2018
DOI: 10.1109/tmm.2017.2723244
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
65
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 102 publications
(66 citation statements)
references
References 44 publications
0
65
0
1
Order By: Relevance
“…In this embedded data are extracted from encrypted image and image is reconstructed without losing data. This show the original content of image remains protected and provides a good level of security[31].…”
mentioning
confidence: 81%
“…In this embedded data are extracted from encrypted image and image is reconstructed without losing data. This show the original content of image remains protected and provides a good level of security[31].…”
mentioning
confidence: 81%
“…More recently, Jiang et al designed a reversible data hiding in encrypted domain scheme with low computational complexity for three-dimensional meshes [20]. Zhang et al suggested a coverless steganographic algorithm based on discrete cosine transform and latent dirichlet allocation topic classification, having robustness against common image processing and better ability to resist steganalysis [21].…”
Section: Related Workmentioning
confidence: 99%
“…Watermarking approaches for 3D objects have been mainly studied [27], [28]. These approaches propose to embed secret messages into 3D objects in the spatial domain or in the spectral domain in order to be more resilient against attacks.…”
Section: D Selective Encryptionmentioning
confidence: 99%
“…These approaches propose to embed secret messages into 3D objects in the spatial domain or in the spectral domain in order to be more resilient against attacks. Recently, Jian et al [28] proposed a reversible data hiding method embedding a secret message into a 3D object which has been encrypted. The novelty of their approach is that they can reverse the modifications induced in the 3D encrypted object or the 3D decrypted object thanks to a second secret key used at the data hiding step.…”
Section: D Selective Encryptionmentioning
confidence: 99%