P. Amat, W. Puech, S. Druon, and J. P. Pedeboy, Lossless 3D steganography based on MST and connectivity modification, Signal Processing : Image Communication, pp.400-412, 2010.
DOI : 10.1016/j.image.2010.05.002

URL : https://hal.archives-ouvertes.fr/lirmm-00600701

N. Aspert, D. Santa-cruz, and T. Ebrahimi, MESH: measuring errors between surfaces using the Hausdorff distance, Proceedings. IEEE International Conference on Multimedia and Expo, pp.705-708, 2002.
DOI : 10.1109/ICME.2002.1035879

C. L. Bajaj, V. Pascucci, and G. Zhuang, Progressive compression and transmission of arbitrary triangular meshes, Proceedings Visualization '99 (Cat. No.99CB37067), pp.307-537, 1999.
DOI : 10.1109/VISUAL.1999.809902

B. G. Baumgart, Winged edge polyhedron representation, 1972.

M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers, Format-Preserving Encryption, Selected Areas in Cryptography, pp.295-312, 2009.
DOI : 10.1007/978-3-642-05445-7_19

O. Benedens, Geometry-based watermarking of 3D models, IEEE Computer Graphics and Applications, vol.19, issue.1, pp.46-55, 1999.
DOI : 10.1109/38.736468

M. Berger, A. Tagliasacchi, L. M. Seversky, P. Alliez, J. A. Levine et al., State of the art in surface reconstruction from point clouds, Eurographics 2014 -State of the Art Reports, pp.161-185, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01017700

A. Bogomjakov, C. Gotsman, and M. Isenburg, Distortion-Free Steganography for Polygonal Meshes, Computer Graphics Forum, vol.27, issue.2, pp.637-642, 2008.
DOI : 10.1111/j.1467-8659.2008.01161.x

A. G. Bors and M. Luo, Optimized 3D Watermarking for Minimal Surface Distortion, IEEE Transactions on Image Processing, vol.22, issue.5, pp.1822-1835, 2013.
DOI : 10.1109/TIP.2012.2236345

J. Cao, J. Huang, and J. Ni, A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness, Information Hiding, pp.262-276, 2010.
DOI : 10.1080/10586458.1996.10504585

F. Cayre and B. Macq, Data hiding on 3-D triangle meshes, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.939-949, 2003.
DOI : 10.1109/TSP.2003.809380

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

H. Chang, H. Lee, T. C. Lin, and T. K. Truong, A weight method of decoding the (23, 12, 7) Golay code using reduced table lookup, 2008 International Conference on Communications, Circuits and Systems, pp.1-5, 2008.
DOI : 10.1109/ICCCAS.2008.4657714

M. Chao, C. Lin, C. Yu, and T. Lee, A High Capacity 3D Steganography Algorithm, IEEE Transactions on Visualization and Computer Graphics, vol.15, issue.2, pp.274-284, 2009.
DOI : 10.1109/TVCG.2008.94

B. Chen and G. W. , Quantization index modulation methods for digital watermarking and information embedding of multimedia Journal of VLSI signal processing systems for signal, image and video technology, pp.7-33, 2001.

Y. Cheng and C. Wang, An adaptive steganographic algorithm for 3D polygonal meshes. The Visual Computer, pp.9-11721, 2007.

J. Cho, R. Prost, and H. Jung, An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms, IEEE Transactions on Signal Processing, vol.55, issue.1, pp.142-155, 2007.
DOI : 10.1109/TSP.2006.882111

P. Cignoni, C. Rocchini, and R. Scopigno, Metro: Measuring Error on Simplified Surfaces, Computer Graphics Forum, vol.17, issue.2, 1996.
DOI : 10.1111/1467-8659.00236

M. Corsini, E. D. Gelasca, and T. Ebrahimi, A multi-scale roughness metric for 3D watermarking quality assessment, Workshop on Image Analysis for Multimedia Interactive Services. SPIE, 2005.

M. Corsini, E. D. Gelasca, T. Ebrahimi, and M. Barni, Watermarked 3-D Mesh Quality Assessment, IEEE Transactions on Multimedia, vol.9, issue.2, pp.247-256, 2007.
DOI : 10.1109/TMM.2006.886261

D. Cotting, T. Weyrich, M. Pauly, M. Gross, I. Cox et al., Robust watermarking of pointsampled geometry, Proceedings Shape Modeling Applications Digital Watermarking and Steganography, pp.233-242, 2004.

I. J. Cox, F. T. Kilian, J. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

B. Delaunay, Sur la sphère vide. a la mémoire de georges vorono¨?vorono¨? Bulletin de l'Académie des Sciences de l'URSS, Classe des sciences mathématiques et naturelles, pp.793-800, 1934.

M. Desoubeaux, C. Herzet, W. Puech, and G. L. Guelvouit, Enhanced blind decoding of tardos codes with new MAP-based functions, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp.283-288, 2013.
DOI : 10.1109/MMSP.2013.6659302

URL : https://hal.archives-ouvertes.fr/hal-00907670

N. V. Dharwadkar, B. B. Amberker, and A. Gorai, Non-blind watermarking scheme for color images in RGB space using DWT-SVD, 2011 International Conference on Communications and Signal Processing, pp.489-493, 2011.
DOI : 10.1109/ICCSP.2011.5739368

T. Dieck, Algebraic Topology. EMS textbooks in mathematics, 2008.

J. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003.
DOI : 10.1109/TSP.2003.809366

M. Eluard, Y. Maetz, and G. Doerr, Impact of geometry-preserving encryption on rendering time, 2014 IEEE International Conference on Image Processing (ICIP), pp.4787-4791, 2014.
DOI : 10.1109/ICIP.2014.7025970

J. Fridrich, Steganography in Digital Media : Principles, Algorithms, and Applications, 2009.
DOI : 10.1017/CBO9781139192903

J. Fridrich and J. Kodovsky, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/TIFS.2012.2190402

T. Furon, A Constructive and Unifying Framework for Zero-Bit Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.149-163, 2007.
DOI : 10.1109/TIFS.2007.897272

URL : https://hal.archives-ouvertes.fr/inria-00078445

T. Furon and P. Bas, A New Measure of Watermarking Security Applied on QIM, Information Hiding, pp.207-223, 2013.
DOI : 10.1007/978-3-642-36373-3_14

URL : https://hal.archives-ouvertes.fr/hal-00702689

T. Furon and M. Desoubeaux, Tardos codes for real, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.24-29, 2014.
DOI : 10.1109/WIFS.2014.7084298

URL : https://hal.archives-ouvertes.fr/hal-01066043

X. Gao, C. Zhang, Y. Huang, and Z. Deng, A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models, ACM Transactions on Multimedia Computing, Communications, and Applications, vol.8, issue.2S, pp.1-34, 2012.
DOI : 10.1145/2344436.2344440

H. Garg, S. Agrawal, and G. Varshneya, A non-blind image based watermarking for 3-D polygonal mesh using its geometrical properties, 2013 Sixth International Conference on Contemporary Computing (IC3), pp.313-318, 2013.
DOI : 10.1109/IC3.2013.6612211

M. J. Golay, Notes on digital coding, IEEE Proceedings, vol.37, p.657, 1949.

S. Gumhold, Z. Kami, M. Isenburg, and H. Seidel, Predictive point-cloud compression, ACM SIGGRAPH 2005 Sketches on , SIGGRAPH '05, p.137, 2005.
DOI : 10.1145/1187112.1187277

T. Gurung, M. Luffel, P. Lindstrom, and J. Rossignac, Lr : Compact connectivity representation for triangle meshes, ACM Transactions on Graphics, vol.30678, issue.4, pp.1-67, 2011.

H. Hoppe, Progressive meshes, Proceedings of the 23rd annual conference on Computer graphics and interactive techniques , SIGGRAPH '96, pp.99-108
DOI : 10.1145/237170.237216

W. R. Hamilton, On the icosian calculus, Proceedings of the Royal Irish Academy, p.462, 1853.

H. He and J. Zhang, Cryptanalysis on majority-voting based self-recovery watermarking scheme, Telecommunication Systems, vol.41, issue.2, pp.231-238, 2012.
DOI : 10.1007/s11235-010-9380-5

C. M. Hoffmann, Geometric and Solid Modeling : An Introduction, 1989.

V. Holub and J. Fridrich, Digital image steganography using universal distortion, Proceedings of the first ACM workshop on Information hiding and multimedia security, IH&MMSec '13, pp.59-68, 2013.
DOI : 10.1145/2482513.2482514

N. Huang, M. Li, and C. Wang, Toward Optimal Embedding Capacity for Permutation Steganography, IEEE Signal Processing Letters, vol.16, issue.9, pp.802-805, 2009.
DOI : 10.1109/LSP.2009.2024794

Y. Huang, Y. Itier, W. Puech, G. Gesquì, and J. Pedeboy, A Reversible Data Hiding Scheme for 3D Polygonal Models Based on Histogram Shifting with High Embedding Capacity, CORESA, pp.20-78, 2013.
DOI : 10.1007/s13319-015-0051-x

V. Itier, W. Puech, J. Pedeboy, and G. Gesquì-ere, Construction of a unique robust hamiltonian path for a vertex cloud, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp.105-110, 2013.
DOI : 10.1109/MMSP.2013.6659272

URL : https://hal.archives-ouvertes.fr/hal-01339264

V. Itier, W. Puech, and A. G. Bors, Cryptanalysis aspects in 3-D watermarking, 2014 IEEE International Conference on Image Processing (ICIP), pp.4772-4776, 2014.
DOI : 10.1109/ICIP.2014.7025967

URL : https://hal.archives-ouvertes.fr/lirmm-01379584

V. Itier, W. Puech, G. Gesquì, and J. Pedeboy, Joint synchronization and high capacity data hiding for 3D meshes, Proc. SPIE, pp.939305-939305, 2015.
URL : https://hal.archives-ouvertes.fr/lirmm-01379554

V. Itier, W. Puech, and J. Pedeboy, High capacity data-hiding for 3D meshes based on static arithmetic coding, IEEE International Conference on Image Processing (ICIP), 2015.

V. Itier, N. Tournier, W. Puech, G. Subsol, and J. Pedeboy, Analysis of an EMST-based path for 3D meshes, Computer-Aided Design, vol.64, pp.22-32, 2015.
DOI : 10.1016/j.cad.2015.02.005

URL : https://hal.archives-ouvertes.fr/lirmm-01233558

V. Itier, W. Puech, A. G. Bors, and J. Pedeboy, Secure High Capacity Data Hiding for 3d Meshes, IS&T Electronic Imaging
DOI : 10.2352/ISSN.2470-1173.2016.21.3DIPM-396

URL : https://hal.archives-ouvertes.fr/lirmm-01379552

V. Itier, W. Puech, and J. Pedeboy, Secure High Capacity Data Hiding for 3d Meshes, Multimedia Tools and Applications
DOI : 10.2352/ISSN.2470-1173.2016.21.3DIPM-396

URL : https://hal.archives-ouvertes.fr/lirmm-01379552

S. Jin, R. R. Lewis, and D. West, A comparison of algorithms for vertex normal computation. The Visual Computer, pp.71-82, 2005.

T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

S. Kanai, H. Date, and T. Kishinami, Digital watermarking for 3D polygons using multiresolution wavelet decomposition, Proceedings of Sixth IFIP WG, pp.296-307, 1998.

Z. Karni and C. Gotsman, Spectral compression of mesh geometry, Proceedings of the 27th annual conference on Computer graphics and interactive techniques , SIGGRAPH '00, pp.279-286, 2000.
DOI : 10.1145/344779.344924

H. Kaveh and M. Moin, A high-capacity and low-distortion 3D polygonal mesh steganography using surfacelet transform, Security and Communication Networks, vol.16, issue.4, pp.159-167, 2015.
DOI : 10.1002/sec.968

M. Kazhdan, M. Bolitho, and H. Hoppe, Poisson surface reconstruction, Proceedings of the Fourth Eurographics Symposium on Geometry Processing, SGP '06, pp.61-70, 2006.

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, pp.5-38, 1883.

J. M. Konstantinides, A. Mademlis, P. Daras, P. A. Mitkas, and M. G. Strintzis, Blind Robust 3-D Mesh Watermarking Based on Oblate Spheroidal Harmonics, IEEE Transactions on Multimedia, vol.11, issue.1, pp.23-38, 2009.
DOI : 10.1109/TMM.2008.2008913

S. Kouider, M. Chaumont, and W. Puech, Adaptive steganography by oracle (ASO), 2013 IEEE International Conference on Multimedia and Expo (ICME), pp.1-6, 2013.
DOI : 10.1109/ICME.2013.6607427

URL : https://hal.archives-ouvertes.fr/lirmm-00838993

J. B. Jr, On the Shortest Spanning Subtree of a Graph and the Traveling Salesman Problem, Proceedings of the American Mathematical society, vol.7, issue.1, pp.48-50, 1956.

D. Kundur and D. Hatzinakos, Digital watermarking for telltale tamper proofing and authentication, Proceedings of the IEEE, pp.1167-1180, 1999.
DOI : 10.1109/5.771070

M. Kutter, S. Voloshynovskiy, and A. Herrigel, <title>Watermark copy attack</title>, Security and Watermarking of Multimedia Contents II, pp.371-380, 2000.
DOI : 10.1117/12.384991

G. G. Langdon, Arithmetic coding, IBM Journal of Research and Development, vol.23, pp.149-162, 1979.

G. Lavoué, E. Drelie-gelasca, F. Dupont, A. Baskurt, and T. Ebrahimi, Perceptually driven 3D distance metrics with application to watermarking, Applications of Digital Image Processing XXIX, pp.63120-63121, 2006.
DOI : 10.1117/12.686964

G. Lavoué, A Multiscale Metric for 3D Mesh Visual Quality Assessment, Computer Graphics Forum, vol.34, issue.1, pp.1427-1437, 2011.
DOI : 10.1111/j.1467-8659.2011.02017.x

G. Lavoué, F. Denis, and F. Dupont, Subdivision surface watermarking, Computers & Graphics, vol.31, issue.3, pp.480-492, 2007.
DOI : 10.1016/j.cag.2007.01.022

G. Lavoué, F. Tola, and . Dupont, MEPP -3D mesh processing platform, GRAPP & IVAPP 2012 : Proceedings of the International Conference on Computer Graphics Theory and Applications and International Conference on Information Visualization Theory and Applications, pp.206-210659, 2005.

M. T. Li, N. C. Huang, and C. M. Wang, A novel high capacity 3D steganographic algorithm, International Journal of Innovative Computing, Information and Control, vol.7, issue.3, pp.1055-1074, 2011.

C. Lin and P. Shiu, High capacity data hiding scheme for DCT-based images, Journal of Information Hiding and Multimedia Signal Processing, vol.1, issue.3, pp.220-240, 2010.

C. Lin, M. Chao, J. Chen, C. Yu, and W. Hsu, A high-capacity distortion-free information hiding algorithm for 3D polygon models, nternational Journal of Innovative Computing, Information and Control, vol.20, issue.3, pp.1321-1335, 2013.

C. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller et al., Rotation, scale, and translation resilient watermarking for images, IEEE Transactions on Image Processing, vol.10, issue.5, pp.767-782, 2001.
DOI : 10.1109/83.918569

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. S. Lin, H. M. Liao, C. Lu, and J. Lin, Fragile watermarking for authenticating 3-D polygonal meshes, IEEE Transactions on Multimedia, vol.7, issue.6, pp.997-1006, 2005.
DOI : 10.1109/TMM.2005.858412

URL : https://ir.nctu.edu.tw:443/bitstream/11536/12982/1/000233471200001.pdf

Y. Liu, B. Prabhakaran, and X. Guo, A robust spectral approach for blind watermarking of manifold surfaces, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.43-52, 2008.
DOI : 10.1145/1411328.1411338

M. Lounsbery, T. D. Derose, and J. Warren, Multiresolution analysis for surfaces of arbitrary topological type, ACM Transactions on Graphics, vol.16, issue.1, pp.34-73, 1997.
DOI : 10.1145/237748.237750

M. Luo and A. G. Bors, Surface-preserving robust watermarking of 3-D shapes, IEEE Transactions on Image Processing, vol.20, issue.10, pp.2813-2826, 2011.

X. Mao, M. Shiba, and A. Imamiya, <title>Watermarking 3D geometric models through triangle subdivision</title>, Security and Watermarking of Multimedia Contents III, pp.253-260, 2001.
DOI : 10.1117/12.435406

Y. Maret and T. Ebrahimi, Data hiding on 3D polygonal meshes, Proceedings of the 2004 multimedia and security workshop on Multimedia and security , MM&Sec '04, pp.68-74, 2004.
DOI : 10.1145/1022431.1022445

G. Marsaglia, Choosing a Point from the Surface of a Sphere, The Annals of Mathematical Statistics, vol.43, issue.2, pp.645-646, 1972.
DOI : 10.1214/aoms/1177692644

B. Merry, P. Marais, and J. Gain, Compression of dense and regular point clouds, International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa, AFRIGRAPH '06, pp.15-20, 2006.

R. Motwani, M. C. Motwani, F. C. Harris, and S. Dascalu, An eigen-normal approach for 3D mesh watermarking using support vector machines, Journal of Electronic Science and Technology, vol.8, issue.3, pp.237-243, 2010.

D. Neeta, K. Snehal, and D. Jacobs, Implementation of LSB Steganography and Its Evaluation for Various Bits, 2006 1st International Conference on Digital Information Management, pp.173-178, 2007.
DOI : 10.1109/ICDIM.2007.369349

Z. Ni, Y. Shi, N. Ansari, and W. Su, Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology, pp.354-362, 2006.

R. Ohbuchi, H. Masuda, and M. Aono, Watermaking three-dimensional polygonal models, Proceedings of the fifth ACM international conference on Multimedia , MULTIMEDIA '97, pp.261-272, 1997.
DOI : 10.1145/266180.266377

R. Ohbuchi, S. Takahashi, T. Miyazawa, and A. Mukaiyama, Watermarking 3D polygonal meshes in the mesh spectral domain, Proceedings of Graphics Interface , GI '01, pp.9-17, 2001.

R. Ohbuchi, A. Mukaiyama, and S. Takahashi, Watermarking a 3D Shape Model Defined as a Point Set, 2004 International Conference on Cyberworlds, pp.392-399, 2004.
DOI : 10.1109/CW.2004.70

B. O. Neill, Elementary Differential Geometry, Revised 2nd Edition. Elementary Differential Geometry Series, 2006.

L. Perez-freire and F. Perez-gonzalez, Spread-Spectrum Watermarking Security, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, pp.2-24, 2009.
DOI : 10.1109/TIFS.2008.2009603

F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, Information hiding-a survey, Proceedings of the IEEE, pp.1062-1078, 1999.
DOI : 10.1109/5.771065

T. Pevn´ypevn´y, T. Filler, and P. Bas, Using high-dimensional image models to perform highly undetectable steganography

E. Praun, H. Hoppe, and A. Finkelstein, Robust mesh watermarking, Proceedings of the 26th annual conference on Computer graphics and interactive techniques , SIGGRAPH '99, pp.49-56, 1999.
DOI : 10.1145/311535.311540

Y. Qian, J. Dong, W. Wang, and T. Tan, Deep learning for steganalysis via convolutional neural networks Triangle surface mesh watermarking based on a constrained optimization framework, IS&T/SPIE Electronic Imaging, pp.94090-94090, 2014.

P. , R. Alface, and B. Macq, From 3D mesh data hiding to 3D shape blind and robust watermarking : A survey, Transactions on Data Hiding and Multimedia Security II, pp.91-115, 2007.

P. Rondao-alface, B. Macq, and F. Cayre, Blind and robust watermarking of 3D models : How to withstand the cropping attack, IEEE International Conference on Image Processing, pp.465-468, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00158056

J. Rossignac, Edgebreaker: connectivity compression for triangle meshes, IEEE Transactions on Visualization and Computer Graphics, vol.5, issue.1, pp.47-61, 1999.
DOI : 10.1109/2945.764870

G. Sansoni, M. Trebeschi, and F. Docchio, State-of-The-Art and Applications of 3D Imaging Sensors in Industry, Cultural Heritage, Medicine, and Criminal Investigation, Sensors, vol.9, issue.1, p.568, 2009.
DOI : 10.3390/s90100568

W. J. Schroeder, J. A. Zarge, and W. E. Lorensen, Decimation of triangle meshes, ACM SIGGRAPH Computer Graphics, vol.26, issue.2, pp.65-70, 1992.
DOI : 10.1145/142920.134010

J. Shuangshuang, R. R. Lewis, and D. West, A comparison of algorithms for vertex normal computation. The Visual Computer, pp.71-82, 2005.

G. J. Simmons, The Prisoners??? Problem and the Subliminal Channel, Advances in Cryptology, pp.51-67, 1984.
DOI : 10.1007/978-1-4684-4730-9_5

V. Surazhsky, T. Surazhsky, D. Kirsanov, S. J. Gortler, and H. Hoppe, Fast exact and approximate geodesics on meshes, ACM Transactions on Graphics, vol.24, issue.3, pp.553-560, 2005.
DOI : 10.1145/1073204.1073228

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Tardos, Optimal probabilistic fingerprint codes, ACM Symposium on Theory of Computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Taubin, Estimating the tensor of curvature of a surface from a polyhedral approximation, Proceedings of IEEE International Conference on Computer Vision, pp.902-907, 1995.
DOI : 10.1109/ICCV.1995.466840

J. Tian, Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, issue.8, pp.890-896, 2003.
DOI : 10.1109/TCSVT.2003.815962

J. Tierny, J. Vandeborre, and M. Daoudi, Topology driven 3D mesh hierarchical segmentation, IEEE International Conference on Shape Modeling and Applications 2007 (SMI '07), pp.215-220, 2007.
DOI : 10.1109/SMI.2007.38

URL : https://hal.archives-ouvertes.fr/hal-00725321

F. Torkhani, K. Wang, and J. Chassery, A curvature-tensor-based perceptual quality metric for 3D triangular meshes. Machine Graphics & Vision, pp.1-25, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00995716

N. Tournier, W. Puech, G. Subsol, and J. Pedeboy, Finding robust vertices for 3D synchronization based on Euclidean minimum spanning tree, Three-Dimensional Imaging, Interaction, and Measurement, pp.78640-78640, 2011.
DOI : 10.1117/12.872384

URL : https://hal.archives-ouvertes.fr/lirmm-00845510

Y. Tsai, An efficient 3D information hiding algorithm based on sampling concepts, Multimedia Tools and Applications, pp.1-17, 2015.
DOI : 10.1007/s11042-015-2707-1

S. Tu, W. Tai, M. Isenburg, and C. Chang, An improved data hiding approach for polygon meshes. The Visual Computer, pp.1177-1181, 2010.

F. Uccheddu, M. Corsini, and M. Barni, Wavelet-based blind watermarking of 3D models, Proceedings of the 2004 multimedia and security workshop on Multimedia and security , MM&Sec '04, pp.143-154
DOI : 10.1145/1022431.1022456

B. Vasic and B. Vasic, Simplification Resilient LDPC-Coded Sparse-QIM Watermarking for 3D-Meshes, IEEE Transactions on Multimedia, vol.15, issue.7, pp.1532-1542, 2013.
DOI : 10.1109/TMM.2013.2265673

J. Vollmer, R. Mencl, and H. Müller, Improved Laplacian Smoothing of Noisy Surface Meshes, Computer Graphics Forum, pp.131-138, 1999.
DOI : 10.1111/1467-8659.00334

S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, Attack modelling: towards a second generation watermarking benchmark, Signal Processing, vol.81, issue.6, pp.1177-1214, 2001.
DOI : 10.1016/S0165-1684(01)00039-1

C. Wang and Y. Cheng, An Efficient Information Hiding Algorithm for Polygon Models, Computer Graphics Forum, vol.87, issue.7, 2005.
DOI : 10.1111/j.1467-8659.2005.00884.x

C. Wang and P. Wang, Steganography on point-sampled geometry. Computers and Graphics, pp.244-254, 2006.

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, A Comprehensive Survey on Three-Dimensional Mesh Watermarking, IEEE Transactions on Multimedia, vol.10, issue.8, pp.1513-1527, 2008.
DOI : 10.1109/TMM.2008.2007350

K. Wang, G. Lavoue, F. Denis, and A. Baskurt, Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform, IEEE Transactions on Information Forensics and Security, vol.3, issue.4, pp.620-634, 2008.
DOI : 10.1109/TIFS.2008.2007229

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, Robust and Blind Watermarking of Polygonal Meshes Based on Volume Moments, 2009.

]. K. Wang, M. Luo, A. G. Bors, and F. Denis, Blind and robust mesh watermarking using manifold harmonics, 2009 16th IEEE International Conference on Image Processing (ICIP), pp.3657-3660, 2009.
DOI : 10.1109/ICIP.2009.5414248

URL : https://hal.archives-ouvertes.fr/hal-00958603

M. Wang and W. Chen, A majority-voting based watermarking scheme for color image tamper detection and recovery, Computer Standards & Interfaces, vol.29, issue.5, pp.561-570, 2007.
DOI : 10.1016/j.csi.2006.11.009

Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing, vol.13, issue.4, pp.600-612, 2004.
DOI : 10.1109/TIP.2003.819861

K. Weiler, Edge-Based Data Structures for Solid Modeling in Curved-Surface Environments, IEEE Computer Graphics and Applications, vol.5, issue.1, pp.21-40, 1985.
DOI : 10.1109/MCG.1985.276271

J. Wu and L. Kobbelt, Efficient spectral watermarking of large meshes with orthogonal basis functions. The Visual Computer, pp.8-10848, 2005.

T. Yamasaki, Y. Nakai, and K. Aizawa, An object-based non-blind watermarking that is robust to non-linear geometrical distortion attacks, 2009 16th IEEE International Conference on Image Processing (ICIP), pp.3669-3672, 2009.
DOI : 10.1109/ICIP.2009.5414239

H. Yang, X. Sun, and G. Sun, A high-capacity image data hiding scheme using adaptive LSB substitution, Radioengineering, vol.18, issue.4, p.509, 2009.

Y. Yang, Information Analysis for Steganography and Steganalysis in 3D Polygonal Meshes, 2013.

Y. Yang and I. Ivrissimtzis, Mesh Discriminative Features for 3D Steganalysis, Transactions on Multimedia Computing, Communications, and Applications, pp.1-2713, 2014.
DOI : 10.1145/2535555

Y. Yang, N. Peyerimhoff, and I. Ivrissimtzis, Linear Correlations between Spatial and Normal Noise in Triangle Meshes, IEEE Transactions on Visualization and Computer Graphics, vol.19, issue.1, pp.45-55, 2013.
DOI : 10.1109/TVCG.2012.106

Y. Yang, R. Pintus, and H. , Rushmeier, and I. Ivrissimtzis. A steganalytic algorithm for 3D polygonal meshes, IEEE International Conference on Image Processing (ICIP), pp.4782-4786, 2014.

B. Yeo and M. M. Yeung, Watermarking 3D objects for verification, IEEE Computer Graphics and Applications, vol.19, issue.1, pp.36-45, 1999.

S. Zafeiriou, A. Tefas, and I. Pitas, Blind Robust Watermarking Schemes for Copyright Protection of 3D Mesh Objects, IEEE Transactions on Visualization and Computer Graphics, vol.11, issue.5, pp.596-607, 2005.
DOI : 10.1109/TVCG.2005.71

J. Zhang, C. Zheng, and X. Hu, Triangle mesh compression along the Hamiltonian cycle, The Visual Computer, vol.30, issue.6, pp.717-727, 2013.
DOI : 10.1007/s00371-013-0808-2

X. Zhang and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, vol.14, issue.10, pp.727-730, 2007.
DOI : 10.1109/LSP.2007.896436