Research Article

Applying 3D Polygonal Mesh Watermarking for Transmission Security Protection through Sensor Networks

Table 1

Evaluation of robustness against the cropping attack.

Model Cropping ratio Number of prongs Number of correct prongs BER

Bunny 12.5%
0.00%
0.00%

Head 0.00%
0.00%
0.00%

Hand 0.00%
0.00%
0.00%