{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:01:05Z","timestamp":1771700465738,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030000202","type":"print"},{"value":"9783030000219","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00021-9_21","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T15:21:11Z","timestamp":1537888871000},"page":"223-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["3D Steganalysis Using Laplacian Smoothing at Various Levels"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4852-5055","authenticated-orcid":false,"given":"Zhenyu","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8019-1713","authenticated-orcid":false,"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7838-0021","authenticated-orcid":false,"given":"Adrian G.","family":"Bors","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Abdulrahman, H., Chaumont, M., Montesinos, P., Magnier, B.: Color image steganalysis based on steerable Gaussian filters bank. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 109\u2013114 (2016)","DOI":"10.1145\/2909827.2930799"},{"issue":"5","key":"21_CR2","doi-asserted-by":"publisher","first-page":"1822","DOI":"10.1109\/TIP.2012.2236345","volume":"22","author":"AG Bors","year":"2013","unstructured":"Bors, A.G., Luo, M.: Optimized 3D watermarking for minimal surface distortion. IEEE Trans. Image Process. 22(5), 1822\u20131835 (2013)","journal-title":"IEEE Trans. Image Process."},{"key":"21_CR3","unstructured":"Chao, M.W., Lin, C.h., Yu, C.W., Lee, T.Y.: A high capacity 3D steganography algorithm. IEEE Trans. Vis. Comput. Graph. 15(2), 274\u2013284 (2009)"},{"issue":"3","key":"21_CR4","doi-asserted-by":"publisher","first-page":"73:1","DOI":"10.1145\/1531326.1531379","volume":"28","author":"X Chen","year":"2009","unstructured":"Chen, X., Golovinskiy, A., Funkhouser, T.: A benchmark for 3D mesh segmentation. ACM Trans. Graph. 28(3), 73:1\u201373:12 (2009)","journal-title":"ACM Trans. Graph."},{"issue":"1","key":"21_CR5","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/TSP.2006.882111","volume":"55","author":"JW Cho","year":"2007","unstructured":"Cho, J.W., Prost, R., Jung, H.Y.: An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Trans. Signal Process. 55(1), 142\u2013155 (2007)","journal-title":"IEEE Trans. Signal Process."},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"JJ Fridrich","year":"2003","unstructured":"Fridrich, J.J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310\u2013323. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36415-3_20"},{"issue":"3","key":"21_CR7","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsk\u00fd, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"24","key":"21_CR8","doi-asserted-by":"publisher","first-page":"26421","DOI":"10.1007\/s11042-016-4163-y","volume":"76","author":"V Itier","year":"2017","unstructured":"Itier, V., Puech, W.: High capacity data hiding for 3D point clouds based on static arithmetic coding. Multimed. Tools Appl. 76(24), 26421\u201326445 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"21_CR9","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-981-10-4154-9_42","volume-title":"Information Science and Applications 2017","author":"D Kim","year":"2017","unstructured":"Kim, D., et al.: Improved 3D mesh steganalysis using homogeneous kernel map. In: Kim, K., Joukov, N. (eds.) ICISA 2017. LNEE, vol. 424, pp. 358\u2013365. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-4154-9_42"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Kodovsky, J., Fridrich, J.J.: Calibration revisited. In: Proceedings of the ACM Workshop on Multimedia and Security, pp. 63\u201374 (2009)","DOI":"10.1145\/1597817.1597830"},{"issue":"2","key":"21_CR11","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u1ef3","year":"2012","unstructured":"Kodovsk\u1ef3, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Li, Z., Beugnon, S., Puech, W., Bors, A.G.: Rethinking the high capacity 3D steganography: increasing its resistance to steganalysis. In: Proceedings of the IEEE International Conference on Image Processing, pp. 510\u2013514 (2017)","DOI":"10.1109\/ICIP.2017.8296333"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Li, Z., Bors, A.G.: 3D mesh steganalysis using local shape features. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2144\u20132148 (2016)","DOI":"10.1109\/ICASSP.2016.7472056"},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.ins.2017.06.011","volume":"415\u2013416","author":"Z Li","year":"2017","unstructured":"Li, Z., Bors, A.G.: Steganalysis of 3D objects using statistics of local feature sets. Inf. Sci. 415\u2013416, 85\u201399 (2017)","journal-title":"Inf. Sci."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Li, Z., Hu, Z., Luo, X., Lu, B.: Embedding change rate estimation based on ensemble learning. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 77\u201384 (2013)","DOI":"10.1145\/2482513.2482528"},{"issue":"10","key":"21_CR16","doi-asserted-by":"publisher","first-page":"2813","DOI":"10.1109\/TIP.2011.2142004","volume":"20","author":"M Luo","year":"2011","unstructured":"Luo, M., Bors, A.G.: Surface-preserving robust watermarking of 3-D shapes. IEEE Trans. Image Process. 20(10), 2813\u20132826 (2011)","journal-title":"IEEE Trans. Image Process."},{"key":"21_CR17","doi-asserted-by":"publisher","unstructured":"Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set $$\\alpha $$-positive region reduction. IEEE Trans. Circuits Syst. Video Technol. (2018). https:\/\/doi.org\/10.1109\/TCSVT.2018.2799243","DOI":"10.1109\/TCSVT.2018.2799243"},{"issue":"9","key":"21_CR18","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1109\/TIFS.2015.2421322","volume":"10","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Cai, T., Tang, M., Wang, L.: AMR steganalysis based on the probability of same pulse position. IEEE Trans. Inf. Forensics Secur. 10(9), 1801\u20131811 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"21_CR19","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TIFS.2016.2636087","volume":"12","author":"Y Ren","year":"2017","unstructured":"Ren, Y., Yang, J., Wang, J., Wang, L.: AMR steganalysis based on second-order difference of pitch delay. IEEE Trans. Inf. Forensics Secur. 12(6), 1345\u20131357 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 15\u201323 (2015)","DOI":"10.1145\/2756601.2756608"},{"issue":"4","key":"21_CR21","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TIFS.2015.2507159","volume":"11","author":"W Tang","year":"2016","unstructured":"Tang, W., Li, H., Luo, W., Huang, J.: Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans. Inf. Forensics Secur. 11(4), 734\u2013745 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Taubin, G.: A signal processing approach to fair surface design. In: Proceedings of the 22nd Annual Conference on Computer Graphics and Interactive Techniques, pp. 351\u2013358 (1995)","DOI":"10.1145\/218380.218473"},{"issue":"4","key":"21_CR23","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/TIFS.2008.2007229","volume":"3","author":"K Wang","year":"2008","unstructured":"Wang, K., Lavou\u00e9, G., Denis, F., Baskurt, A.: Hierarchical watermarking of semiregular meshes based on wavelet transform. IEEE Trans. Inf. Forensics Secur. 3(4), 620\u2013634 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"21_CR24","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TIFS.2014.2308633","volume":"9","author":"K Wang","year":"2014","unstructured":"Wang, K., Zhao, H., Wang, H.: Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans. Inf. Forensics Secur. 9(5), 741\u2013751 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"21_CR25","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1111\/j.1467-8659.2010.01767.x","volume":"29","author":"Y Yang","year":"2010","unstructured":"Yang, Y., Ivrissimtzis, I.: Polygonal mesh watermarking using Laplacian coordinates. Comput. Graph. Forum 29(5), 1585\u20131593 (2010)","journal-title":"Comput. Graph. Forum"},{"issue":"3","key":"21_CR26","doi-asserted-by":"publisher","first-page":"27:1","DOI":"10.1145\/2535555","volume":"10","author":"Y Yang","year":"2014","unstructured":"Yang, Y., Ivrissimtzis, I.: Mesh discriminative features for 3D steganalysis. ACM Trans. Multimed. Comput. Commun. Appl. 10(3), 27:1\u201327:13 (2014)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Yang, Y., Pintus, R., Rushmeier, H., Ivrissimtzis, I.: A steganalytic algorithm for 3D polygonal meshes. In: Proceedings of the IEEE International Conference on Image Processing, pp. 4782\u20134786 (2014)","DOI":"10.1109\/ICIP.2014.7025969"},{"issue":"2","key":"21_CR28","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1109\/TVCG.2016.2525771","volume":"23","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Pintus, R., Rushmeier, H., Ivrissimtzis, I.: A 3D steganalytic algorithm and steganalysis-resistant watermarking. IEEE Trans. Vis. Comput. Graph. 23(2), 1002\u20131013 (2017)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"issue":"2","key":"21_CR29","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/TIFS.2016.2623587","volume":"12","author":"H Zhang","year":"2017","unstructured":"Zhang, H., Cao, Y., Zhao, X.: A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality. IEEE Trans. Inf. Forensics Secur. 12(2), 465\u2013478 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"21_CR30","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146(2), 99\u2013111 (2018)","journal-title":"Signal Process."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00021-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T11:11:31Z","timestamp":1693912291000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00021-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000202","9783030000219"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00021-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}