Additional examples will be shown here to illustrate various security principles such as
obfuscation of 3D geometric models,
applying passwords,
hidden messages,
fine-grained control of model access using LOD and Switch,
use of Efficient XML Interchange (EXI) compression,
using encryption and authentication in combination with compression,
and other techniques.
|