Data hiding on 3D polygonal meshes
Proceedings of the 2004 workshop on Multimedia and security
A fragile watermarking scheme for 3D meshes
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Robust blind watermarking mechanism for motion data streams
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Technical Section: Subdivision surface watermarking
Computers and Graphics
Robust blind watermarking mechanism for point sampled geometry
Proceedings of the 9th workshop on Multimedia & security
Progressive compression invariant semi-fragile watermarks for 3d meshes
Proceedings of the 9th workshop on Multimedia & security
A numerically stable fragile watermarking scheme for authenticating 3D models
Computer-Aided Design
Robust blind watermarking of point-sampled geometry
IEEE Transactions on Information Forensics and Security
Technical section: Steganography on point-sampled geometry
Computers and Graphics
Blind robust watermarking of 3d motion data
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A high-capacity data hiding method for polygonal meshes
IH'06 Proceedings of the 8th international conference on Information hiding
From 3D mesh data hiding to 3D shape blind and robust watermarking: a survey
Transactions on data hiding and multimedia security II
Three-dimensional meshes watermarking: review and attack-centric investigation
IH'07 Proceedings of the 9th international conference on Information hiding
Lossless 3D steganography based on MST and connectivity modification
Image Communication
Roughness-adaptive 3-D watermarking based on masking effect of surface roughness
IEEE Transactions on Information Forensics and Security
Technical Section: Robust and blind mesh watermarking based on volume moments
Computers and Graphics
A novel data hiding algorithm using normal vectors of 3d model
CGI'06 Proceedings of the 24th international conference on Advances in Computer Graphics
Steganography on 3d models using a spatial subdivision technique
CGI'06 Proceedings of the 24th international conference on Advances in Computer Graphics
Steganography for three-dimensional models
CGI'06 Proceedings of the 24th international conference on Advances in Computer Graphics
Watermarking for 3D mesh model using patch CEGIs
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A data hiding algorithm for point-sampled geometry
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
A watermarking framework for subdivision surfaces
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
A blind watermarking for 3-d dynamic mesh model using distribution of temporal wavelet coefficients
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Wavelet analysis based blind watermarking for 3-d surface meshes
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Secure watermarking on 3d geometry via ICA and orthogonal transformation
Transactions on Data Hiding and Multimedia Security VII
Lossless visible three-dimensional watermark of digital elevation model data
Transactions on Edutainment VIII
Blind watermarking of NURBS curves and surfaces
Computer-Aided Design
Reversible fragile watermarking for locating tampered blocks in 2D vector maps
Multimedia Tools and Applications
An adaptive steganographic algorithm for 3D polygonal models using vertex decimation
Multimedia Tools and Applications
Hi-index | 35.68 |
In this paper, we present a new scheme for digital steganography of three-dimensional (3-D) triangle meshes. This scheme is robust against translation, rotation, and scaling operations. It is based on a substitutive procedure in the spatial domain. The key idea is to consider a triangle as a two-state geometrical object. We discuss its performance in terms of capacity, complexity, visibility, and security. We validate the use of a principal component analysis (PCA) to make our scheme signal-dependent in the line of second generation watermarking scheme. We also define a simple specific metric for distortion evaluation that has been validated by many tests. We conclude by giving some other solutions, including open steganographic schemes that could be derived from the basic ideas presented here.