2018
DOI: 10.1007/s13319-018-0194-7
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking Techniques for Three Dimensional (3D) Mesh Authentication in Spatial Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 59 publications
0
8
0
Order By: Relevance
“…Even so the 3D objects are widely available and important, there are a few existing watermarking techniques. e various watermarking techniques for 3D objects can be classified according to the embedding domains such as the spatial domain [18,19], the spectral-domain [20,21], and the transform domain [22,23].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Even so the 3D objects are widely available and important, there are a few existing watermarking techniques. e various watermarking techniques for 3D objects can be classified according to the embedding domains such as the spatial domain [18,19], the spectral-domain [20,21], and the transform domain [22,23].…”
Section: Introductionmentioning
confidence: 99%
“…Even so the 3D objects are widely available and important, there are a few existing watermarking techniques. The various watermarking techniques for 3D objects can be classified according to the embedding domains such as the spatial domain [ 18 , 19 ], the spectral-domain [ 20 , 21 ], and the transform domain [ 22 , 23 ]. The transform domain techniques such as Fourier, Laplace, cosine, and wavelet transform provide a good trade-off between invisibility and robustness.…”
Section: Introductionmentioning
confidence: 99%
“…Blind watermarking schemes allow the authorized user to extract the watermark using the secret key. It doesn't require either the original content or the watermarked content [27]. Non-blind watermarking schemes require the original data and the watermark to verify the watermarks embedded in the applications.…”
Section: Introductionmentioning
confidence: 99%
“…Based on the size of the tampered area, fragile wat can be categorized into two types: Region-based and Vertex-based. Region-ba ing technique detects tampered areas relatively loosely, and the detected area m at have not been tampered with; however, this technique effectively detects the n contrast, vertex-based fragile watermarking technique accurately detects the t cannot detect changes in topology because of the limitation of the algorithm u ding to the latest survey [16] and our understanding about the 3D auth there are currently eight vertex-based 3D model authentication algorithms [17-ented in the spatial domain. Despite these algorithms obtaining favorable exp re is still room for improvement.…”
Section: Introductionmentioning
confidence: 99%
“…According to the latest survey [16] and our understanding about the 3D authentication algorithm, there are currently eight vertex-based 3D model authentication algorithms [17][18][19][20][21][22][23][24], which are implemented in the spatial domain. Despite these algorithms obtaining favorable experimental results, there is still room for improvement.…”
Section: Introductionmentioning
confidence: 99%