{"id":"https://openalex.org/W4382119341","doi":"https://doi.org/10.1109/tvcg.2023.3289234","title":"Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion","display_name":"Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion","publication_year":2023,"publication_date":"2023-06-26","ids":{"openalex":"https://openalex.org/W4382119341","doi":"https://doi.org/10.1109/tvcg.2023.3289234","pmid":"https://pubmed.ncbi.nlm.nih.gov/37363849"},"language":"en","primary_location":{"id":"doi:10.1109/tvcg.2023.3289234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvcg.2023.3289234","pdf_url":null,"source":{"id":"https://openalex.org/S84775595","display_name":"IEEE Transactions on Visualization and Computer Graphics","issn_l":"1077-2626","issn":["1077-2626","1941-0506","2160-9306"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Visualization and Computer Graphics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008818464","display_name":"Jiahao Zhu","orcid":"https://orcid.org/0000-0003-4228-6900"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahao Zhu","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022068526","display_name":"Mingfu Xue","orcid":"https://orcid.org/0000-0003-2408-503X"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingfu Xue","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101889358","display_name":"Xinpeng Zhang","orcid":"https://orcid.org/0000-0002-0212-3501"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinpeng Zhang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068837264","display_name":"Xiaochun Cao","orcid":"https://orcid.org/0000-0001-7141-708X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochun Cao","raw_affiliation_strings":["School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085698418"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":2.2646,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.90094087,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"30","issue":"8","first_page":"5299","last_page":"5312"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.914233922958374},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8843463063240051},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7681516408920288},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.762081503868103},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.63026362657547},{"id":"https://openalex.org/keywords/distortion-function","display_name":"Distortion function","score":0.5749838352203369},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5700228214263916},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5229357481002808},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4569871425628662},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4397917687892914},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43777304887771606},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4118385910987854},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.41139790415763855},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4052768051624298},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3751720190048218},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06957802176475525}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.914233922958374},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8843463063240051},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7681516408920288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.762081503868103},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.63026362657547},{"id":"https://openalex.org/C2780803321","wikidata":"https://www.wikidata.org/wiki/Q5283073","display_name":"Distortion function","level":3,"score":0.5749838352203369},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5700228214263916},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5229357481002808},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4569871425628662},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4397917687892914},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43777304887771606},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4118385910987854},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.41139790415763855},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4052768051624298},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3751720190048218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06957802176475525},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tvcg.2023.3289234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvcg.2023.3289234","pdf_url":null,"source":{"id":"https://openalex.org/S84775595","display_name":"IEEE Transactions on Visualization and Computer Graphics","issn_l":"1077-2626","issn":["1077-2626","1941-0506","2160-9306"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Visualization and Computer Graphics","raw_type":"journal-article"},{"id":"pmid:37363849","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/37363849","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on visualization and computer graphics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1539122364","https://openalex.org/W1608784021","https://openalex.org/W1663899164","https://openalex.org/W1955882805","https://openalex.org/W1972398429","https://openalex.org/W1973466159","https://openalex.org/W2009999833","https://openalex.org/W2048413770","https://openalex.org/W2052018244","https://openalex.org/W2074522216","https://openalex.org/W2087953725","https://openalex.org/W2115270672","https://openalex.org/W2124664712","https://openalex.org/W2131711692","https://openalex.org/W2134527668","https://openalex.org/W2136627726","https://openalex.org/W2139758408","https://openalex.org/W2151792723","https://openalex.org/W2154026545","https://openalex.org/W2165551908","https://openalex.org/W2170598445","https://openalex.org/W2396870857","https://openalex.org/W2542290803","https://openalex.org/W2565794551","https://openalex.org/W2594683627","https://openalex.org/W2596845479","https://openalex.org/W2744272290","https://openalex.org/W2749768754","https://openalex.org/W2767111657","https://openalex.org/W2892168389","https://openalex.org/W2900851980","https://openalex.org/W2904653265","https://openalex.org/W2960108949","https://openalex.org/W2995378991","https://openalex.org/W3008669042","https://openalex.org/W3154869815","https://openalex.org/W4253000688","https://openalex.org/W6763422710"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W1716757876","https://openalex.org/W4388996884","https://openalex.org/W2527082845"],"abstract_inverted_index":{"Current":[0],"3D":[1,65,103,206],"mesh":[2,127],"steganography":[3,19,29,54],"algorithms":[4],"relying":[5],"on":[6,83],"geometric":[7,136],"modification":[8,161],"are":[9],"prone":[10],"to":[11,22,73,113,129],"detection":[12],"by":[13,43,100],"steganalyzers.":[14,104],"In":[15],"traditional":[16],"steganography,":[17],"adaptive":[18,39],"has":[20],"proven":[21],"be":[23,177],"an":[24,84],"efficient":[25,53],"means":[26],"of":[27,46,77,94,167,174],"enhancing":[28],"security.":[30],"Taking":[31],"inspiration":[32],"from":[33],"this,":[34],"we":[35,57,109,149,183],"propose":[36],"a":[37,48,59,69,91,130,140,185],"highly":[38],"embedding":[40,61,142,147],"algorithm,":[41],"guided":[42],"the":[44,75,95,101,111,121,145,151,159,168,172,191],"principle":[45],"minimizing":[47,120],"carefully":[49],"crafted":[50],"distortion":[51,71,81,112],"through":[52],"codes.":[55],"Specifically,":[56],"tailor":[58],"payload-limited":[60],"optimization":[62],"problem":[63],"for":[64,164,190],"settings":[66],"and":[67,87,116,135,187],"devise":[68],"feature-preserving":[70],"(FPD)":[72],"measure":[74],"impact":[76],"message":[78],"embedding.":[79],"The":[80,194],"takes":[82],"additive":[85],"form":[86],"is":[88],"defined":[89],"as":[90],"weighted":[92],"difference":[93],"effective":[96],"steganalytic":[97,134],"subfeatures":[98],"utilized":[99],"current":[102],"With":[105],"practicality":[106],"in":[107,204],"mind,":[108],"refine":[110],"enhance":[114],"robustness":[115],"computational":[117],"efficiency.":[118],"By":[119],"FPD,":[122],"our":[123,199],"algorithm":[124,200],"can":[125,176],"preserve":[126],"features":[128],"considerable":[131],"extent,":[132],"including":[133],"features,":[137],"while":[138],"achieving":[139],"high":[141],"capacity.":[143],"During":[144],"practical":[146],"phase,":[148],"employ":[150],"Q-layered":[152,169],"syndrome":[153],"trellis":[154],"code":[155],"(STC).":[156],"However,":[157],"calculating":[158],"bit":[160],"probability":[162],"(BMP)":[163],"each":[165],"layer":[166],"STC,":[170],"given":[171],"variation":[173],"Q,":[175],"cumbersome.":[178],"To":[179],"address":[180],"this":[181],"issue,":[182],"design":[184],"universal":[186],"automatic":[188],"approach":[189],"BMP":[192],"calculation.":[193],"experimental":[195],"results":[196],"demonstrate":[197],"that":[198],"achieves":[201],"state-of-the-art":[202],"performance":[203],"countering":[205],"steganalysis.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
