Research Article

Applying 3D Polygonal Mesh Watermarking for Transmission Security Protection through Sensor Networks

Figure 11

The prongs of the bunny model under the noise, smoothing, and simplification attacks.
305960.fig.0011a
(a) Noise attack
305960.fig.0011b
(b) Smoothing attack
305960.fig.0011c
(c) Simplification attack