Skip to main content

Basic Concepts

  • Chapter
  • First Online:
Triangle Mesh Watermarking and Steganography
  • 214 Accesses

Abstract

In this chapter, we introduce the essential concepts of digital watermarking, steganography, and steganalysis. Besides, the format of 3D Mesh is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://segeval.cs.princeton.edu/.

  2. 2.

    http://modelnet.cs.princeton.edu/.

References

  1. Filler, T., Judas, J. & Fridrich, J. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security. 6, 920–935 (2011)

    Article  Google Scholar 

  2. Filler, T. & Fridrich, J. Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security. 5, 705–720 (2010)

    Article  Google Scholar 

  3. Li, B., Tan, S., Wang, M. & Huang, J. Investigation on cost assignment in spatial image steganography. IEEE Transactions on Information Forensics and Security. 9, 1264–1277 (2014)

    Article  Google Scholar 

  4. Pevny, T., Filler, T. & Bas, P. Using high-dimensional image models to perform highly undetectable steganography. International Workshop on Information Hiding. pp. 161–177 (2010)

    Google Scholar 

  5. Pevny, T., Bas, P. & Fridrich, J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security. 5, 215–224 (2010

    Article  Google Scholar 

  6. Holub, V. & Fridrich, J. Designing steganographic distortion using directional filters. 2012 IEEE International Workshop on Information Forensics and Security (WIFS). pp. 234–239 (2012)

    Google Scholar 

  7. Holub, V., Fridrich, J. & Denemark, T. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security. 2014, 1–13 (2014)

    Article  Google Scholar 

  8. Fridrich, J. & Kodovsky, J. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security. 7, 868–882 (2012)

    Article  Google Scholar 

  9. Tang, W., Tan, S., Li, B. & Huang, J. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters. 24, 1547–1551 (2017)

    Article  Google Scholar 

  10. Li, B., Wang, M., Huang, J. & Li, X. A new cost function for spatial image steganography. 2014 IEEE International Conference on Image Processing (ICIP). pp. 4206–4210 (2014)

    Google Scholar 

  11. Xu, G., Wu, H. & Shi, Y. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters. 23, 708–712 (2016)

    Article  Google Scholar 

  12. Ye, J., Ni, J. & Yi, Y. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security. 12, 2545–2557 (2017)

    Article  Google Scholar 

  13. Yang, J., Ruan, D., Huang, J., Kang, X. & Shi, Y. An embedding cost learning framework using GAN. IEEE Transactions on Information Forensics and Security. 15 pp. 839–851 (2019)

    Article  Google Scholar 

  14. Yang, J., Ruan, D., Kang, X. & Shi, Y. Towards automatic embedding cost learning for JPEG steganography. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. pp. 37–46 (2019)

    Google Scholar 

  15. Tang, W., Li, B., Barni, M., Li, J. & Huang, J. An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Transactions on Information Forensics and Security. 16 pp. 952–967 (2020)

    Article  Google Scholar 

  16. Tang, W., Li, B., Barni, M., Li, J. & Huang, J. Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge. IEEE Transactions on Circuits and Systems for Video Technology. (2021)

    Google Scholar 

  17. Yedroudj, M., Comby, F. & Chaumont, M. Yedroudj-Net: An efficient CNN for spatial steganalysis. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 2092–2096 (2018)

    Google Scholar 

  18. Deng, X., Chen, B., Luo, W. & Luo, D. Fast and effective global covariance pooling network for image steganalysis. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. pp. 230–234 (2019)

    Google Scholar 

  19. Boroumand, M., Chen, M. & Fridrich, J. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security. 14, 1181–1193 (2018)

    Article  Google Scholar 

  20. Ko, H., Huang, C., Horng, G. & Shiuh-Jeng, W. Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Information Sciences. 517 pp. 128–147 (2020)

    Article  Google Scholar 

  21. Daren, H., Jiufen, L., Jiwu, H. & Hongmei, L. A DWT-based image watermarking algorithm. IEEE International Conference on Multimedia and Expo, 2001. ICME 2001.. pp. 80–80 (2001)

    Google Scholar 

  22. Urvoy, M., Goudia, D. & Autrusseau, F. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Transactions on Information Forensics and Security. 9, 1108–1119 (2014)

    Article  Google Scholar 

  23. Mun, S., Nam, S., Jang, H., Kim, D. & Lee, H. Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing. 337 pp. 191–202 (2019)

    Article  Google Scholar 

  24. Ahmadi, M., Norouzi, A., Karimi, N., Samavi, S. & Emami, A. ReDMark: Framework for residual diffusion watermarking based on deep networks. Expert Systems with Applications. 146 pp. 113157 (2020)

    Article  Google Scholar 

  25. Fang, H., Chen, D., Wang, F., Ma, Z., Liu, H., Zhou, W., Zhang, W. & Yu, N. TERA: Screen-to-Camera Image Code with Transparency, Efficiency, Robustness and Adaptability. IEEE Transactions on Multimedia. 24 pp. 955–967 (2021)

    Article  Google Scholar 

  26. Cheng, Y., Ji, X., Wang, L., Pang, Q., Chen, Y. & Xu, W. mID: Tracing screen photos via Moiré patterns. 30th USENIX Security Symposium (USENIX Security 21). pp. 2969–2986 (2021)

    Google Scholar 

  27. S. M. Shontz and P. M. Knupp, “The effect of vertex reordering on 2D local mesh optimization efficiency,” in Proceedings of the International Meshing Roundtable. Springer, 2008, pp. 107–124.

    Google Scholar 

  28. S. P. Sastry, E. Kultursay, S. M. Shontz, and M. T. Kandemir, “Improved cache utilization and preconditioner efficiency through use of a space-filling curve mesh element- and vertex-reordering technique,” Engineering with Computers, vol. 30, no. 4, pp. 535–547, 2014.

    Article  Google Scholar 

  29. Botsch, M., Kobbelt, L., Pauly, M., Alliez, P. & Levy, B. Polygon Mesh Processing. (Taylor & Francis, 2010)

    Google Scholar 

  30. Chen, X., Golovinskiy, A. & Funkhouser, T. A benchmark for 3D mesh segmentation. ACM Transactions on Graphics (Proc. SIGGRAPH), 28 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Zhou, H., Chen, K., Ma, Z., Wang, F., Zhang, W. (2023). Basic Concepts. In: Triangle Mesh Watermarking and Steganography. Springer, Singapore. https://doi.org/10.1007/978-981-19-7720-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7720-6_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7719-0

  • Online ISBN: 978-981-19-7720-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics