2017
DOI: 10.1049/iet-ipr.2016.0927
|View full text |Cite
|
Sign up to set email alerts
|

3D model watermarking algorithm robust to geometric attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…The mean distance error between the original 3D triangle mesh and the watermarked 3D triangle mesh is very small (see Table 1). From Equation (14) and Table 1, we can see that the mean distance error is dependent on the number of watermarked feature points and the number of vertices. Table 1 shows the mean distance errors of the original models and the watermarked models.…”
Section: Invisibility Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…The mean distance error between the original 3D triangle mesh and the watermarked 3D triangle mesh is very small (see Table 1). From Equation (14) and Table 1, we can see that the mean distance error is dependent on the number of watermarked feature points and the number of vertices. Table 1 shows the mean distance errors of the original models and the watermarked models.…”
Section: Invisibility Evaluationmentioning
confidence: 99%
“…If the mean Euclidean distance error is small, the invisibility of the proposed algorithm is high and vice versa. The mean Euclidean distance error , is the mean distance error of all distance errors and is calculated as shown in Equation (14). Table 1 shows the mean distance error between the watermarked 3D triangle mesh and the original 3D triangle mesh corresponding to test 3D triangle meshes.…”
Section: Invisibility Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The food searching is a process of repeated iterations. Drosophila need to repeat the location of food odors and peer positions, change their location repeatedly, and find the best food location in the global range [3,20].…”
Section: Image Digital Watermarking Optimization Algorithm Based Onmentioning
confidence: 99%
“…Therefore, avoiding unauthorised access and view to the DICOM imaging has become an important issue. Many techniques are used to protect secret images like encryption [1–12] and watermarking [13–16]. However, the capacity of watermarking techniques is limited, so to hide an image in another multimedia data, it is necessary that the size of the cover data will be multiple of the watermark data.…”
Section: Introductionmentioning
confidence: 99%