand, the use of these three schemes allows to obtain a blind extraction because these algorithms don t need the original image at the time of the detection. In the comparative study, we observed that spectral watermarking give the maximum of invisibility when the insertion is done in low frequencies which correspond to the plane regions so we choose to mark the feature region for the plane class with spectral watermarking. For the two others classes of regions, we choose to mark concave feature region with geometric watermarking and convex feature region with topologic watermarking. This choice is based on experimental study. In fact, we have tested the two propositions and we have obtained the better visibility where we apply geometric algorithm on the concave region and topologic algorithm on the convex region Signature detection The detection of the signature decomposes in many stages where the three first stages are similar to those in insertion. In fact, the tested image will be segmented with the same algorithm used in insertion. After, mean and gaussian curvature of the obtained regions will be calculated to classify the regions to three classes: convex, concave and plane. After classification, the two feature regions for every class will be detected using the same criteria like insertion. In the fourth step, the adequate algorithm of detection will be applied on every feature region. So a geometric detector will be applying to concave feature region, a topologic detector will be applying to convex feature region and spectral detector to the plane feature region. Every detector will give 1 if the signature will be found in the region else it gives 1. If the three detectors give 0 so we decide that the image is not marked else if one of these three detectors give 1 we decide that the tested image is marked. These detectors are all blind they don t need the original image to detect the signature so our detector is blind. 4. EXPERIMENTAL RESULTS To evaluate our approach we applied it on a database of test images used usually in 3D applications. In plus, these images have different proprieties of number of points, number of regions and triangles and they have different proprieties of curvature. We will present here only four examples of this database: Cow, Fandisk, Porsche and rhino. Table 2 presents the different proprieties of these examples. TABLE II TEST IMAGES Images Vertices Triangles Regions Cow Teapot Fandisk Porsche Fig 2 presents the segmentation and the watermarking results for these four examples.
5 Teapot Fandisk We can observe that original and marked images are identical so the invisibility of our approach is good. In order to improve this result we have compared the invisibility of our approach with other approaches using only one of 3D watermarking class. For this, we have evaluated the mean square error (MSE) between the vertices composing the original and watermarked object, respectively. MSE can be written as: Porsche a- Original images Cow Where M is the total number of the mesh vertices and v i, v i are the vertices coordinates of the original mesh and watermarked mesh. We present in Fig 3 the MSE values for our approach and for geometric, topologic and spectral watermarking. b- Segmented images Fig. 3. Invisibility evaluation c- Marked images Fig. 2. Segmentation and watermarking results The MSE values for our watermarking are lower than the MSE values for the others algorithms. This is natural because our algorithm embed the mark only on four feature regions so it don t many damage the visual quality of the marked image. The most important criterion that must verify a watermarking algorithm is robustness against attacks. So a good watermarking must detect the presence of the mark in the image after many manipulations. To verify this criterion for our approach we have applied many attacks on the marked image. These attacks are the most used in 3D watermarking tests. After, we have applied our detector on this attacked image. In case of the success of the detection, the detector output must be 1 else 0. First, we have evaluated our watermarking algorithm against RST attacks (translation, scaling and rotation). We noticed the success of the retrieval of the signature after these three attacks. After, we have studied additive random noise on the vertices coordinates and Laplacian
6 smoothing of the mesh. We applied these two attacks with different parameters. Considering noise addition, we have focused on the noise power as the attack parameter. The parameter for smoothing is the number of iterations of the smoothing algorithm. For the four tested images the robustness against these two attacks is achieved if the noise power is <0.45 and the number of smoothing iterations is <20. Finally we cropped the 3D mesh by cutting 15% of vertices and we changed the meshing and we removed 1/8 of vertices. We observed that our algorithm is also able to detect the presence of signature after these three manipulations. Table 3 present a comparison between the robustness of our approach and the three other classes. TABLE III ROBUSTNESS COMPARISON Attacks Geometric Topologic Spectral Our approach RST YES NO NO YES Cropping NO NO YES YES Simplification NO YES NO YES Remeshing NO YES NO YES Noise NO NO YES YES In plus, our watermarking is blind. In fact, it doesn t need the original mesh during detection step. 5. CONCLUSIONS In this paper, we have presented a new approach of 3D image watermarking which combines three classes of insertion. This combination allows benefiting from the multiple advantages of each class. This is realized by segmenting the 3D image in unrefined regions having different values of curvature. These last ones will be classified to three classes: convex, concave and plane regions. Then we select from every class the feature region which maximizes the curvature value. Finally we mark these three feature regions with the adequate watermarking. We have presented first, existing methods using the two possible domains of insertion: spatial (geometric and topologic), spectral and the other types of watermarking. Then, we have presented the different steps of our method. A quantitative evaluation in terms of MSE was used to measure the quality of the marked image. The robustness of our new method was verified after application of various types of attacks such as RST transformations (rotation, scaling and translation), smoothing, random noise added to vertex coordinates, cropping vertices, simplification and remeshing. This is obtained through to the capacity of our detector to find signature from marked and attacked image. In perspective, this work can be completed by other studies which can improve it. Indeed, we can find new invariant parameters to the segmentation algorithm. These regions allow us to improve the robustness of the scheme. 6. REFERENCES [1] T. Harte and A. Bors, Watermarking 3d models, In Proc. of International Conference on Image Processing (ICIP), Rochester, NY, USA, volume 3, pp , Sep [2] O. Benedens. Two high capacity methods for embedding public watermarks into 3d polygonal models. In Proc. of the Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, pp [3] R. Ohbuchi, H. Masuda, and M. Aono, Watermarking three dimensional polygonal models through geometric and topological modifications, In IEEE JSAC, pp , May [4] O. Benedens. Geometry-based watermarking of 3d models, IEEE Computer Graphics and Applications, pp January [5] R. Ohbuchi, S. Takahashi, T. Miyazawa, and A. ukayiama, Watermarking 3d polygonal meshes in the mesh spectral domain. In Proceedings of Graphics Interface, pp Jun [6] S. Kanai, H. Date, and T. Kishinami, Digital watermarking for 3d polygons using multiresolution wavelet decomposition, In Proc. Sixth IFIP WG 5.2 GEO-6, Tokyo, Japan, pp , December [7] E. Garcia and J.-L. Dugelay. Texture-based watermarking of 3d video objects. IEEE Trans. Circuits Syst. Video Techn., 13(8), pp ,2003. [8] J. Bennour and J.-L. Dugelay. Protection of 3d object through silhouette watermarking. In ICASSP 2006, 31st International Conference on Acoustics, Speech, and Signal Processing, Toulouse, France, May 14-19, [9] R. Ohbuci, H. Masuda, and M. Aono, A shap-preserving data embedding algorithm for NURBS curves and surface, in Proc. of the Computer Graphics Intl., pp , [10] J.J. Lee, N.I. Cho, and J.W. Kim, Watermarking for 3D NURBS graphic data, in Proc. of the IEEE Workshop on Multimedia Signal Processing, pp , [11] L. Guillaume, D. Florent, and B. Atilla, Constant curvature region decomposition of 3d meshes by a mixed approach vertex-triangle, Journal of WSCG, no.1-3, Vol.12, [12] Meyer, M., Desbrun, M., Schröder, P. et al, Discrete Differential-Geometry operators for Triangulated 2-Manifolds. International Workshop on Visualization and Mathematics, Berlin, Germany, 2002.
Adaptive Fuzzy Watermarking for 3D Models
International Conference on Computational Intelligence and Multimedia Applications 2007 Adaptive Fuzzy Watermarking for 3D Models Mukesh Motwani.*, Nikhil Beke +, Abhijit Bhoite +, Pushkar Apte +, Frederick
More information3-D D Digital Watermarking
CORESA 2007, Montpellier 3-D D Digital Watermarking Adrian G. Bors University of York Computer Science Department YORK Y010 5DD, UK adrian.bors@cs.york.ac.uk 9 November 2007 Outline Overview of 3D watermarking
More informationBlind watermarking of 3D shapes using localized constraints
Blind watermarking of 3D shapes using localized constraints Adrian G. Bors Dept. of Computer Science, University of York, York YO DD, U.K. E-mail: adrian.bors@cs.york.ac.uk Abstract This paper develops
More informationThree-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, and Atilla Baskurt 1 1 LIRIS, UMR 5205 CNRS, INSA-Lyon, F-69621 Villeurbanne,
More informationA Developer s Survey of Polygonal Simplification algorithms. CS 563 Advanced Topics in Computer Graphics Fan Wu Mar. 31, 2005
A Developer s Survey of Polygonal Simplification algorithms CS 563 Advanced Topics in Computer Graphics Fan Wu Mar. 31, 2005 Some questions to ask Why simplification? What are my models like? What matters
More informationSpectral Graph-Theoretic Approach to 3D Mesh Watermarking
Spectral Graph-Theoretic Approach to 3D Mesh Watermarking Emad E. Abdallah Department of Computer Science Concordia University, Montreal, Canada ee abdal@cs.concordia.ca A. Ben Hamza and Prabir Bhattacharya
More informationParameterization of Triangular Meshes with Virtual Boundaries
Parameterization of Triangular Meshes with Virtual Boundaries Yunjin Lee 1;Λ Hyoung Seok Kim 2;y Seungyong Lee 1;z 1 Department of Computer Science and Engineering Pohang University of Science and Technology
More informationA 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 1, January 2017 A 3D Mesh Watermarking Based on Improved Vertex Grouping and
More informationTriangular Mesh Segmentation Based On Surface Normal
ACCV2002: The 5th Asian Conference on Computer Vision, 23--25 January 2002, Melbourne, Australia. Triangular Mesh Segmentation Based On Surface Normal Dong Hwan Kim School of Electrical Eng. Seoul Nat
More informationLocal patch blind spectral watermarking method for 3D graphics
Local patch blind spectral watermarking method for 3D graphics Ming Luo 1, Kai Wang 2, Adrian G. Bors 1, and Guillaume Lavoué 2 1 Department of Computer Science, University of York, York YO10 5DD, UK 2
More informationSHAPE SEGMENTATION FOR SHAPE DESCRIPTION
SHAPE SEGMENTATION FOR SHAPE DESCRIPTION Olga Symonova GraphiTech Salita dei Molini 2, Villazzano (TN), Italy olga.symonova@graphitech.it Raffaele De Amicis GraphiTech Salita dei Molini 2, Villazzano (TN),
More informationMesh Repairing and Simplification. Gianpaolo Palma
Mesh Repairing and Simplification Gianpaolo Palma Mesh Repairing Removal of artifacts from geometric model such that it becomes suitable for further processing Input: a generic 3D model Output: (hopefully)a
More informationEnhanced Watermarking Scheme for 3D Mesh Models
Enhanced Watermarking Scheme for 3D Mesh Models Lamiaa Basyoni College of Computing and Information Technology Arab Academy of Science and Technology Cairo, Egypt lamiaa.basyoni@gmail.com H. I. Saleh Radiation
More informationShape Modeling and Geometry Processing
252-0538-00L, Spring 2018 Shape Modeling and Geometry Processing Discrete Differential Geometry Differential Geometry Motivation Formalize geometric properties of shapes Roi Poranne # 2 Differential Geometry
More informationShape fitting and non convex data analysis
Shape fitting and non convex data analysis Petra Surynková, Zbyněk Šír Faculty of Mathematics and Physics, Charles University in Prague Sokolovská 83, 186 7 Praha 8, Czech Republic email: petra.surynkova@mff.cuni.cz,
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationIEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER /$ IEEE
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER 2008 1513 A Comprehensive Survey on Three-Dimensional Mesh Watermarking Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract
More informationProcessing 3D Surface Data
Processing 3D Surface Data Computer Animation and Visualisation Lecture 12 Institute for Perception, Action & Behaviour School of Informatics 3D Surfaces 1 3D surface data... where from? Iso-surfacing
More informationArab Journal of Nuclear Sciences and Applications
Arab J. Nucl. Sci. Appl., Vol. 51, 4, 62-71 (2018) Arab Journal of Nuclear Sciences and Applications ISSN 1110-0451 Web site: ajnsa.journals.ekb.eg (ESNSA) Non-Blind Robust 3D Object Watermarking Scheme
More informationDigital Image Processing Fundamentals
Ioannis Pitas Digital Image Processing Fundamentals Chapter 7 Shape Description Answers to the Chapter Questions Thessaloniki 1998 Chapter 7: Shape description 7.1 Introduction 1. Why is invariance to
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationApplications. Oversampled 3D scan data. ~150k triangles ~80k triangles
Mesh Simplification Applications Oversampled 3D scan data ~150k triangles ~80k triangles 2 Applications Overtessellation: E.g. iso-surface extraction 3 Applications Multi-resolution hierarchies for efficient
More informationMesh Decimation Using VTK
Mesh Decimation Using VTK Michael Knapp knapp@cg.tuwien.ac.at Institute of Computer Graphics and Algorithms Vienna University of Technology Abstract This paper describes general mesh decimation methods
More informationAn Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT
An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of
More informationSurface Topology ReebGraph
Sub-Topics Compute bounding box Compute Euler Characteristic Estimate surface curvature Line description for conveying surface shape Extract skeletal representation of shapes Morse function and surface
More information2) For any triangle edge not on the boundary, there is exactly one neighboring
Triangulating Trimmed NURBS Surfaces Chang Shu and Pierre Boulanger Abstract. This paper describes techniques for the piecewise linear approximation of trimmed NURBS surfaces. The problem, called surface
More informationGeometry Processing & Geometric Queries. Computer Graphics CMU /15-662
Geometry Processing & Geometric Queries Computer Graphics CMU 15-462/15-662 Last time: Meshes & Manifolds Mathematical description of geometry - simplifying assumption: manifold - for polygon meshes: fans,
More informationA STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES. Department of Computer Science, Yale University
A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES Ying Yang Ruggero Pintus, Holly Rushmeier Ioannis Ivrissimtzis Department of Computer Science, Yale University CRS4, Italy School of Engineering and Computing
More informationDigital Image Processing
Digital Image Processing Third Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive PEARSON Prentice Hall Pearson Education International Contents Preface xv Acknowledgments
More informationMesh Morphing. Ligang Liu Graphics&Geometric Computing Lab USTC
Mesh Morphing Ligang Liu Graphics&Geometric Computing Lab USTC http://staff.ustc.edu.cn/~lgliu Morphing Given two objects produce sequence of intermediate objects that gradually evolve from one object
More informationVertex Shuffling : A Novel Information Hiding on 3D Model
Vertex Shuffling : A Novel Information Hiding on 3D Model Cong-Kai Lin, Charlie Irawan Tan, and Wen-Kai Tai Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan,
More informationFiltering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.
Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)
More informationBLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC
BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC 1 Prof. Sharvari C. Tamane, 2 Dr. Ratnadeep R. Deshmukh, 1 MGM s Jawaharlal Nehru Engineering College sharvaree73@yahoo.com
More informationEmbedding Data in 3D Models
Embedding Data in 3D Models Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono ohbuchi@acm.org, masuda@trl.ibm.co.jp, aono@acm.org IBM Japan Tokyo Research Laboratory 1623-14 Shimo-tsuruma, Yamato-shi, Kanagawa,
More informationGeometric Modeling. Bing-Yu Chen National Taiwan University The University of Tokyo
Geometric Modeling Bing-Yu Chen National Taiwan University The University of Tokyo Surface Simplification Motivation Basic Idea of LOD Discrete LOD Continuous LOD Simplification Problem Characteristics
More information3-Dimensional Object Modeling with Mesh Simplification Based Resolution Adjustment
3-Dimensional Object Modeling with Mesh Simplification Based Resolution Adjustment Özgür ULUCAY Sarp ERTÜRK University of Kocaeli Electronics & Communication Engineering Department 41040 Izmit, Kocaeli
More informationFinal Review. Image Processing CSE 166 Lecture 18
Final Review Image Processing CSE 166 Lecture 18 Topics covered Basis vectors Matrix based transforms Wavelet transform Image compression Image watermarking Morphological image processing Segmentation
More informationA General Simplification Algorithm
A General Simplification Algorithm Boštjan Pivec, Vid Domiter Abstract In this article a new general algorithm for triangular mesh simplification is proposed. The algorithm extends Krivograd's work from
More informationSurface Mesh Generation
Surface Mesh Generation J.-F. Remacle Université catholique de Louvain September 22, 2011 0 3D Model For the description of the mesh generation process, let us consider the CAD model of a propeller presented
More informationComparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection
International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 Volume 1 Issue 4 ǁ May 2016 ǁ PP.01-07 Comparative Analysis of 2-Level and 4-Level for Watermarking and Tampering
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationMultiresolution Remeshing Using Weighted Centroidal Voronoi Diagram
Multiresolution Remeshing Using Weighted Centroidal Voronoi Diagram Chao-Hung Lin 1, Chung-Ren Yan 2, Ji-Hsen Hsu 2, and Tong-Yee Lee 2 1 Dept. of Geomatics, National Cheng Kung University, Taiwan 2 Dept.
More informationOutline of the presentation
Surface Reconstruction Petra Surynková Charles University in Prague Faculty of Mathematics and Physics petra.surynkova@mff.cuni.cz Outline of the presentation My work up to now Surfaces of Building Practice
More informationcoding of various parts showing different features, the possibility of rotation or of hiding covering parts of the object's surface to gain an insight
Three-Dimensional Object Reconstruction from Layered Spatial Data Michael Dangl and Robert Sablatnig Vienna University of Technology, Institute of Computer Aided Automation, Pattern Recognition and Image
More informationOutline. Visualization Discretization Sampling Quantization Representation Continuous Discrete. Noise
Fundamentals Data Outline Visualization Discretization Sampling Quantization Representation Continuous Discrete Noise 2 Data Data : Function dependent on one or more variables. Example Audio (1D) - depends
More informationAccepted Manuscript. Optimization approach for 3D model watermarking by linear binary programming. Yu-Ping Wang, Shi-Min Hu
Accepted Manuscript Optimization approach for 3D model watermarking by linear binary programming Yu-Ping Wang, Shi-Min Hu PII: S0167-8396(10)00024-5 DOI: 10.1016/j.cagd.2010.02.003 Reference: COMAID 1208
More informationWavelet-Based Blind Watermarking of 3D Models
Wavelet-Based Blind Watermarking of 3D Models F. Uccheddu Department of Electronic and Telecommunications University of Florence Via S. Marta 3 50139, Firenze, Italy uccheddu@lci.det.unifi.it M. Corsini
More informationChapter 11 Representation & Description
Chain Codes Chain codes are used to represent a boundary by a connected sequence of straight-line segments of specified length and direction. The direction of each segment is coded by using a numbering
More information142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007
142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho, Rémy Prost, and Ho-Youl Jung
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationLASER ADDITIVE MANUFACTURING PROCESS PLANNING AND AUTOMATION
LASER ADDITIVE MANUFACTURING PROCESS PLANNING AND AUTOMATION Jun Zhang, Jianzhong Ruan, Frank Liou Department of Mechanical and Aerospace Engineering and Engineering Mechanics Intelligent Systems Center
More informationFinal Project, Digital Geometry Processing
Final Project, Digital Geometry Processing Shayan Hoshyari Student #: 81382153 December 2016 Introduction In this project an adaptive surface remesher has been developed based on the paper [1]. An algorithm
More informationLecture 8 Object Descriptors
Lecture 8 Object Descriptors Azadeh Fakhrzadeh Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University 2 Reading instructions Chapter 11.1 11.4 in G-W Azadeh Fakhrzadeh
More informationSpectral Watermarking for Parameterized Surfaces
1 Spectral Watermarking for Parameterized Surfaces Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo Abstract This paper presents a blind spectral 2-way watermarking framework for 3D models with parametric
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationIsosurface Rendering. CSC 7443: Scientific Information Visualization
Isosurface Rendering What is Isosurfacing? An isosurface is the 3D surface representing the locations of a constant scalar value within a volume A surface with the same scalar field value Isosurfaces form
More informationProcessing 3D Surface Data
Processing 3D Surface Data Computer Animation and Visualisation Lecture 17 Institute for Perception, Action & Behaviour School of Informatics 3D Surfaces 1 3D surface data... where from? Iso-surfacing
More informationTopic 6 Representation and Description
Topic 6 Representation and Description Background Segmentation divides the image into regions Each region should be represented and described in a form suitable for further processing/decision-making Representation
More informationA Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform
A Robust Hybrid Blind Digital Image System Using Discrete Wavelet Transform and Contourlet Transform Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy Abstract In this paper, a hybrid blind digital
More informationMulti-Scale Free-Form Surface Description
Multi-Scale Free-Form Surface Description Farzin Mokhtarian, Nasser Khalili and Peter Yuen Centre for Vision Speech and Signal Processing Dept. of Electronic and Electrical Engineering University of Surrey,
More informationVoronoi Diagram. Xiao-Ming Fu
Voronoi Diagram Xiao-Ming Fu Outlines Introduction Post Office Problem Voronoi Diagram Duality: Delaunay triangulation Centroidal Voronoi tessellations (CVT) Definition Applications Algorithms Outlines
More informationAUTOMATED 4 AXIS ADAYfIVE SCANNING WITH THE DIGIBOTICS LASER DIGITIZER
AUTOMATED 4 AXIS ADAYfIVE SCANNING WITH THE DIGIBOTICS LASER DIGITIZER INTRODUCTION The DIGIBOT 3D Laser Digitizer is a high performance 3D input device which combines laser ranging technology, personal
More informationWATERMARKING FOR 3D POLYGONS USING WAVELET TRANSFORM AND MODIFIED TRAVELING SALESMAN PROBLEM
Journal of the Operations Research Society of Japan 2009, Vol. 52, No. 4, 402-416 WATERMARKING FOR 3D POLYGONS USING WAVELET TRANSFORM AND MODIFIED TRAVELING SALESMAN PROBLEM Shinichi Murata Yasunari Yoshitomi
More informationA Benchmark for 3D Mesh Watermarking
IEEE INTERNATIONAL CONFERENCE ON SHAPE MODELING AND APPLICATIONS (SMI) 2010 1 A Benchmark for 3D Mesh Watermarking Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1, and Xiyan He 3 1,2
More informationSpectral Coding of Three-Dimensional Mesh Geometry Information Using Dual Graph
Spectral Coding of Three-Dimensional Mesh Geometry Information Using Dual Graph Sung-Yeol Kim, Seung-Uk Yoon, and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oryong-dong, Buk-gu, Gwangju,
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES
ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES 1 Maneet, 2 Prabhjot Kaur 1 Assistant Professor, AIMT/ EE Department, Indri-Karnal, India Email: maneetkaur122@gmail.com 2 Assistant Professor, AIMT/
More informationExtracting Surface Representations From Rim Curves
Extracting Surface Representations From Rim Curves Hai Chen 1, Kwan-Yee K. Wong 2, Chen Liang 2, and Yue Chen 1 1 College of Software Technology, Zhejiang University, Hangzhou, Zhejiang, China 310027 chenhai@gmail.com
More informationMesh Decimation. Mark Pauly
Mesh Decimation Mark Pauly Applications Oversampled 3D scan data ~150k triangles ~80k triangles Mark Pauly - ETH Zurich 280 Applications Overtessellation: E.g. iso-surface extraction Mark Pauly - ETH Zurich
More information05 - Surfaces. Acknowledgements: Olga Sorkine-Hornung. CSCI-GA Geometric Modeling - Daniele Panozzo
05 - Surfaces Acknowledgements: Olga Sorkine-Hornung Reminder Curves Turning Number Theorem Continuous world Discrete world k: Curvature is scale dependent is scale-independent Discrete Curvature Integrated
More informationAdvanced Computer Graphics
Advanced Computer Graphics Lecture 2: Modeling (1): Polygon Meshes Bernhard Jung TU-BAF, Summer 2007 Overview Computer Graphics Icon: Utah teapot Polygon Meshes Subdivision Polygon Mesh Optimization high-level:
More informationA New Constrained Texture Mapping Method
A New Constrained Texture Mapping Method Yan-Wen Guo 1,2,,JinWang 1,Xiu-FenCui 1, and Qun-Sheng Peng 1,2 1 State Key Lab of CAD&CG, Zhejiang University, Hangzhou 310027, China 2 Department of Mathematics,
More informationMulti-view 3D retrieval using silhouette intersection and multi-scale contour representation
Multi-view 3D retrieval using silhouette intersection and multi-scale contour representation Thibault Napoléon Telecom Paris CNRS UMR 5141 75013 Paris, France napoleon@enst.fr Tomasz Adamek CDVP Dublin
More informationCS 523: Computer Graphics, Spring Shape Modeling. Differential Geometry of Surfaces
CS 523: Computer Graphics, Spring 2011 Shape Modeling Differential Geometry of Surfaces Andrew Nealen, Rutgers, 2011 2/22/2011 Differential Geometry of Surfaces Continuous and Discrete Motivation Smoothness
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationTHE HALF-EDGE DATA STRUCTURE MODELING AND ANIMATION
THE HALF-EDGE DATA STRUCTURE MODELING AND ANIMATION Dan Englesson danen344@student.liu.se Sunday 12th April, 2011 Abstract In this lab assignment which was done in the course TNM079, Modeling and animation,
More informationTiling Three-Dimensional Space with Simplices. Shankar Krishnan AT&T Labs - Research
Tiling Three-Dimensional Space with Simplices Shankar Krishnan AT&T Labs - Research What is a Tiling? Partition of an infinite space into pieces having a finite number of distinct shapes usually Euclidean
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationFACET SHIFT ALGORITHM BASED ON MINIMAL DISTANCE IN SIMPLIFICATION OF BUILDINGS WITH PARALLEL STRUCTURE
FACET SHIFT ALGORITHM BASED ON MINIMAL DISTANCE IN SIMPLIFICATION OF BUILDINGS WITH PARALLEL STRUCTURE GE Lei, WU Fang, QIAN Haizhong, ZHAI Renjian Institute of Surveying and Mapping Information Engineering
More informationProcessing 3D Surface Data
Processing 3D Surface Data Computer Animation and Visualisation Lecture 15 Institute for Perception, Action & Behaviour School of Informatics 3D Surfaces 1 3D surface data... where from? Iso-surfacing
More information13.472J/1.128J/2.158J/16.940J COMPUTATIONAL GEOMETRY
13.472J/1.128J/2.158J/16.940J COMPUTATIONAL GEOMETRY Lecture 23 Dr. W. Cho Prof. N. M. Patrikalakis Copyright c 2003 Massachusetts Institute of Technology Contents 23 F.E. and B.E. Meshing Algorithms 2
More informationGenerating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams
Int J Adv Manuf Technol (1999) 15:182 187 1999 Springer-Verlag London Limited Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams Jaehun Jeong and Kwangsoo Kim Department
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationSurfaces: notes on Geometry & Topology
Surfaces: notes on Geometry & Topology 1 Surfaces A 2-dimensional region of 3D space A portion of space having length and breadth but no thickness 2 Defining Surfaces Analytically... Parametric surfaces
More informationParameterization of Meshes
2-Manifold Parameterization of Meshes What makes for a smooth manifold? locally looks like Euclidian space collection of charts mutually compatible on their overlaps form an atlas Parameterizations are
More informationPiecewise Permutation Steganography for 3D Humanoid Mesh Models
Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw
More informationA Constrained Delaunay Triangle Mesh Method for Three-Dimensional Unstructured Boundary Point Cloud
International Journal of Computer Systems (ISSN: 2394-1065), Volume 03 Issue 02, February, 2016 Available at http://www.ijcsonline.com/ A Constrained Delaunay Triangle Mesh Method for Three-Dimensional
More informationCS 523: Computer Graphics, Spring Differential Geometry of Surfaces
CS 523: Computer Graphics, Spring 2009 Shape Modeling Differential Geometry of Surfaces Andrew Nealen, Rutgers, 2009 3/4/2009 Recap Differential Geometry of Curves Andrew Nealen, Rutgers, 2009 3/4/2009
More informationComparison of wavelet based watermarking techniques Using SVD
Comparison of wavelet based watermarking techniques Using SVD Prof.T.Sudha Department of Computer Science Vikrama Simhapuri University Nellore. Email- thatimakula_sudha@yahoo.com Ms. K. Sunitha Head, P.G
More informationTutorial 3 Comparing Biological Shapes Patrice Koehl and Joel Hass
Tutorial 3 Comparing Biological Shapes Patrice Koehl and Joel Hass University of California, Davis, USA http://www.cs.ucdavis.edu/~koehl/ims2017/ What is a shape? A shape is a 2-manifold with a Riemannian
More informationDIGITAL watermarking has been studied over many years
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 15, NO. 2, MARCH/APRIL 2009 285 A New Watermarking Method for 3D Models Based on Integral Invariants Yu-Ping Wang and Shi-Min Hu, Member,
More informationSpectral Surface Reconstruction from Noisy Point Clouds
Spectral Surface Reconstruction from Noisy Point Clouds 1. Briefly summarize the paper s contributions. Does it address a new problem? Does it present a new approach? Does it show new types of results?
More informationSpeech Modulation for Image Watermarking
Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden
More informationHandles. The justification: For a 0 genus triangle mesh we can write the formula as follows:
Handles A handle in a 3d mesh is a through hole. The number of handles can be extracted of the genus of the 3d mesh. Genus is the number of times we can cut 2k edges without disconnecting the 3d mesh.
More informationTechnical Report. Removing polar rendering artifacts in subdivision surfaces. Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin.
Technical Report UCAM-CL-TR-689 ISSN 1476-2986 Number 689 Computer Laboratory Removing polar rendering artifacts in subdivision surfaces Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin June 2007
More informationSurface Simplification Using Quadric Error Metrics
Surface Simplification Using Quadric Error Metrics Authors: Michael Garland & Paul Heckbert Presented by: Niu Xiaozhen Disclaimer: Some slides are modified from original slides, which were designed by
More informationDigital Watermarking with Copyright Authentication for Image Communication
Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com
More informationWatermarking Three-Dimensional Polygonal Models
Watermarking Three-Dimensional Polygonal Models Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono ohbuchi@acm.org, masuda@trl.ibm.co.jp, aono@acm.org IBM Tokyo Research Laboratory 1623-14 Shimo-tsuruma, Yamato-shi
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationBayesian Spherical Wavelet Shrinkage: Applications to Shape Analysis
Bayesian Spherical Wavelet Shrinkage: Applications to Shape Analysis Xavier Le Faucheur a, Brani Vidakovic b and Allen Tannenbaum a a School of Electrical and Computer Engineering, b Department of Biomedical
More information