001454587 000__ 03638cam\a2200565\i\4500 001454587 001__ 1454587 001454587 003__ OCoLC 001454587 005__ 20230314003219.0 001454587 006__ m\\\\\o\\d\\\\\\\\ 001454587 007__ cr\cn\nnnunnun 001454587 008__ 230213s2023\\\\si\\\\\\ob\\\\000\0\eng\d 001454587 019__ $$a1368321450$$a1368325976$$a1368337849$$a1368363888$$a1369640769$$a1369642226 001454587 020__ $$a9789811977206$$q(electronic bk.) 001454587 020__ $$a9811977208$$q(electronic bk.) 001454587 020__ $$z9811977194 001454587 020__ $$z9789811977190 001454587 0247_ $$a10.1007/978-981-19-7720-6$$2doi 001454587 035__ $$aSP(OCoLC)1369792482 001454587 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP 001454587 049__ $$aISEA 001454587 050_4 $$aTA1636 001454587 08204 $$a005.8/2$$223/eng/20230213 001454587 1001_ $$aZhou, Hang,$$eauthor. 001454587 24510 $$aTriangle mesh watermarking and steganography /$$cHang Zhou, Kejiang Chen, Zehua Ma, Feng Wang, Weiming Zhang. 001454587 264_1 $$aSingapore :$$bSpringer,$$c[2023] 001454587 264_4 $$c©2023 001454587 300__ $$a1 online resource (xxii, 184 pages) 001454587 336__ $$atext$$btxt$$2rdacontent 001454587 337__ $$acomputer$$bc$$2rdamedia 001454587 338__ $$aonline resource$$bcr$$2rdacarrier 001454587 504__ $$aIncludes bibliographical references. 001454587 5050_ $$a1. Introduction -- 2. Watermarking, steganography and steganalysis -- 3. 3D mesh watermakring techniques -- 4. 3D mesh steganography and steganalysis techniques -- 5. Conclusion and Future Work. 001454587 506__ $$aAccess limited to authorized users. 001454587 520__ $$aThis book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding. 001454587 588__ $$aDescription based on print version record. 001454587 650_0 $$aDigital watermarking. 001454587 650_0 $$aImage steganography. 001454587 650_0 $$aCryptography. 001454587 655_0 $$aElectronic books. 001454587 7001_ $$aChen, Kejiang,$$eauthor. 001454587 7001_ $$aMa, Zehua,$$eauthor. 001454587 7001_ $$aWang, Feng,$$eauthor. 001454587 7001_ $$aZhang, Weiming,$$eauthor. 001454587 77608 $$iPrint version:$$tTRIANGLE MESH WATERMARKING AND STEGANOGRAPHY.$$d[Place of publication not identified] : SPRINGER VERLAG, SINGAPOR, 2023$$z9811977194$$w(OCoLC)1346349066 001454587 852__ $$bebk 001454587 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-7720-6$$zOnline Access$$91397441.1 001454587 909CO $$ooai:library.usi.edu:1454587$$pGLOBAL_SET 001454587 980__ $$aBIB 001454587 980__ $$aEBOOK 001454587 982__ $$aEbook 001454587 983__ $$aOnline 001454587 994__ $$a92$$bISE