2012
DOI: 10.1016/j.cag.2012.06.002
|View full text |Cite
|
Sign up to set email alerts
|

A high-capacity data-hiding approach for polygonal meshes using maximum expected level tree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Three steganographic schemes, namely, Chao [7], VND [12], and Li [10], are employed for evaluation. Note that we do not consider distortionless schemes [18,19,20], though these steganalytic features cannot discriminate these stegos generated by order permutation based steganography from covers, they can be easily detected by specifically designed detector. Because the orders of faces are generally highly relevant for normal meshes, when the stego meshes are created by distortionless methods, the orders of faces are uncorrelated.…”
Section: Comparison With the State-of-the-art Steganalytic Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Three steganographic schemes, namely, Chao [7], VND [12], and Li [10], are employed for evaluation. Note that we do not consider distortionless schemes [18,19,20], though these steganalytic features cannot discriminate these stegos generated by order permutation based steganography from covers, they can be easily detected by specifically designed detector. Because the orders of faces are generally highly relevant for normal meshes, when the stego meshes are created by distortionless methods, the orders of faces are uncorrelated.…”
Section: Comparison With the State-of-the-art Steganalytic Methodsmentioning
confidence: 99%
“…High-capacity based 3D mesh steganography can be classified into two categories: distortionless steganography based on order permutation [18,19,20], and distorted steganography based on vertex shifting [7,8,9,10,11,12]. For distortionless steganography, Bogomjakov et al [18] propose to hide messages in the indexed representation of a mesh by permuting the order in which faces and vertices are stored.…”
Section: D Mesh Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the simplification in computation, the approach is highly efficient, with only a loss of one bit per vertex for capacity than the optimal case. To further approach the optimal embedding capacity, improved works were presented in [8], [9], [23], where techniques such as building a special type of binary tree were adopted to find the next element in π.…”
Section: ) Permutation-based Steganographymentioning
confidence: 99%
“…Polygonal meshes, especially triangular meshes, are the most commonly used types of 3D geometry. In general, mesh steganography approaches fall into two major categories, the geometry-based approaches [3]- [5] and the permutationbased approaches [6]- [9]. The geometry-based approaches embed secret data into meshes by slightly perturbing the position of the vertices.…”
Section: Introductionmentioning
confidence: 99%