2010
DOI: 10.20870/ijvr.2010.9.4.2790
|View full text |Cite
|
Sign up to set email alerts
|

Permutation Steganography for Polygonal Meshes Based on Coding Tree

Abstract: We propose a coding tree for permutation steganography in polygonal meshes. Instead of conceptually building a complete binary tree for remaining embedding/extracting primitives to encode/decode bitstream, our method lengthens bitstream by exploiting the coding tree of the primitives, a binary tree which is a little bit skewed. The coding tree has higher levels than the complete binary tree so that as experimental results show, the average capacity of our approach is more about 0.39 bit/vertex than that of Bog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Available RDH algorithms for 3D mesh models are very few compared to RDH for digital images. To increase the robustness and capacity of steganography for 3D models, various RDH algorithms are proposed from different perspectives [25]- [27]. The existing algorithms can be classified into three categories: 1) 3D RDH in the spatial domain, 2) 3D RDH in the transform domain, and 3) 3D RDH in the compressed domain.…”
Section: A Rdh For the 3d Mesh Modelmentioning
confidence: 99%
“…Available RDH algorithms for 3D mesh models are very few compared to RDH for digital images. To increase the robustness and capacity of steganography for 3D models, various RDH algorithms are proposed from different perspectives [25]- [27]. The existing algorithms can be classified into three categories: 1) 3D RDH in the spatial domain, 2) 3D RDH in the transform domain, and 3) 3D RDH in the compressed domain.…”
Section: A Rdh For the 3d Mesh Modelmentioning
confidence: 99%
“…Although reversible embedding can recover the host to a certain, it still cannot completely resolve the geometric distortion. Recently, entity rearrangement was proposed for data hiding (Artz, 2001;Cheng & Wang, 2006;Tan, Lin, Tai & Chang, 2009;Lin, Chao, Chen, Yu & Hsu, 2013;Luo, Lu & Wang, 2010;Bogomjakov, Gotsman & Isenburg, 2008;Huang, Li & Wang, 2009;Tu, Tai, Isenburg & Chang, 2010;Tu, Hsu & Tai, 2010;Tu & Tai, 2012), which does not introduce geometric distortion. However, there still exists obvious contradiction between capacity and time complexity.…”
mentioning
confidence: 99%