Littérature scientifique sur le sujet « Compression Draco »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Compression Draco ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Compression Draco"
Van Rensburg, Bianca Jansen, William Puech et Jean-Pierre Pedeboy. « The First Draco 3D Object Crypto-Compression Scheme ». IEEE Access 10 (2022) : 10566–74. http://dx.doi.org/10.1109/access.2022.3144533.
Texte intégralMahendra Suthar, Rui Dai, Junjie Zhang, Sasu Tarkoma et Ian F. Akyildiz. « Multi-codec rate adaptive point cloud streaming for holographic-type communication ». ITU Journal on Future and Evolving Technologies 4, no 4 (29 novembre 2023) : 590–603. http://dx.doi.org/10.52953/bdsp2843.
Texte intégralWang, Qiang, Liuyang Jiang, Xuebin Sun, Jingbo Zhao, Zhaopeng Deng et Shizhong Yang. « An Efficient LiDAR Point Cloud Map Coding Scheme Based on Segmentation and Frame-Inserting Network ». Sensors 22, no 14 (7 juillet 2022) : 5108. http://dx.doi.org/10.3390/s22145108.
Texte intégralBai, Shengyu, Chen Ma, Xinjun Wang, Shaolong Zhou, Hongyu Jiang, Ling Ma et Huiqin Jiang. « Application of Medical Image 3D Visualization Web Platform in Auxiliary Diagnosis and Preoperative Planning ». Journal of Image and Graphics 11, no 1 (mars 2023) : 32–39. http://dx.doi.org/10.18178/joig.11.1.32-39.
Texte intégralKormendy, John, et K. C. Freeman. « Scaling Laws for Dark Matter Halos in Late-Type and Dwarf Spheroidal Galaxies ». Symposium - International Astronomical Union 220 (2004) : 377–97. http://dx.doi.org/10.1017/s0074180900183706.
Texte intégralYing, Jingwei, Zewen Han, Luming Shen et Wengui Li. « Influence of Parent Concrete Properties on Compressive Strength and Chloride Diffusion Coefficient of Concrete with Strengthened Recycled Aggregates ». Materials 13, no 20 (16 octobre 2020) : 4631. http://dx.doi.org/10.3390/ma13204631.
Texte intégralDelic-Nikolić, Ivana, Lidja Kurešević et Olivera Vušović. « Diabase from Drača open pit mine in central Serbia - quality assessment for building stone purposes ». IOP Conference Series : Earth and Environmental Science 906, no 1 (1 novembre 2021) : 012013. http://dx.doi.org/10.1088/1755-1315/906/1/012013.
Texte intégralShan, Bowei, et Yong Fang. « DRAC : a delta recurrent neural network-based arithmetic coding algorithm for edge computing ». Complex & ; Intelligent Systems, 5 juillet 2021. http://dx.doi.org/10.1007/s40747-021-00455-1.
Texte intégralChen, Tao, Lamei Li, Anni Yang, Hui Huang, Ganwei Shi, Feng Li, Wenhua Li et al. « Incidence of Distal Radial Artery Occlusion and its Influencing Factors After Cardiovascular Intervention Via the Distal Transradial Access ». Journal of Endovascular Therapy, 31 octobre 2023. http://dx.doi.org/10.1177/15266028231208638.
Texte intégralThèses sur le sujet "Compression Draco"
Jansen, van rensburg Bianca. « Sécurisation des données 3D par insertion de données cachées et par chiffrement pour l'industrie de la mode ». Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMONS044.
Texte intégralOver the last few decades, 3D objects have become an essential part of everyday life, in both private and professional contexts. These 3D objects are often stored on the cloud and transferred over networks many times during their existence, where they are susceptible to malicious attacks. Therefore, 3D object security, such as encryption or data hiding, is essential. Encryption is used to protect the visual confidentiality of the 3D object's content. Selective encryption schemes can also be used, where part of a component, such as a part of each vertex, is encrypted. Data hiding is generally used to protect the copyright or the authenticity of the 3D object. However, when a 3D object is encrypted, a third party such as a server may need to embed data in the confidential 3D object. In this case, data hiding in the encrypted domain is performed. In many applications, 3D objects often consist of millions of vertices, and so storing and sharing them online is expensive, time consuming and not environmentally friendly. Consequently, 3D object compression is essential. In this work, we present three contributions in different research areas. First, we present our work on a new method to obtain a watermarked 3D object from high-capacity data hiding in the encrypted domain. Based on the homomorphic properties of the Paillier cryptosystem, our proposed method allows us to embed several secret messages in the encrypted domain with a high-capacity. These messages can be extracted in the plaintext domain after the 3D object decryption. To the best of our knowledge, we are the first to propose a data hiding method in the encrypted domain where the high-capacity watermark is conserved in the plaintext domain after the 3D object is decrypted. The encryption and the data hiding in the encrypted domain are format compliant and without size expansion, despite the use of the Paillier cryptosystem. Then, we present our work on an evaluation metric for the visual security level of selectively encrypted 3D objects. We present a new dataset composed of evaluated selectively encrypted 3D objects. We propose a model to determine the security parameters according to a desired security level. Finally, we detail our proposed 3DVS score which serves to measure the visual security level of selectively encrypted 3D objects. We also present a method which allows us to hierarchically decrypt an encrypted 3D object according to a generated ring of keys. This ring consists of a set of keys that allow a stronger or weaker decryption of the encrypted 3D object. Each hierarchically decrypted 3D object has a different visual security level, where the 3D object is more or less visually accessible. Our method is essential when it comes to preventing trade secrets from being leaked from within a company or by exterior attackers. It is also ecologically friendly and more secure than traditional selective encryption methods. Finally, we present our work on joint security and compression methods based on Google's 3D object compression method Draco, where we integrate a security step in Draco, which is becoming the new industry standard. These security steps are encryption, selective encryption and watermarking
Mrázek, Zdeněk. « Snímání a zpracování digitálních obrazů s vysokým dynamickým rozsahem ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-241953.
Texte intégralChapitres de livres sur le sujet "Compression Draco"
de Hoog, Jens, Ahmed N. Ahmed, Ali Anwar, Steven Latré et Peter Hellinckx. « Quality-Aware Compression of Point Clouds with Google Draco ». Dans Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 227–36. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89899-1_23.
Texte intégralActes de conférences sur le sujet "Compression Draco"
van Rensburg, Bianca Jansen, Adrian G. Bors, William Puech et Jean-Pierre Pedeboy. « Simultaneous Watermarking and Draco 3D Object Compression Method ». Dans 2023 IEEE International Conference on Image Processing (ICIP). IEEE, 2023. http://dx.doi.org/10.1109/icip49359.2023.10222430.
Texte intégralvan Rensburg, Bianca Jansen, William Puech et Jean-Pierre Pedeboy. « Draco-Based Selective Crypto-Compression Method of 3D objects ». Dans 2022 Eleventh International Conference on Image Processing Theory, Tools and Applications (IPTA). IEEE, 2022. http://dx.doi.org/10.1109/ipta54936.2022.9784116.
Texte intégralWiemann, Thomas, Felix Igelbrink, Sebastian Putz, Malte Kleine Piening, Steffen Schupp, Steffen Hinderink, Juri Vana et Joachim Hertzberg. « Compressing ROS Sensor and Geometry Messages with Draco ». Dans 2019 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). IEEE, 2019. http://dx.doi.org/10.1109/ssrr.2019.8848965.
Texte intégral