[1] KARIYA K. The next generation EDA system for 3D printing technologies[C]// 2017 International Conference on Electronics Packaging (ICEP). 2017:3-4.
[2] 周立. 基于小波变换的二值图像数字水印算法研究与实现[D]. 武汉:中南民族大学, 2011.
[3] 安新辰,倪蓉蓉,赵耀. 基于网格细分和边界自适应的三维模型可见水印[J]. 应用科学学报, 2016,34(5):503-514.
[4] KIM K, BARNI M, TAN H Z. Roughness-adaptive 3-D watermarking based on masking effect of surface roughness[J]. IEEE Transactions on Information Forensics & Security, 2010,5(4):721-733.
[5] 段晓杰,张绍成,曲大鹏,等. 基于混沌和小波变换系数的数字图像水印算法[J]. 计算机技术与发展, 2015,25(10):34-37.
[6] 王洪涛,荆园园. 基于特征点混沌算法的农产品图像数字水印实现[J]. 江苏农业科学, 2017,45(4):179-182.
[7] 兀旦晖,郑恩让. 图像水印技术在图像加密中的应用研究[J]. 自动化博览, 2019(2):92-95.
[8] 李伟岸,熊祥光,夏道勋. 基于超混沌和Slant变换的鲁棒水印算法[J]. 计算机工程与科学, 2020,42(5):812-818.
[9] JE S T, ALAWIDA M, YOU C S. Implementation and practical problems of chaos-based cryptography revisited[J]. Journal of Information Security and Applications, 2020,50:102421.
[10]吴海辉,樊庆林,王虎. TrueType字体技术的研究分析与应用[J]. 电脑知识与技术(学术交流), 2007(3):783-784.
[11]LIU J, WANG Y H, LI Y, et al. A robust and blind 3D watermarking algorithm using multiresolution adaptive parameterization of surface[J]. Neurocomputing, 2017,237:304-315.
[12]FENG G R, JIANG L G, HE C, et al. A novel algorithm for embedding and detecting digital watermarks[C]// 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’03). 2003, DOI: 10.1109/ICASSP.2003.1199533.
[13]巨文虎. 基于GB2312编码双点阵字体模块的实现[J]. 计算机与信息技术, 2012,20(1):13-15.
[14]张弘,兰孝奇. 一种基于边折叠的改进三角网格简化方法[J]. 工程勘察, 2014,42(10):48-51.
[15]韩雪娟,李国东. 动态猫变换和混沌映射的图像加密算法[J]. 计算机工程与设计, 2020,41(8):2381-2387.
[16]JOSHI A B, KUMAR D, GAFFAR A, et al. Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform[J]. Optics and Lasers in Engineering, 2020,133:106139.
[17]郑继明,汤智睿,邓建秀,等. 基于Logistic混沌映射的数字图像加密算法[J]. 科技与创新, 2018(18):8-11.
[18]吴昊. 基于混沌系统的数字图像加密算法分析与设计[D]. 重庆:重庆大学, 2017.
[19]张朝辉,刘文予,郑玉婷,等. 局部集的3D模型水印方法[J]. 中国图象图形学报, 2009,14(7):1298-1306.
[20]金显华,睢丹. 基于拟蒙特卡罗和Taubin平滑的三维图像重构算法[J]. 微电子学与计算机, 2015(8):163-166.
[21]HU R, XIE L, YU H M, et al. Applying 3D polygonal mesh watermarking for transmission security protection through sensor networks[J]. Mathematical Problems in Engineering: Theory, Methods and Applications, 2014(Pt.1):305960.1-305960.12.
[22]CHOI H I, KIM T W, KWON S H, et al. Digital watermarking of polygonal meshes with linear operators of scale functions[J]. Computer-aided Design, 2010,42(3):163-172.
[23]FENG X Q, ZHANG W Y, LIU Y N. Double watermarks of 3D mesh model based on feature segmentation and redundancy information[J]. Multimedia Tools and Applications, 2014,68(3):497-515.
|