Research Article
Applying 3D Polygonal Mesh Watermarking for Transmission Security Protection through Sensor Networks
Table 1
Evaluation of robustness against the cropping attack.
| Model | Cropping ratio | Number of prongs | Number of correct prongs | BER |
| Bunny | | | | 12.5% | | | | 0.00% | | | | 0.00% |
| Head | | | | 0.00% | | | | 0.00% | | | | 0.00% |
| Hand | | | | 0.00% | | | | 0.00% | | | | 0.00% |
|
|