Abstract
In this chapter, we introduce the essential concepts of digital watermarking, steganography, and steganalysis. Besides, the format of 3D Mesh is presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Filler, T., Judas, J. & Fridrich, J. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security. 6, 920–935 (2011)
Filler, T. & Fridrich, J. Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security. 5, 705–720 (2010)
Li, B., Tan, S., Wang, M. & Huang, J. Investigation on cost assignment in spatial image steganography. IEEE Transactions on Information Forensics and Security. 9, 1264–1277 (2014)
Pevny, T., Filler, T. & Bas, P. Using high-dimensional image models to perform highly undetectable steganography. International Workshop on Information Hiding. pp. 161–177 (2010)
Pevny, T., Bas, P. & Fridrich, J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security. 5, 215–224 (2010
Holub, V. & Fridrich, J. Designing steganographic distortion using directional filters. 2012 IEEE International Workshop on Information Forensics and Security (WIFS). pp. 234–239 (2012)
Holub, V., Fridrich, J. & Denemark, T. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security. 2014, 1–13 (2014)
Fridrich, J. & Kodovsky, J. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security. 7, 868–882 (2012)
Tang, W., Tan, S., Li, B. & Huang, J. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters. 24, 1547–1551 (2017)
Li, B., Wang, M., Huang, J. & Li, X. A new cost function for spatial image steganography. 2014 IEEE International Conference on Image Processing (ICIP). pp. 4206–4210 (2014)
Xu, G., Wu, H. & Shi, Y. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters. 23, 708–712 (2016)
Ye, J., Ni, J. & Yi, Y. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security. 12, 2545–2557 (2017)
Yang, J., Ruan, D., Huang, J., Kang, X. & Shi, Y. An embedding cost learning framework using GAN. IEEE Transactions on Information Forensics and Security. 15 pp. 839–851 (2019)
Yang, J., Ruan, D., Kang, X. & Shi, Y. Towards automatic embedding cost learning for JPEG steganography. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. pp. 37–46 (2019)
Tang, W., Li, B., Barni, M., Li, J. & Huang, J. An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Transactions on Information Forensics and Security. 16 pp. 952–967 (2020)
Tang, W., Li, B., Barni, M., Li, J. & Huang, J. Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge. IEEE Transactions on Circuits and Systems for Video Technology. (2021)
Yedroudj, M., Comby, F. & Chaumont, M. Yedroudj-Net: An efficient CNN for spatial steganalysis. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 2092–2096 (2018)
Deng, X., Chen, B., Luo, W. & Luo, D. Fast and effective global covariance pooling network for image steganalysis. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. pp. 230–234 (2019)
Boroumand, M., Chen, M. & Fridrich, J. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security. 14, 1181–1193 (2018)
Ko, H., Huang, C., Horng, G. & Shiuh-Jeng, W. Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Information Sciences. 517 pp. 128–147 (2020)
Daren, H., Jiufen, L., Jiwu, H. & Hongmei, L. A DWT-based image watermarking algorithm. IEEE International Conference on Multimedia and Expo, 2001. ICME 2001.. pp. 80–80 (2001)
Urvoy, M., Goudia, D. & Autrusseau, F. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Transactions on Information Forensics and Security. 9, 1108–1119 (2014)
Mun, S., Nam, S., Jang, H., Kim, D. & Lee, H. Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing. 337 pp. 191–202 (2019)
Ahmadi, M., Norouzi, A., Karimi, N., Samavi, S. & Emami, A. ReDMark: Framework for residual diffusion watermarking based on deep networks. Expert Systems with Applications. 146 pp. 113157 (2020)
Fang, H., Chen, D., Wang, F., Ma, Z., Liu, H., Zhou, W., Zhang, W. & Yu, N. TERA: Screen-to-Camera Image Code with Transparency, Efficiency, Robustness and Adaptability. IEEE Transactions on Multimedia. 24 pp. 955–967 (2021)
Cheng, Y., Ji, X., Wang, L., Pang, Q., Chen, Y. & Xu, W. mID: Tracing screen photos via Moiré patterns. 30th USENIX Security Symposium (USENIX Security 21). pp. 2969–2986 (2021)
S. M. Shontz and P. M. Knupp, “The effect of vertex reordering on 2D local mesh optimization efficiency,” in Proceedings of the International Meshing Roundtable. Springer, 2008, pp. 107–124.
S. P. Sastry, E. Kultursay, S. M. Shontz, and M. T. Kandemir, “Improved cache utilization and preconditioner efficiency through use of a space-filling curve mesh element- and vertex-reordering technique,” Engineering with Computers, vol. 30, no. 4, pp. 535–547, 2014.
Botsch, M., Kobbelt, L., Pauly, M., Alliez, P. & Levy, B. Polygon Mesh Processing. (Taylor & Francis, 2010)
Chen, X., Golovinskiy, A. & Funkhouser, T. A benchmark for 3D mesh segmentation. ACM Transactions on Graphics (Proc. SIGGRAPH), 28 (2009)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Zhou, H., Chen, K., Ma, Z., Wang, F., Zhang, W. (2023). Basic Concepts. In: Triangle Mesh Watermarking and Steganography. Springer, Singapore. https://doi.org/10.1007/978-981-19-7720-6_2
Download citation
DOI: https://doi.org/10.1007/978-981-19-7720-6_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7719-0
Online ISBN: 978-981-19-7720-6
eBook Packages: Computer ScienceComputer Science (R0)