Academic literature on the topic 'Draco compression'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Draco compression.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Draco compression"
Van Rensburg, Bianca Jansen, William Puech, and Jean-Pierre Pedeboy. "The First Draco 3D Object Crypto-Compression Scheme." IEEE Access 10 (2022): 10566–74. http://dx.doi.org/10.1109/access.2022.3144533.
Full textMahendra Suthar, Rui Dai, Junjie Zhang, Sasu Tarkoma, and Ian F. Akyildiz. "Multi-codec rate adaptive point cloud streaming for holographic-type communication." ITU Journal on Future and Evolving Technologies 4, no. 4 (November 29, 2023): 590–603. http://dx.doi.org/10.52953/bdsp2843.
Full textWang, Qiang, Liuyang Jiang, Xuebin Sun, Jingbo Zhao, Zhaopeng Deng, and Shizhong Yang. "An Efficient LiDAR Point Cloud Map Coding Scheme Based on Segmentation and Frame-Inserting Network." Sensors 22, no. 14 (July 7, 2022): 5108. http://dx.doi.org/10.3390/s22145108.
Full textBai, Shengyu, Chen Ma, Xinjun Wang, Shaolong Zhou, Hongyu Jiang, Ling Ma, and Huiqin Jiang. "Application of Medical Image 3D Visualization Web Platform in Auxiliary Diagnosis and Preoperative Planning." Journal of Image and Graphics 11, no. 1 (March 2023): 32–39. http://dx.doi.org/10.18178/joig.11.1.32-39.
Full textKormendy, John, and K. C. Freeman. "Scaling Laws for Dark Matter Halos in Late-Type and Dwarf Spheroidal Galaxies." Symposium - International Astronomical Union 220 (2004): 377–97. http://dx.doi.org/10.1017/s0074180900183706.
Full textYing, Jingwei, Zewen Han, Luming Shen, and Wengui Li. "Influence of Parent Concrete Properties on Compressive Strength and Chloride Diffusion Coefficient of Concrete with Strengthened Recycled Aggregates." Materials 13, no. 20 (October 16, 2020): 4631. http://dx.doi.org/10.3390/ma13204631.
Full textDelic-Nikolić, Ivana, Lidja Kurešević, and Olivera Vušović. "Diabase from Drača open pit mine in central Serbia - quality assessment for building stone purposes." IOP Conference Series: Earth and Environmental Science 906, no. 1 (November 1, 2021): 012013. http://dx.doi.org/10.1088/1755-1315/906/1/012013.
Full textShan, Bowei, and Yong Fang. "DRAC: a delta recurrent neural network-based arithmetic coding algorithm for edge computing." Complex & Intelligent Systems, July 5, 2021. http://dx.doi.org/10.1007/s40747-021-00455-1.
Full textChen, Tao, Lamei Li, Anni Yang, Hui Huang, Ganwei Shi, Feng Li, Wenhua Li, et al. "Incidence of Distal Radial Artery Occlusion and its Influencing Factors After Cardiovascular Intervention Via the Distal Transradial Access." Journal of Endovascular Therapy, October 31, 2023. http://dx.doi.org/10.1177/15266028231208638.
Full textDissertations / Theses on the topic "Draco compression"
Jansen, van rensburg Bianca. "Sécurisation des données 3D par insertion de données cachées et par chiffrement pour l'industrie de la mode." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMONS044.
Full textOver the last few decades, 3D objects have become an essential part of everyday life, in both private and professional contexts. These 3D objects are often stored on the cloud and transferred over networks many times during their existence, where they are susceptible to malicious attacks. Therefore, 3D object security, such as encryption or data hiding, is essential. Encryption is used to protect the visual confidentiality of the 3D object's content. Selective encryption schemes can also be used, where part of a component, such as a part of each vertex, is encrypted. Data hiding is generally used to protect the copyright or the authenticity of the 3D object. However, when a 3D object is encrypted, a third party such as a server may need to embed data in the confidential 3D object. In this case, data hiding in the encrypted domain is performed. In many applications, 3D objects often consist of millions of vertices, and so storing and sharing them online is expensive, time consuming and not environmentally friendly. Consequently, 3D object compression is essential. In this work, we present three contributions in different research areas. First, we present our work on a new method to obtain a watermarked 3D object from high-capacity data hiding in the encrypted domain. Based on the homomorphic properties of the Paillier cryptosystem, our proposed method allows us to embed several secret messages in the encrypted domain with a high-capacity. These messages can be extracted in the plaintext domain after the 3D object decryption. To the best of our knowledge, we are the first to propose a data hiding method in the encrypted domain where the high-capacity watermark is conserved in the plaintext domain after the 3D object is decrypted. The encryption and the data hiding in the encrypted domain are format compliant and without size expansion, despite the use of the Paillier cryptosystem. Then, we present our work on an evaluation metric for the visual security level of selectively encrypted 3D objects. We present a new dataset composed of evaluated selectively encrypted 3D objects. We propose a model to determine the security parameters according to a desired security level. Finally, we detail our proposed 3DVS score which serves to measure the visual security level of selectively encrypted 3D objects. We also present a method which allows us to hierarchically decrypt an encrypted 3D object according to a generated ring of keys. This ring consists of a set of keys that allow a stronger or weaker decryption of the encrypted 3D object. Each hierarchically decrypted 3D object has a different visual security level, where the 3D object is more or less visually accessible. Our method is essential when it comes to preventing trade secrets from being leaked from within a company or by exterior attackers. It is also ecologically friendly and more secure than traditional selective encryption methods. Finally, we present our work on joint security and compression methods based on Google's 3D object compression method Draco, where we integrate a security step in Draco, which is becoming the new industry standard. These security steps are encryption, selective encryption and watermarking
Mrázek, Zdeněk. "Snímání a zpracování digitálních obrazů s vysokým dynamickým rozsahem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-241953.
Full textBook chapters on the topic "Draco compression"
de Hoog, Jens, Ahmed N. Ahmed, Ali Anwar, Steven Latré, and Peter Hellinckx. "Quality-Aware Compression of Point Clouds with Google Draco." In Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 227–36. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89899-1_23.
Full textConference papers on the topic "Draco compression"
van Rensburg, Bianca Jansen, Adrian G. Bors, William Puech, and Jean-Pierre Pedeboy. "Simultaneous Watermarking and Draco 3D Object Compression Method." In 2023 IEEE International Conference on Image Processing (ICIP). IEEE, 2023. http://dx.doi.org/10.1109/icip49359.2023.10222430.
Full textvan Rensburg, Bianca Jansen, William Puech, and Jean-Pierre Pedeboy. "Draco-Based Selective Crypto-Compression Method of 3D objects." In 2022 Eleventh International Conference on Image Processing Theory, Tools and Applications (IPTA). IEEE, 2022. http://dx.doi.org/10.1109/ipta54936.2022.9784116.
Full textWiemann, Thomas, Felix Igelbrink, Sebastian Putz, Malte Kleine Piening, Steffen Schupp, Steffen Hinderink, Juri Vana, and Joachim Hertzberg. "Compressing ROS Sensor and Geometry Messages with Draco." In 2019 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). IEEE, 2019. http://dx.doi.org/10.1109/ssrr.2019.8848965.
Full text