Research Article
Hamming Code Based Watermarking Scheme for 3D Model Verification
Table 5
Comparison of previous methods and the proposed method.
| Comparison items | Methods | Yeo and Yeung’s method | Lin et al.’s method | Chou and Tseng’s method (2006) | Chou and Tseng’s method (2009) | Proposed method |
| No verification information | — | — | — | — | √ | No causality problem | — | √ | √ | √ | √ | No convergence problem | — | — | √ | √ | √ | No embedding holes | — | — | — | — | √ | Verification rate | — | — | ~42% | 12%~16% | 100% | Data hiding rate (bits/vertex) | <1 | <1 | <1.5 | <1.5 | 3 | Tampering detection | √ | √ | √ | √ | √ | Localization of tampered region | √ | √ | √ | √ | √ | Distortion control | — | √ | √ | √ | √ |
|
|