Interfacing the law project proposal Zalan Szakacs: Difference between revisions
Line 40: | Line 40: | ||
*time capture in 3D file | *time capture in 3D file | ||
<br> | <br> | ||
=Questions to think about= | =Questions to think about= | ||
*Which part of the collection should be hidden? Why? | *Which part of the collection should be hidden? Why? |
Revision as of 19:47, 14 May 2018
Research about 3D Steganography
Redesigns of the 3D printed gun
3D Steganography talk by Dennis de Bel
3D Steganography 3D printing project by Dennis de Bel
Pattern based 3D image Steganography
Embedding data in 3D models
A High Capacity 3D Steganography Algorithm
A High-Capacity Data Hiding Method for Polygonal Meshes?
Object Steganography, Noah Feehan (2012)
Disarming Corruptor
Project proposal
- 3D steganography version of the library
- 3D shapes printed with the 3D printer from the school
- circumvention of censorship
- simhash process MD5 Hash - showing the visability in the 3D shape (shows the evolution of the collection)
- with a 3D scanner it will be possible to access the collection of the library again
- mirroring and visualising the collection
- alternative way of looking at the collection
- compression
- time capture in 3D file
Questions to think about
- Which part of the collection should be hidden? Why?
- Who:
Who is using it? Only PZ?
- What:
Most important features?
- Where:
local? networked? physical space?
- When:
temporary? always available?
- Why:
what is the goal?
- How to make it interesting and expandable?
Steps to take
→
Resources
A High-Capacity 3D Steganography Algorithm With Adjustable Distortion
3D image watermarking
Watermarking of 3D Meshes using Matlab