2017
DOI: 10.1109/tvcg.2016.2525771
|View full text |Cite
|
Sign up to set email alerts
|

A 3D Steganalytic Algorithm and Steganalysis-Resistant Watermarking

Abstract: Additional information:Use policyThe full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that:• a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders.Pl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
77
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(77 citation statements)
references
References 42 publications
0
77
0
Order By: Relevance
“…In the following we provide the experimental results of the proposed 3D steganalysis methodology. During the tests we consider detecting the information embedded in 3D objects by three different steganographic methods: the steganalysisresistant 3D watermarking proposed in [18], the mean-based watermarking method from [13], and the high capacity embedding method proposed in [17]. For the experiments we use the Princeton Mesh Segmentation project [38] database, which consists of 354 3D objects represented as meshes.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In the following we provide the experimental results of the proposed 3D steganalysis methodology. During the tests we consider detecting the information embedded in 3D objects by three different steganographic methods: the steganalysisresistant 3D watermarking proposed in [18], the mean-based watermarking method from [13], and the high capacity embedding method proposed in [17]. For the experiments we use the Princeton Mesh Segmentation project [38] database, which consists of 354 3D objects represented as meshes.…”
Section: Resultsmentioning
confidence: 99%
“…During the generation of the stego-objects using the steganalysis-resistant watermarking method proposed in [18], Fig. 7.…”
Section: A Steganalysis Of the Information Hiding Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We also compared the proposed steganography, HPQ-R, to several other 3D information hiding algorithms, namely, Multi-Layer Steganography (MLS) [6], the watermarking algorithm that modifies the Mean of the distribution of the vertices' Radial distances in the Spherical coordinate system (MRS) [3], Steganalysis-Resistant Watermarking (SRW) [19], and the original version of HPQ [9], with respect to the resistance to the steganalysis. The number of embedding layers is considered as 10 and the number of intervals is chosen as 10 4 in MLS [6] whose payload rate is nearly 10 BPV.…”
Section: Resultsmentioning
confidence: 99%
“…The payload embedded in MRS [3] is 64 bits and the watermarking strength is 0.04. The parameter K in SRW [19] is set to 128, while the algorithm's upper bound for the embedding capacity is ⌊(K − 2)/2⌋ bits. The final detection errors of the five information hiding algorithms when using LFS52 for steganalysis are shown in Figure 3.…”
Section: Resultsmentioning
confidence: 99%