Academic literature on the topic '3D security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic '3D security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "3D security"

1

Lizée, Pierre P. "Human Security in Vietnam, Laos, and Cambodia." Contemporary Southeast Asia 24, no. 3 (December 2002): 509–27. http://dx.doi.org/10.1355/cs24-3d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jansen, David. "Relations among Security and Law Enforcement Institutions in Indonesia." Contemporary Southeast Asia 30, no. 3 (December 2008): 429–54. http://dx.doi.org/10.1355/cs30-3d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Raval, Dhatri, and Abhilash Shukla. "Security using 3D Password." International Journal of Computer Applications 120, no. 7 (June 18, 2015): 36–38. http://dx.doi.org/10.5120/21242-4024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gabriëlse, Robbert. "A 3D Approach to Security and Development." Connections: The Quarterly Journal 06, no. 2 (2007): 67–74. http://dx.doi.org/10.11610/connections.06.2.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mayer, Frederik, Stefan Richter, Philipp Hübner, Toufic Jabbour, and Martin Wegener. "3D Fluorescence-Based Security Features by 3D Laser Lithography." Advanced Materials Technologies 2, no. 11 (September 21, 2017): 1700212. http://dx.doi.org/10.1002/admt.201700212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gomes de Almeida, Franklin Epiphanio. "3D PRINTING AND NEW SECURITY THREATS." Revista do Instituto Brasileiro de Segurança Pública (RIBSP) 3, no. 7 (September 2, 2020): 197–210. http://dx.doi.org/10.36776/ribsp.v3i7.92.

Full text
Abstract:
The present study is a horizon scanning report based on the British model Sigma Scan. It explores possible future issues and trends in 3D printing and its potential impact on society, particularly with regard to new security threats that its spread is expected to cause. This exercise allows for an examination based on the best predictions of how the future of this disruptive and, at the same time, enabling technology is likely to be, in order to better understand the uncertainties that its development will bring. This report addresses the potential implications of the development of 3D printing, in particular for crimes, the likely early indicators of the development of this technology, the simultaneous developments that can serve as inhibitors and drivers, the potential crime preventers and promoters, and the evidence that indicates the possibility of the predicted events. Keywords: 3D printing, additive manufacturing, disruptive technology, enabling technology, security risks.
APA, Harvard, Vancouver, ISO, and other styles
8

Kirkpatrick, Keith. "3D sensors provide security, better games." Communications of the ACM 61, no. 6 (May 23, 2018): 15–17. http://dx.doi.org/10.1145/3204449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria, and Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application." Symmetry 14, no. 10 (September 30, 2022): 2042. http://dx.doi.org/10.3390/sym14102042.

Full text
Abstract:
Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the security of encryption algorithms is by using 3D designs on symmetric block ciphers. Although a 3D cipher design could improve the algorithms, the existing methods enlarge the block sizes that will also expand the key sizes and encryption rounds, thus decreasing their efficiency. Therefore, we propose the LAO-3D block cipher using a 3D permutation that offers security by providing confusion and diffusion characteristics. Five security analyses were conducted to assess the strengths of LAO-3D. The findings suggest that LAO-3D achieves better results compared to other existing lightweight block ciphers, with 98.2% non-linearity, 50% bit error rates for both plaintext and key modifications, surpasses 100% of the randomness test, and is immune to differential and linear cryptanalysis attacks. Moreover, the block cipher obtains competitive performance results in software applications. From the security analyses and performance tests, it is proven that LAO-3D can provide sufficient security at low costs in mobile encryption applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Kaur, Veerpal, Devershi Pallavi Bhatt, Pradeep Kumar Tiwari, and Sumegh Tharewal. "Blockchain technology combined with the CNN and Hashing algorithms enabled the secure storage of 3D biometric face and ear data." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 729–38. http://dx.doi.org/10.47974/jdmsc-1745.

Full text
Abstract:
The integration of biometrics and blockchain is proposed as a sophisticated and enduring security strategy to protect sensitive information in the digital era. 3D biometric data will not be affected by changes in posture and changes of illumination. This research proposed a security model for 3D multimodal (face and ear). To secure the 3D data uses the convolutional neural networks (CNNs) for 3D image feature extraction based on fusion of 3D face and ear data. Further compare the different hashing algorithms for the security of 3D multimodal Biometric model in Blockchain. This research also compares the different hashing algorithm efficiency and impact of blockchain mechanism on 3D face and ear data.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "3D security"

1

Rolland-Nevière, Xavier. "Tatouage 3D robuste." Thesis, Nice, 2014. http://www.theses.fr/2014NICE4083/document.

Full text
Abstract:
Les modèles 3D sont des contenus précieux très utilisés dans l'industrie, et donc la cible potentielle de piratages. Le tatouage robuste pour les maillages 3D apporte une réponse au problème du traçage de traître. Dans l'état de l'art du domaine, la couche d'adaptation du contenu en particulier est testée face des attaques standards. Une approche robuste à la pose est alors étudiée. Elle utilise une estimation robuste de l'épaisseur, définie comme la distance un nuage de points construits à partir de mesures du diamètre. Les performances expérimentales montrent qu'elle forme un point de départ prometteur pour le tatouage robuste de maillages 3D posés. Pour les maillages statiques, la modulation des distances radiales est une approche efficace du tatouage. Elle a été formulée comme un problème d'optimisation quadratique sous contrainte, dont nous proposons plusieurs extensions : une transformée par étalement, des primitives de référence calculées de manière intégrale, des directions de déplacement arbitraires, et de nouvelles métriques pour minimiser la distorsion perçue par un utilisateur. Des expériences illustrent leurs bénéfices pour le compromis entre la robustesse et la fidélité du tatouage. La sécurité est analysée par l'intermédiaire de deux mécanismes de protection et par une série d'attaques et de contre-Mesures. Un système de resynchronisation est intégré afin d'améliorer la résistance au rognage. Des points de recalage sont insérés dans une configuration spécifique qui porte les informations habituellement éliminées par l'attaque. Au décodage, elles sont récupérées de manière aveugle. Un gain significatif des performances est mesuré expérimentalement
3D models are valuable assets widely used in the industry and likely to face piracy issues. This dissertation deals with robust mesh watermarking that is used for traitor-Tracing. Following a review of state-Of-The-Art 3D watermarking systems, the robustness of several content adaptation transforms are benchmarked. An embedding domain robust against pose is investigated, with a thickness estimation based on a robust distance function to a point cloud constructed from some mesh diameters. A benchmark showcases the performance of this domain that provides a basis for robust watermarking in 3D animations. For static meshes, modulating the radial distances is an efficient approach to watermarking. It has been formulated as a quadratic programming problem minimizing the geometric distortion while embedding the payload in the radial distances. This formulation is leveraged to create a robust watermarking framework, with the integration of the spread-Transform, integral reference primitives, arbitrarily selected relocation directions and alternate metrics to minimize the distortion perceived. Benchmarking results showcase the benefits of these add-Ons w.r.t the fidelity vs. robustness watermarking trade-Off. The watermark security is then investigated with two obfuscation mechanisms and a series of attacks that highlight the remaining limitations. A resynchronization approach is finally integrated to deal with cropping attacks. The resynchronization embeds land-Marks in a configuration that conveys synchronization information that will be lost after cropping. During the decoding, this information is blindly retrieved and significant robustness improvements are achieved
APA, Harvard, Vancouver, ISO, and other styles
2

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Full text
Abstract:
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security alerts data using interactive 3D visuals with an integration of a false alert classifier. The needs analysis of this prototype was based on the suggested needs of network security analyst's tasks as seen in the literatures. The prototype software incorporates various projections of the alert data in 3D displays. The overview was plotted in a 3D plot named as "time series 3D AlertGraph" which was an extension of the 2D histographs into 3D. The 3D AlertGraph was effectively summarised the alerts data and gave the overview of the network security status. Filtering, drill-down and playback of the alerts at variable speed were incorporated to strengthen the analysis. Real-time visual observation was also included. To identify true alerts from all alerts represents the main task of the network security analyst. This prototype software was integrated with a false alert classifier using a classification tree based on C4.5 classification algorithm to classify the alerts into true and false. Users can add new samples and edit the existing classifier training sample. The classifier performance was measured using k-fold cross-validation technique. The results showed the classifier was able to remove noise in the visualisation, thus making the pattern of the true alerts to emerge. It also highlighted the true alerts in the visualisation. Finally, a user evaluation was conducted to find the usability problems in the tool and to measure its effectiveness. The feed backs showed the tools had successfully helped the task of the security analyst and increased the security awareness in their supervised network. From this research, the task of exploring and analysing a large amount of network security data becomes easier and the true attacks can be identified using the prototype visualisation tools. Visualisation techniques and false alert classification are helpful in exploring and analysing network security data.
APA, Harvard, Vancouver, ISO, and other styles
3

Nunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.

Full text
Abstract:
Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of being overlooked and the time span for analyzing it could be too lengthy. One way to address this issue is to employ network security visualization techniques to evaluate security risks and identify malicious activity to help mitigate compromised nodes on a network. The purpose of this thesis is to introduce a visualization framework to help reduce task-completion time, enhance situational awareness, and decrease user error of complex visualizations for network security applications. From the developed framework, three techniques are suggested as contributions using visualization and interaction: (1) Stereoscopic visualization technique aims to increase user awareness of vulnerabilities and malicious attacks, (2) the recommender system aims to ensure efficient navigation in complex 3D environments, and (3) an interaction system aims to assist in usability of visualization environments using Natural User Interfaces (NUIs). To investigate the aforementioned techniques, the following tools were created: 3D Stereoscopic Vulnerability Assessment Tool (3DSVAT), Parallel 3D Coordinate Visualization (P3D), NAVSEC recommender system, and Interaction System for Network Security (InterSec).
APA, Harvard, Vancouver, ISO, and other styles
4

Bishop, Craig, Ian Armstrong, and Rolando Navarette. "A Novel Method for 3D Printing High Conductivity Alloys for UHF Applications." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577400.

Full text
Abstract:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA
Traditional approaches to constructing 3D structural electronics with conductive and dielectric materials include ink-jet printed, silver-bearing ink and fine copper wire meshes. One approach combines stereo-lithographic 3D-printed photo-polymers with direct-printed silver-bearing conductive inks. Results have shown 3D conductive structures with conductivities in the range 2x10⁶ to 1x10⁷ S/m using annealing temperatures ranging from 110°C to 150°C for 10 to 15 minutes. However, the stereo-lithographic approach suffers from the high cost of the printer and structural deformation during annealing. This paper presents a new method for 3d printing high conductivity metal alloys using consumer-grade 3D printer. The design and construction of the necessary modification will be presented in addition to the new 3D design process. The method yields metal structures with expected conductivities exceeding 2.6x10⁶ S/m. The process is performed without an annealing step, so the polymeric structural material is not exposed to high temperatures for any prolonged time. A UHF ISM band antenna is constructed for an RFID application using this method, the antenna performance is measured, and the results are compared simulations in Ansys HFSS. This new method can reduce total cost, and several low melting-point alloys could raise the conductivity.
APA, Harvard, Vancouver, ISO, and other styles
5

Thomas, Andrew Scott. "Exploring the Efficiency of Software-Defined Radios in 3D Heat Mapping." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7754.

Full text
Abstract:
A common method of connecting to the internet is a wireless network. These networks can be monitored to discover the area of their coverage, but commercial receivers don't always provide the most accurate results. A software-defined radio was programmed to sniff wireless signals and tested against a commercial receiver and the results were compared. The results suggest that the software-defined radio performs at least as well as the commercial receiver in distance measurements and significantly better in samples taken per minute. It was determined that the software-defined radio is a viable replacement for a commercial receiver in 3D heat mapping.
APA, Harvard, Vancouver, ISO, and other styles
6

Mouton, Andre. "On artefact reduction, segmentation and classification of 3D computed tomography imagery in baggage security screening." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/8501.

Full text
Abstract:
This work considers novel image-processing and computer-vision techniques to advance the automated analysis of low-resolution, complex 3D volumetric Computed Tomography (CT) imagery obtained in the aviation-security-screening domain. Novel research is conducted in three key areas: image quality improvement, segmentation and classification. A sinogram-completion Metal Artefact Reduction (MAR) technique is presented. The presence of multiple metal objects in the scanning Field of View (FoV) is accounted for via a distance-driven weighting scheme. The technique is shown to perform comparably to the state-of-the-art medical MAR techniques in a quantitative and qualitative comparative evaluation. A materials-based technique is proposed for the segmentation of unknown objects from low-resolution, cluttered volumetric baggage-CT data. Initial coarse segmentations, generated using dual-energy techniques, are refined by partitioning at automatically-detected regions. Partitioning is guided by a novel random-forestbased quality metric (trained to recognise high-quality, single-object segments). A second segmentation-quality measure is presented for quantifying the quality of full segmentations. In a comparative evaluation, the proposed method is shown to produce similar-quality segmentations to the state-of-the-art at reduced processing times. A codebook model constructed using an Extremely Randomised Clustering (ERC) forest for feature encoding, a dense-feature-sampling strategy and a Support Vector Machine (SVM) classifier is presented. The model is shown to offer improvements in accuracy over the state-of-the-art 3D visual-cortex model at reduced processing times, particularly in the presence of noise and artefacts. The overall contribution of this work is a novel, fully-automated and effcient framework for the classification of objects in cluttered 3D baggage-CT imagery. It extends the current state-of-the-art by improving classification performance in the presence of noise and artefacts; by automating the previously-manual isolation of objects and by decreasing processing times by several orders of magnitude.
APA, Harvard, Vancouver, ISO, and other styles
7

Norwood, Charles Ellis. "Demonstration of Vulnerabilities in Globally Distributed Additive Manufacturing." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99104.

Full text
Abstract:
Globally distributed additive manufacturing is a relatively new frontier in the field of product lifecycle management. Designers are independent of additive manufacturing services, often thousands of miles apart. Manufacturing data must be transmitted electronically from designer to manufacturer to realize the benefits of such a system. Unalterable blockchain legers can record transactions between customers, designers, and manufacturers allowing each to trust the other two without needing to be familiar with each other. Although trust can be established, malicious printers or customers still have the incentive to produce unauthorized or pirated parts. To prevent this, machine instructions are encrypted and electronically transmitted to the printing service, where an authorized printer decrypts the data and prints an approved number of parts or products. The encrypted data may include G-Code machine instructions which contain every motion of every motor on a 3D printer. Once these instructions are decrypted, motor drivers send control signals along wires to the printer's stepper motors. The transmission along these wires is no longer encrypted. If the signals along the wires are read, the motion of the motor can be analyzed, and G-Code can be reverse engineered. This thesis demonstrates such a threat through a simulated attack on a G-Code controlled device. A computer running a numeric controller and G-Code interpreter is connected to standard stepper motors. As G-Code commands are delivered, the magnetic field generated by the transmitted signals is read by a Hall Effect sensor. The rapid oscillation of the magnetic field corresponds to the stepper motor control signals which rhythmically move the motor. The oscillating signals are recorded by a high speed analog to digital converter attached to a second computer. The two systems are completely electronically isolated. The recorded signals are saved as a string of voltage data with a matching time stamp. The voltage data is processed through a Matlab script which analyzes the direction the motor spins and the number of steps the motor takes. With these two pieces of data, the G-Code instructions which produced the motion can be recreated. The demonstration shows the exposure of previously encrypted data, allowing for the unauthorized production of parts, revealing a security flaw in a distributed additive manufacturing environment.
Master of Science
Developed at the end of the 20th century, additive manufacturing, sometimes known as 3D printing, is a relatively new method for the production of physical products. Typically, these have been limited to plastics and a small number of metals. Recently, advances in additive manufacturing technology have allowed an increasing number of industrial and consumer products to be produced on demand. A worldwide industry of additive manufacturing has opened up where product designers and 3D printer operators can work together to deliver products to customers faster and more efficiently. Designers and printers may be on opposite sides of the world, but a customer can go to a local printer and order a part designed by an engineer thousands of miles away. The customer receives a part in as little time as it takes to physically produce the object. To achieve this, the printer needs manufacturing information such as object dimensions, material parameters, and machine settings from the designer. The designer risks unauthorized use and the loss of intellectual property if the manufacturing information is exposed. Legal protections on intellectual property only go so far, especially across borders. Technical solutions can help protect valuable IP. In such an industry, essential data may be digitally encrypted for secure transmission around the world. This information may only be read by authorized printers and printing services and is never saved or read by an outside person or computer. The control computers which read the data also control the physical operation of the printer. Most commonly, electric motors are used to move the machine to produce the physical object. These are most often stepper motors which are connected by wires to the controlling computers and move in a predictable rhythmic fashion. The signals transmitted through the wires generate a magnetic field, which can be detected and recorded. The pattern of the magnetic field matches the steps of the motors. Each step can be counted, and the path of the motors can be precisely traced. The path reveals the shape of the object and the encrypted manufacturing instructions used by the printer. This thesis demonstrates the tracking of motors and creation of encrypted machine code in a simulated 3D printing environment, revealing a potential security flaw in a distributed manufacturing system.
APA, Harvard, Vancouver, ISO, and other styles
8

Peña, Guevara Javier Nilo, Acuña Leslie Dueñas, and Lynch Oscar Dupuy. "Distribuidores exclusivos de la marca MADPAX en el Perú." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/626040.

Full text
Abstract:
Esta investigación plantea un escenario de negocio de importación de ventas minorista, dónde la idea del negocio es distribuir de manera exclusiva una marca de mochilas con modelos innovadores líder en el mercado extranjero al mercado nacional, a fin de poder construir una identidad que sitúe la marca en el top of mind de nuestro mercado objetivo. Este trabajo está estructurado con los siguientes temas que representan cada uno un capítulo de esta investigación los cuales son: los aspectos generales del negocio con visión global, planeamiento estratégico analizando los factores internos y externos, investigación y validación del mercado objetivo, plan de marketing y publicidad de la marca, planeamiento de las operaciones de importación, estructura organizacional y recursos humanos, y el plan económico del financiamiento. El objetivo es comprobar la viabilidad de este negocio a través de un examen detallado de indicadores relevantes que nos permitan mostrar la rentabilidad del proyecto propuesto.
This research covers an import business of retail, which the aim idea is the exclusive distribution of the most important foreign brand of innovate backpacks to the national market and lastly make an identity to put us in the target market’s top of mind. This project contains these important topics which represent each chapter like: General aspects of global business, strategic plan about the thorough analysis of the internal and external factors, target market research and work out, advertising plan of brand, import operations plan, organizational structure and human resources, ultimately financial economic plan. The main focus is proving the feasibility of this business through a detailed examination of relevant indicators which show the proposed project profitability.
Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
9

Beugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.

Full text
Abstract:
Avec l'augmentation des échanges de données et les évolutions technologiques et sociales récentes, les contenus multimédias prennent une place importante dans le trafic mondial. Aujourd'hui, les objets 3D sont utilisés dans un large nombre d'applications, par exemple, les applications médicales, les simulations, les jeux vidéo, l'animation et les effets spéciaux. La consommation d'objets 3D par le grand public est devenue un marché lucratif pouvant prendre la forme de plateformes de téléchargement d'objets 3D dans différents formats.Cette thèse, en collaboration avec la société STRATEGIES, concerne la protection des objets 3D, et plus particulièrement des maillages 3D contre des utilisations frauduleuses et illégales. Ces maillages 3D représentent de manière surfacique des modèles de chaussures et de maroquineries produits par les clients à l'aide des solutions numériques proposées par la société STRATEGIES. Dans un premier temps, nous proposons une nouvelle méthode d'insertion de données cachées bien plus efficace en termes de temps d'exécution sur des maillages de très grande taille que la méthode précédente développée en collaboration avec la société STRATÉGIES. Nous explorons également des approches de chiffrement sélectif pour le contrôle d'accès aux contenus de très haute qualité selon les besoins des utilisateurs. Dans ce contexte, nous proposons d'utiliser des approches de chiffrement sélectif sur les données géométriques des objets 3D afin de protéger le contenu visuel de ces derniers selon différents cas d'utilisation et différentes représentations de ces données.Dans un second axe de recherche, nous étudions l'application des processus de partage de secret au domaine des objets 3D. Le partage de secret est une approche cherchant à diviser un contenu secret entre plusieurs utilisateurs et autorisant certains sous-groupes d'utilisateurs à reconstruire le secret. Le partage de secret est un système de redondance permettant de reconstruire le secret même si certains utilisateurs ont perdu leurs informations. Le partage d'objet 3D secret est un domaine de recherche peu étudié permettant de protéger un objet 3D entre des collaborateurs. Nous proposons des nouvelles méthodes de partage d'objet 3D secret utilisant les approches de chiffrement sélectif et proposant des propriétés hiérarchiques où les utilisateurs possèdent des droits d'accès différents au contenu 3D en fonction de leur position dans une structure hiérarchique.Enfin, le troisième axe de recherche développé dans ces travaux de thèse porte sur l'analyse de la confidentialité visuelle des objets 3D sélectivement chiffrés plus ou moins fortement. En effet, en fonction du scénario, nos méthodes de chiffrement sélectif d'objets 3D fournissent des résultats pouvant être plus ou moins reconnaissables par les utilisateurs. Cependant, les métriques utilisées pour l'évaluation de la qualité des objets 3D ne permettent pas de distinguer deux objets 3D chiffrés sélectivement avec des niveaux de confidentialité différents. Pour cela, nous présentons la construction d’une base de données d'objets 3D chiffrés sélectivement afin de réaliser des évaluations subjectives de la confidentialité visuelle et tentons de construire une nouvelle métrique corrélée à des évaluations obtenues par le système visuel humain
With the increase of data exchange and latest technological and social developments, multimedia contents are becoming an important part of global trafic. Today, 3D objects are used in a large number of applications, for example, medical applications, simulations, video games, animation and special effects. 3D object usage by the general public has become a lucrative market that can take the form of 3D object downloading platforms with various 3D formats.This thesis, in collaboration with the company STRATEGIES, concerns the 3D object protection, and more particularly 3D meshes against fradulent and illegal uses. These 3D meshes represent surface models of shoes and leather goods produced by customers using digital solutions proposed by STRATEGIES. First, we propose a new method to insert secret data much more efficiently in terms of execution time on very large meshes than the previous method developed in collaboration with the company STRATEGIES. We are also exploring selective encryption approaches to control access to very high quality content according to user needs. In this context, we propose to use selective encryption approaches on the geometric data of 3D objects in order to protect the visual content of these objects according to different use cases and different data representations.In a second research axis, we study the application of secret sharing methods to the domain of 3D objects. Secret sharing is an approach that seeks to divide secret content between multiple users and allows certain subgroups of users to reconstruct the secret. Secret sharing is a redundancy system that allows you to reconstruct the secret even if some users have lost their information. Secret 3D object sharing is a poorly researched domain used to protect a 3D object between collaborators. We propose new secret 3D object sharing methods using selective encryption approaches and providing hierarchical properties where users have different access rights to 3D content based on their position in a hierarchical structure.Finally, the third research axis developed in this thesis deals with the analysis of the visual confidentiality of 3D objects selectively encrypted more or less strongly. Indeed, depending on the scenario, our 3D selective encryption methods provide results that can be more or less recognizable by users. However, the metrics used to evaluate the quality of 3D objects do not distinguish two selectively encrypted 3D objects with different levels of confidentiality. So, we present the construction of a databse of selectively encrypted 3D objects in order to realize subjective assessments of visual confidentiality and try to build a new metric correlated with evaluations obtained by the human visual system
APA, Harvard, Vancouver, ISO, and other styles
10

Itier, Vincent. "Nouvelles méthodes de synchronisation de nuages de points 3D pour l'insertion de données cachées." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS017/document.

Full text
Abstract:
Cette thèse aborde les problèmes liés à la protection de maillages d'objets 3D. Ces objets peuvent, par exemple, être créés à l'aide d'outil de CAD développés par la société STRATEGIES. Dans un cadre industriel, les créateurs de maillages 3D ont besoin de disposer d'outils leur permettant de vérifier l'intégrité des maillages, ou de vérifier des autorisations pour l'impression 3D par exemple. Dans ce contexte nous étudions l'insertion de données cachées dans des maillages 3D. Cette approche permet d'insérer de façon imperceptible et sécurisée de l'information dans un maillage. Il peut s'agir d'un identifiant, de méta-informations ou d'un contenu tiers, par exemple, pour transmettre de façon secrète une texture. L'insertion de données cachées permet de répondre à ces problèmes en jouant sur le compromis entre la capacité, l'imperceptibilité et la robustesse. Généralement, les méthodes d'insertion de données cachées se composent de deux phases, la synchronisation et l'insertion. La synchronisation consiste à trouver et ordonner les éléments disponibles pour l'insertion. L'un des principaux challenges est de proposer une méthode de synchronisation 3D efficace qui définit un ordre sur les composants des maillages. Dans nos travaux, nous proposons d'utiliser les sommets du maillage, plus précisément leur représentation géométrique dans l'espace comme composants de base pour la synchronisation et l'insertion. Nous présentons donc trois nouvelles méthodes de synchronisation de la géométrie des maillages basées sur la construction d'un chemin hamiltonien dans un nuage de sommets. Deux de ces méthodes permettent de manière conjointe de synchroniser les sommets et de cacher un message. Cela est possible grâce à deux nouvelles méthodes d'insertion haute capacité (de $3$ à $24$ bits par sommet) qui s'appuient sur la quantification des coordonnées. Dans ces travaux nous mettons également en évidence les contraintes propres à ce type de synchronisation. Nous discutons des différentes approches proposées dans plusieurs études expérimentales. Nos travaux sont évalués sur différents critères dont la capacité et l'imperceptibilité de la méthode d'insertion. Nous portons également notre attention aux aspects sécurité des méthodes
This thesis addresses issues relating to the protection of 3D object meshes. For instance, these objects can be created using CAD tool developed by the company STRATEGIES. In an industrial context, 3D meshes creators need to have tools in order to verify meshes integrity, or check permission for 3D printing for example.In this context we study data hiding on 3D meshes. This approach allows us to insert information in a secure and imperceptible way in a mesh. This may be an identifier, a meta-information or a third-party content, for instance, in order to transmit secretly a texture. Data hiding can address these problems by adjusting the trade-off between capacity, imperceptibility and robustness. Generally, data hiding methods consist of two stages, the synchronization and the embedding. The synchronization stage consists of finding and ordering available components for insertion. One of the main challenges is to propose an effective synchronization method that defines an order on mesh components. In our work, we propose to use mesh vertices, specifically their geometric representation in space, as basic components for synchronization and embedding. We present three new synchronisation methods based on the construction of a Hamiltonian path in a vertex cloud. Two of these methods jointly perform the synchronization stage and the embedding stage. This is possible thanks to two new high-capacity embedding methods (from 3 to 24 bits per vertex) that rely on coordinates quantization. In this work we also highlight the constraints of this kind of synchronization. We analyze the different approaches proposed with several experimental studies. Our work is assessed on various criteria including the capacity and imperceptibility of the embedding method. We also pay attention to security aspects of the proposed methods
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "3D security"

1

Koschan, Andreas, Marc Pollefeys, and Mongi Abidi, eds. 3D Imaging for Safety and Security. Dordrecht: Springer Netherlands, 2007. http://dx.doi.org/10.1007/978-1-4020-6182-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Edited by Society of Photo-optical Instrumentation Engineers. Bellingham, Wash: SPIE, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Koschan, Andreas, Marc Pollefeys, and Mongi Abidi. 3D Imaging for Safety and Security. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

3d Imaging For Safety And Security. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koschan, Andreas, Marc Pollefeys, and Mongi Abidi. 3D Imaging for Safety and Security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Blokdyk, Gerardus. 3D Security a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Strategic Thinking In 3d A Guide For National Security Foreign Policy And Business Professionals. Potomac Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Security In Virtual Worlds 3d Webs And Immersive Environments Models For Development Interaction And Management. Information Science Publishing, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schmitt, Gary J., and Abram N. Shulsky. Silent Warfare: Understanding the World of Intelligence, 3d Edition. 3rd ed. Potomac Books Inc., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Government, U. S., U. S. Military, and Department of Defense. Additive Manufacturing: Preparing for the Reality of Science Fiction, Emerging Technologies and Homeland Security Public Policy, 3D Printers and Autonomous Vehicles, Unmanned Aerial Systems, Drones. Independently Published, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "3D security"

1

Bajpai, Shrish, and Divya Sharma. "Moving towards 3D-biometric." In Digital Image Security, 76–92. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003468974-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Yanming, Wei Zhou, Xuefei Yin, and Jiankun Hu. "3D Fingerprint." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1513-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, David, and Xu Liang. "3D Palmprint." In Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1502-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Castiglione, Aniello, Michele Nappi, Fabio Narducci, and Chiara Pero. "3D Face." In Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1501-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Susilo, Willy, Yang-Wai Chow, and Hua-Yu Zhou. "STE3D-CAP: Stereoscopic 3D CAPTCHA." In Cryptology and Network Security, 221–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17619-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xiang, Xuyu, Qiang Liu, Jiaohua Qin, and Yun Tan. "3D Coverless Image Steganography Scheme Based on 3D Slice Technology." In Advances in Artificial Intelligence and Security, 291–300. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78621-2_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Surman, Phil, Ian Sexton, Klaus Hopf, Richard Bates, and Wing Kai Lee. "Head Tracked 3D Displays." In Multimedia Content Representation, Classification and Security, 769–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11848035_101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Song, Hwanjong, Ukil Yang, and Kwanghoon Sohn. "3D Face Recognition under Pose Varying Environments." In Information Security Applications, 333–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nakahara, Jorge. "3D: A Three-Dimensional Block Cipher." In Cryptology and Network Security, 252–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89641-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Lei, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta. "Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function." In Advances in Information and Computer Security, 170–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34117-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "3D security"

1

Parker, Grant, Eric MacDonald, Theo Zinner, and Mark Yampolskiy. "3D-Mold'ed In-Security." In ASIA CCS '22: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3494107.3522776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, X., S. Miller, M. Kwan, and I. C. Smith. "A high resolution 3D laser camera for 3D object digitization." In Defense and Security, edited by Gary W. Kamerman. SPIE, 2005. http://dx.doi.org/10.1117/12.602904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haefner, David P., Bradley L. Preece, Joshua M. Doe, and Stephen D. Burks. "Spatially resolved 3D noise." In SPIE Defense + Security, edited by Gerald C. Holst and Keith A. Krapels. SPIE, 2016. http://dx.doi.org/10.1117/12.2222905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Edgar, Matthew P., Baoqing Sun, Richard Bowman, Stephen S. Welsh, and Miles J. Padgett. "3D computational ghost imaging." In SPIE Security + Defence, edited by Keith L. Lewis, Richard C. Hollins, Thomas J. Merlet, Mark T. Gruneisen, Miloslav Dusek, John G. Rarity, and Edward M. Carapezza. SPIE, 2013. http://dx.doi.org/10.1117/12.2032739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stern, Jonathan M., and Volkan H. Ozguz. "3D system architectures." In Defense and Security Symposium, edited by Ravindra A. Athale and John C. Zolper. SPIE, 2006. http://dx.doi.org/10.1117/12.667381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kawakita, Masahiro, Sabri Gurbuz, Shoichiro Iwasawa, Roberto Lopez-Gulliver, Sumio Yano, Hiroshi Ando, and Naomi Inoue. "3D video capturing for multiprojection type 3D display." In SPIE Defense, Security, and Sensing, edited by Bahram Javidi and Jung-Young Son. SPIE, 2011. http://dx.doi.org/10.1117/12.887135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Geng, Jason, Ping Zhuang, Patrick May, Steven Yi, and David Tunnell. "3D FaceCam: a fast and accurate 3D facial imaging device for biometrics applications." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.542208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Straub, Jeremy. "Identifying positioning-based attacks against 3D printed objects and the 3D printing process." In SPIE Defense + Security, edited by Mohammad S. Alam. SPIE, 2017. http://dx.doi.org/10.1117/12.2264671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bock, Robert. "Low-cost 3D security camera." In Autonomous Systems: Sensors, Vehicles, Security and the Internet of Everything, edited by Michael C. Dudzik and Jennifer C. Ricklin. SPIE, 2018. http://dx.doi.org/10.1117/12.2305455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Knight, Chad, Jake Gunther, and Todd Moon. "Model-based 3D SAR reconstruction." In SPIE Defense + Security, edited by Edmund Zelnio and Frederick D. Garber. SPIE, 2014. http://dx.doi.org/10.1117/12.2050832.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "3D security"

1

Nielsen, Roy S. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan. Office of Scientific and Technical Information (OSTI), March 2015. http://dx.doi.org/10.2172/1171665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Birch, Gabriel Carisle, Amber Lynn Dagel, Brian A. Kast, and Collin S. Smith. 3D Imaging with Structured Illumination for Advanced Security Applications. Office of Scientific and Technical Information (OSTI), September 2015. http://dx.doi.org/10.2172/1221516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Warner, David K., Brian Scott Dickens, Donovan J. Heimer, and Ryan Knudsen. Interactive 3D Models and Simulations for Nuclear Security Education, Training, and Analysis. Office of Scientific and Technical Information (OSTI), November 2017. http://dx.doi.org/10.2172/1407852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ruby, Jeffrey, Richard Massaro, John Anderson, and Robert Fischer. Three-dimensional geospatial product generation from tactical sources, co-registration assessment, and considerations. Engineer Research and Development Center (U.S.), February 2023. http://dx.doi.org/10.21079/11681/46442.

Full text
Abstract:
According to Army Multi-Domain Operations (MDO) doctrine, generating timely, accurate, and exploitable geospatial products from tactical platforms is a critical capability to meet threats. The US Army Corps of Engineers, Engineer Research and Development Center, Geospatial Research Laboratory (ERDC-GRL) is carrying out 6.2 research to facilitate the creation of three-dimensional (3D) products from tactical sensors to include full-motion video, framing cameras, and sensors integrated on small Unmanned Aerial Systems (sUAS). This report describes an ERDC-GRL processing pipeline comprising custom code, open-source software, and commercial off-the-shelf (COTS) tools to geospatially rectify tactical imagery to authoritative foundation sources. Four datasets from different sensors and locations were processed against National Geospatial-Intelligence Agency–supplied foundation data. Results showed that the co-registration of tactical drone data to reference foundation varied from 0.34 m to 0.75 m, exceeding the accuracy objective of 1 m described in briefings presented to Army Futures Command (AFC) and the Assistant Security of the Army for Acquisition, Logistics and Technology (ASA(ALT)). A discussion summarizes the results, describes steps to address processing gaps, and considers future efforts to optimize the pipeline for generation of geospatial data for specific end-user devices and tactical applications.
APA, Harvard, Vancouver, ISO, and other styles
5

Strutynska, Oksana V., Grygoriy M. Torbin, Mariia A. Umryk, and Roman M. Vernydub. Digitalization of the educational process for the training of the pre-service teachers. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4437.

Full text
Abstract:
According to the Development Concept of the Digital Economy and Society in Ukraine, the priority of this area is to develop a substantial national policy on digitalization of education, as this is the key part of the education reform in Ukraine. For this reason, universities should firstly take into account the particularities of teaching the current generation of students and the needs of the digital society as a whole. This paper considers the process of transition from informatization to digitalization in society, implementation of digital support for the educational process in the university, development of the digital educational environment for the training university teachers, and proposes the digital tools for such an environment. The authors propose several ways to improve the development level of digitalization of the educational environment in the university. This is to take into account the needs of the digital society and the modern generation of students, provide a high level of the digital literacy formation of university graduates and support the development of a new digital security system of the modern university. Aiming to design the digital educational environment for increasing the of educators’ digital literacy level, the authors propose to develop and implement the following computer, multimedia and computer-based learning tools and equipment, which includes blended and distance learning classes, cloud technologies, tools of virtual and augmented reality, tools for gamification of the educational process, educational robotics, tools for learning 3D technologies, MOOCs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography