References

[1]J. F. Hughes, A. van Dam, M. McGuire, D. F. Sklar, J. D. Foley, S. K. Feiner, and K. Akeley, Computer Graphics: Principles and Practice, 3rd ed. Addison-Wesley, 2014

[2] M. Wu and B. Liu, "Watermarking for image authentication," in Proceedings of International Conference on Image Processing, 1998.

[3] M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proceedings of International Conference on Image Processing, 1997.

[4] R. B. Wolfgang and E. J. Delp, "Fragile watermarking using the vw2d watermark," in Security and Watermarking of Multimedia Contents. SPIE, 1999.

[5] C. Gentry, "Fully homomorphic encryption using ideal lattices," Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009.

[6] C. Gentry, "Computing arbitrary functions of encrypted data," Communications of the ACM, vol. 53, no. 3, 2010.

[7] C. Marcolla, V. Sucasas, M. Manzano, R. Bassoli, F. H. P. Fitzek, and N. Aaraj, "Survey on fully homomorphic encryption, theory, and applications," Proceedings of the IEEE, 2022.

[8] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, 1997.

[9] I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE, 1999.

[10] S. A. Craver, N. D. Memon, B.-L. Yeo, and M. M. Yeung, "Can invisible watermarks resolve rightful ownerships?" in Storage and Retrieval for Image and Video Databases, 1997.

[11] N. Jayant, J. Johnston, and R. Safranek, "Signal compression based on models of human perception," Proceedings of the IEEE, 1993.

[12] H. R. Wu, A. R. Reibman, W. Lin, F. Pereira, and S. S. Hemami,"Perceptual visual signal compression and transmission," Proceedings of the IEEE, 2013.

[13] Q. Lian, Z. Zhang, M. Yang, B. Y. Zhao, Y. Dai, and X. Li, "An empirical study of collusion behavior in the maze p2p file-sharing system," in 27th International Conference on Distributed Computing Systems, 2007.

[14] I. J. Cox, M. L. Miller, , and A. L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE, 1999.

[15] C. Cachin, "An information-theoretic model for steganography," in International Workshop on Information Hiding, 1998.

[16] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proceedings of the IEEE, vol. 87, no. 7, 1999.

[17] M. D. Swanson, B. Zhu, and A. H. Tewfik, "Transparent robust image watermarking," in Proceedings of 3rd IEEE International Conference on Image Processing, 1996.

[18] C. I. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998.

[19] S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in International Workshop on Information Hiding, 2000.

[20] J. H. Reif, D. J. Tygar, and A. Yoshida, "Computability and complexity of ray tracing," Discrete and Computational Geometry, vol. 11, no. 3, 1994.

[21] J. Stern, "Secret linear congruential generators are not cryptographically secure," in 28th Annual Symposium on Foundations of Computer Science, 1987.

[22] J. Chou, S. S. Pradhan, and K. Ramchandran, "On the duality between distributed source coding and data hiding," in Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, vol. 2, 1999.

[23] Actif3D Team. (2023) The no-code vr/ar platform for creator economy. [Online]. Available: https://academy.actif3d.com/blog:no-code-vr-platform

[24] I. Chillotti, M. Joye, and P. Paillier, "Programmable bootstrapping enables efficient homomorphic inference of deep neural networks," in Cyber Security Cryptography and Machine Learning, 2021.

[25] OMTP. (2009, May) Advanced trusted environment: Omtp tr1. [Online]. Available: http://www.omtp.org/OMTP_Advanced_Trusted_Environment_OMTP_TR1_v1_1.pdf

[26] TensorOpera. (2023, Nov) Scalellm: Unlocking llama2-13b llm inference on consumer gpu rtx 4090, powered by fedml nexus ai. [Online]. Available: https://blog.tensoropera.ai/scalellm-unlocking-llama2-13b- llm-inference-on-consumer-gpu-rtx-4090-powered-by-fedml-nexus-ai/

[27] ——. (2022) Scalellm: Serverless and memory-efficient model serving engine for large language models. [Online]. Available: https://docs.tensoropera.ai/deploy/scalellm

[28] Global Market Insight. (2024, May) Visual computing market size by component (hardware, software), by display platform (interactive whiteboards, interactive kiosk, interactive table, interactive video wall, monitors), by industry verticals, regional outlook and forecast, 2024 - 2032. [Online]. Available: https://www.gminsights.com/industry-analysis/visual-computing-market

[29] Polaris Market Research. (2022, Sep) Federated learning market share, size, trends, industry analysis report, by application (industrial internet of things, drug discovery, risk management, augmented and virtual reality, data privacy management, others); by industry vertical; by region; segment forecast, 2022 - 2030. [Online]. Available: https://www.polarismarketresearch.com/industry-analysis/federated-learning-market

[30] A. Haleem, A. Allen, A. Thompson, M. Nijdam, and R. Garg, "Helium: A decentralized wireless network," Helium Systems, Tech. Rep., 2018.

[31] P. Snow, B. Deery, J. Lu, D. Johnston, and P. Kirby, "Factom: Business processes secured by immutable audit trails on the blockchain," Factom Protocol, Tech. Rep., 2018.

[32] K. Samani. (2018, Feb) New models for utility tokens. [Online]. Available: https://multicoin.capital/2018/02/13/new-models-utility-tokens/

[33] Super Renders Farm. (2024) Render farm pricing. [Online]. Available: https://superrendersfarm.com/pricing

[34] RebusFarm. (2024) Render farm prices and discounts. [Online]. Available: https://rebusfarm.net/buy/products

[35] Fox Renderfarm. (2024) Render farm pricing. [Online]. Available: https://www.foxrenderfarm.com/pricing.html

Last updated