References
- SIO2 Engine, SIO2Interactive.com, http://sio2interactive.com/, Accessed to Sept. 2012.
- ShiVa3D, Stonetrip, http://www.stonetrip.com, Accessed to Sept. 2012.
- Unity3D, Unity Technologies, http://www.unity3d.com, Accessed to Sept. 2012.
- Corona DSK, Corona, http://www.coronasdk.com, Accessed to Sept. 2012.
- Unreal Engine 3 (UDK), Unreal Technology, http://www.udk.com/mobile, Accessed to Sept. 2012.
- Authentec, http://www.authentec.com/, Accessed to Sept. 2012.
- BuyDRM, http://www.buydrm.com/, Accessed to Sept. 2012.
- Discretix, http://www.discretix.com/, Accessed to Sept. 2012.
-
$Microsoft^{(R)}$ PlayReady, https://www.microsoft.com/playready/, Accessed to Sept. 2012. - R. Ohbuchi, H. Masuda, and M. Aono, "Watermarking three-dimensional polygonal models through geometric and topological modifications," IEEE Journal on Selected Areas in Communications, vol. 16, issue 4, pp. 551-560, May 1998. https://doi.org/10.1109/49.668977
- O. Benedens, "Geometry-based watermarking of 3D models," IEEE Computer Graphics and Applications, pp. 46-55, Jan./Feb. 1999.
- S.-H. Lee and K.-R. Kwon, "A watermarking for 3D-mesh using the patch CEGIs," Digital Signal Processing, vol. 17, issue 2, pp. 396-413, March 2007. https://doi.org/10.1016/j.dsp.2005.04.014
- S.-H. Lee and K.-R. Kwon, "Mesh watermarking based projection onto two convex sets," Multimedia Systems, vol. 13, no. 5-6, pp. 323-330, Feb. 2008. https://doi.org/10.1007/s00530-007-0095-8
- J.M. Konstantinides, A. Mademlis, P. Daras, P.A. Mitkas, M.G. Strintzis, "Blind robust 3-D mesh watermarking based on oblate spheroidal harmonics," IEEE Transactions on Multimedia, vol. 11, issue 1, pp. 23-38, Jan. 2009. https://doi.org/10.1109/TMM.2008.2008913
- K. Kwangtaek, M. Barni, and H.Z. Tan, "Roughness-adaptive 3-D watermarking based on masking effect of surface roughness," IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 721-733, Dec. 2010. https://doi.org/10.1109/TIFS.2010.2068546
- L. Ming and A.G. Bors, "Surface-preserving robust watermarking of 3-D shapes," IEEE Transactions on Image Processing, vol. 20, issue 10, pp. 2813-2826, Oct. 2011. https://doi.org/10.1109/TIP.2011.2142004
- S.-H. Lee and K.-R. Kwon, "CAD drawing watermarking scheme," Digital Signal Processing, vol. 20, issue 5, pp. 1379-1399, Sep. 2010. https://doi.org/10.1016/j.dsp.2010.01.003
- Z. Sakr and N.D. Georganas, "Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location," ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 3, no. 3, article 18, Aug. 2007.
- S.-H. Lee and K.-R. Kwon, "VRML animated model watermarking scheme using geometry and interpolator nodes," Computer-Aided Design, vol. 43, issue 8, pp. 1056-1073, Aug. 2011. https://doi.org/10.1016/j.cad.2011.03.003
- S.-H. Lee and K.-R. Kwon, "Robust 3D mesh model hashing based on feature object," Digital Signal Processing, vol. 22, issue 5, pp. 744-759, Sep. 2012. https://doi.org/10.1016/j.dsp.2012.04.015
- N. Memon and P.W. Wong, "A buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol.10, no.4, pp. 643-649, April 2001. https://doi.org/10.1109/83.913598
- C.L. Lei, P.L. Yu, P.L. Tasi, and M.W. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol.13, no.12, pp. 1618-1626, Dec. 2004. https://doi.org/10.1109/TIP.2004.837553
- S. Katzenbeisser, A. Lemma, M.U. Celik, M. Van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Transactions on Information Forensics and Security, vol. 3 , issue 4, pp. 783-786, Dec. 2008. https://doi.org/10.1109/TIFS.2008.2002939
- A. Rial, Mina Deng, T. Bianchi, A. Piva, and B. Preneel, "A provably secure anonymous buyer-seller watermarking protocol," IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 920-931, Dec. 2008.
- A. Rial, J. Balasch, and B. Preneel, "A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer," IEEE Transactions on Information Forensics and Security, vol. 6, issue 1, pp. 202-212, March 2011. https://doi.org/10.1109/TIFS.2010.2095844
- L. Quan, C. Zheng, and Z. Zude, "Research on secure buyer-seller watermarking protocol," Journal of Systems Engineering and Electronics, vol. 19, issue 2, pp. 370-376, April 2008. https://doi.org/10.1016/S1004-4132(08)60094-8
- S.-G. Kwon, S.-H. Lee, K.-R. Kwon, E.-J. Lee, S.-Y. Ok and S.-H. Bae, "Mobile 3D game contents watermarking based on buyer-seller watermarking protocol," IEICE Transaction on Information and System, vol. E91-D, no.7, pp. 2018-2026, July 2008. https://doi.org/10.1093/ietisy/e91-d.7.2018
- PowerVR SGX, Khronos OpenGL ES 2.0 SDK, Imagination Technology, http://www.imgtec.com/, Accessed to Sept. 2012.
- A. Jagannathan and E. L. Miller, "Three-dimensional surface mesh segmentation using curvedness-based region growing approach," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 12, pp. 2195-2204, Dec. 2007. https://doi.org/10.1109/TPAMI.2007.1125
- N. Dyn, K. Hormann, S.J. Kim and D. Levin, "Optimizing 3D triangulations using discrete curvature analysis," Math. Methods for Curves and Surfaces: Oslo 2000, Vanderbilt University Press, pp. 135-146, 2001. http://www.researchgate.net/publication/228909965_Optimizing_3D_triangulations_using_discrete_curvature_analysis/file/9fcfd50aa804db9277.pdf&sa=X&scisig=AAGBfm1rmavfjLLjhh1CiWCN8spsifJABA&oi=scholarr&ei=83niUqjGG4rQkwXHuoFI&ved=0CCYQgAMoADAA