Research Article
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models
Table 4
Comparison of previous and current methods.
| Type | Vertex-based | Region-based |
| Algorithm | [9] | [11] | [12] | [8] | [10] | [14] | Our approach |
| Publicity | Semiblind | Blind | Blind | Blind | Blind | Semiblind | Blind |
| Embedding rate | 100% | 100% | 100% | 13.47% | 34.08% | N. A. | 26.85% |
| Embedding capacity | 1 | 48 | 3 | 1 | N. A. | <1 | 3.27–8.95 |
| Adaptability | No | No | No | No | No | No | Yes |
| Distortion control | Yes | Yes | No | Yes | Yes | No | Yes |
| Robustness | Vertex reorder | ST | Vertex reorder | ST | ST | Vertex reorder | ST |
| Method | QIM | QIM | Hamming code | QIM | QIM | Iterative perturbation | Message-digit substitution |
|
|