Interfacing the law project proposal Zalan Szakacs: Difference between revisions
Line 22: | Line 22: | ||
*3D steganography version of the library | *3D steganography version of the library | ||
*3D shapes printed with the 3D printer from the school | *3D shapes printed with the 3D printer from the school | ||
*circumvention of censorship | |||
*simhash process MD5 Hash - showing the visability in the 3D shape (shows the evolution of the collection) | *simhash process MD5 Hash - showing the visability in the 3D shape (shows the evolution of the collection) | ||
*with a 3D scanner it will be possible to access the collection of the library again | *with a 3D scanner it will be possible to access the collection of the library again |
Revision as of 21:13, 13 May 2018
Research about 3D Steganography
Redesigns of the 3D printed gun
3D Steganography talk by Dennis de Bel
3D Steganography 3D printing project by Dennis de Bel
A High Capacity 3D Steganography Algorithm
A High-Capacity Data Hiding Method for Polygonal Meshes?
Object Steganography, Noah Feehan (2012)
Disarming Corruptor
Project proposal
- 3D steganography version of the library
- 3D shapes printed with the 3D printer from the school
- circumvention of censorship
- simhash process MD5 Hash - showing the visability in the 3D shape (shows the evolution of the collection)
- with a 3D scanner it will be possible to access the collection of the library again
- mirroring and visualising the collection
- alternative way of looking at the collection
- compression
- time capture in 3D file