K Wang, G Lavoué, F Denis… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Three-dimensional (3-D) meshes have been used more and more in industrial, medical and entertainment applications during the last decade. Many researchers, from both the …
The term, steganography, comes from Greek and means “covered writing”(Johnson and Jajodia, 1998a; Petitcolas et al., 1999). The intent of steganography is to hide a message in …
C Xiao, D Yang, B Li, J Deng… - Proceedings of the IEEE …, 2019 - openaccess.thecvf.com
Highly expressive models such as deep neural networks (DNNs) have been widely applied to various applications. However, recent studies show that DNNs are vulnerable to …
Paintings, frescoes, antique photographic prints, incunabula, old books, handwritten documents, sculptures, ceramic fragments, and other ancient manufacts constitute the …
R Jiang, H Zhou, W Zhang, N Yu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Reversible data hiding in encrypted domain (RDH-ED) has greatly attracted researchers as the original content can be losslessly reconstructed after the embedded data are extracted …
S Farrag, W Alexan - Multimedia Tools and Applications, 2020 - Springer
Due to its powerful ability to conceal secret data inside an unsuspicious cover object, image steganography has emerged as an active field of research. Recently, a lot of advancements …
JW Cho, R Prost, HY Jung - IEEE Transactions on Signal …, 2006 - ieeexplore.ieee.org
Although it has been known that oblivious (or blind) watermarking schemes are less robust than nonoblivious ones, they are more useful for various applications where a host signal is …
M Corsini, MC Larabi, G Lavoué, O Petřík… - Computer graphics …, 2013 - Wiley Online Library
Almost all mesh processing procedures cause some more or less visible changes in the appearance of objects represented by polygonal meshes. In many cases, such as mesh …
With the growing use of the internet and social media, data security has become a major issue. Thus, researchers are focusing on data security techniques such as steganography …