Computer Science ›› 2020, Vol. 47 ›› Issue (7): 328-334.doi: 10.11896/jsjkx.190800021
• Information Security • Previous Articles
REN Shuai1, WANG Meng1, FAN Ao-xiong1, GAO Ze1, XU Jie1, Shahzad KHURRAM1, ZHANG Tao2
CLC Number:
[1]HABBOULI O,MEGHERBI D B.A secure,self-recovery,and high capacity blind digital image information hiding and authentication scheme using DCT moments[C]//2017 IEEE International Symposium on Technologies for Homeland Security (HST).IEEE,2017:1-5. [2]YE J Q,EDWARD S,CLIVE R.Use of a 3D model to improve the performance of laser-based railway track inspection[J].Proceedings of the Institution of Mechanical Engineers,2019,233(3):337-355. [3]JIAO R,WANG Y M.Partial Steganography Algorithm of Triangular Mesh Model Introduced by Mason Rotation Algorithm[J].Electronic Measurement Technology,2017,40(12):228-232. [4]LIU Y Q.Three-dimensional data encryption and information hiding based on integrated imaging [D].Xi’an:Xidian University,2016. [5]REN S,HE Y,LIU Y N,et al.A zero-low frequency informationhiding algorithm based on scale-invariant local features [J/OL].[2018-12-24].http://kns.cnki.net/kcms/detail/51.1196.TP.20180811.1337.090.html. [6]GENG K,ZHANG D F,XIE D Q.3D Model Information Hiding Based on Framed Sampling and Wavelet HMM[J].Journal of Computer-Aided Design & Computer Graphics,2010,22(8):1406-1411. [7]REN S,SHI F X,ZHANG T.Information hiding algorithmbased on 3D model contour analysis[J].Journal of Computer Applications,2016,36(3):642-646. [8]REN S,ZHANG T,XU Z C,et al.Three-dimensional model information hiding algorithm for feature point labeling and clustering[J].Journal of Computer Applications,2018,38(4):1017-1022. [9]REN S,ZHANG T,YANG T,et al.Information hiding algorithm based on spherical segmentation of 3D model[J].Journal of Computer Applications,2017,37(9):2576-2580. [10]ENZBERG S V,AL-HAMADI A.A Multiresolution Approach to Model-Based 3-D Surface Quality Inspection[J].IEEE Transactions on Industrial Informatics,2017,12(4):1498-1507. [11]SUN J,DING Y,HUANG Z,et al.Laplacian Deformation Algorithm Based on Mesh Model Simplification[C]//2018 IEEE 3rd International Conference on Image,Vision and Computing (ICIVC).IEEE,2018:209-213. [12]YANG H,ZHOU F,LIN G,et al.Animated mesh simplification based on motion features in visual sensor networks[J].International Journal of Distributed Sensor Networks,2019,15(1):1-13. [13]ZHANG Y,WANG J D,ZHAO R B,et al.Segmentation andReconstruction Algorithm of Triangular Mesh Model Based on Half-Edge Folding[J].Journal of Yichun University,2014,36(6):12-16,31. [14]HOPPE H,DEROSE T,DUCHAMP T,et al.Mesh optimization[C]//Conference on Computer Graphics & Interactive Techniques.1993. [15]REN G F.Three-dimensional mesh blind watermarking algo-rithm for feature point regions [D].Jinan:Shandong University,2009. [16]HAN B,LI J.Medical Image Watermarking in Sub-block Three-dimensional Discrete Cosine Transform Domain[J].International Journal Bioautomation,2016,20(1):69-78. [17]BETTA G,CAPRIGLIONE D,CORVINO M,et al.Sensitivity analysis of influence quantities on signal-to-noise ratio in face-based recognition systems[C]//Proc of IEEE International Instrumentation & Measurement Technology Conference.IEEE,2017. [18]CARLSON N A,PORTER J R.On the cardinality of Hausdorffspaces and H-closed spaces[J].Topology & Its Applications,2017,160(1):137-142. [19]LIU J,YANG Y,MA D,et al.A Watermarking Method for 3D Models Based on Feature Vertex Localization[J].IEEE Access,2018,6:56122-56134. [20]YANG Y,IVRISSIMTZIS I.Mesh Discriminative Features for 3D Steganalysis[J].Proc of ACM Transactions on Multimedia Computing,Communications,and Applications,2014,10(3):1-13. |
|