P. Amat, W. Puech, S. Druon, and J. Pedeboy, Lossless 3D steganography based on mst and connectivity modification, Signal Processing: Image Communication, vol.25, pp.400-412, 2010.
URL : https://hal.archives-ouvertes.fr/lirmm-00600701

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00088006

H. Chang, H. Lee, T. Lin, and T. Truong, A weight method of decoding the (23, 12, 7) golay code using reduced table lookup, pp.1-5, 2008.

M. Chao, C. Lin, C. Yu, and T. Lee, A high capacity 3D steganography algorithm, IEEE Transactions on Visualization and Computer Graphics, vol.15, issue.2, pp.274-284, 2009.

B. Chen and G. W. Wornell, Quantization index modulation methods for digital watermarking and information embedding of multimedia". ournal of VLSI signal processing systems for signal, image and video technology, vol.27, pp.7-33, 2001.

J. Cho, R. Prost, and H. Jung, An oblivious watermarking for 3D polygonal meshes using distribution of vertex norms, IEEE Transaction on Signal Processing, vol.55, issue.1, pp.142-155, 2007.

P. Cignoni, C. Rocchini, and R. Scopigno, Metro: Measuring error on simplified surfaces, 1996.

J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 2009.

X. Gao, C. Zhang, Y. Huang, and Z. Deng, A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models, ACM Transaction on Multimedia Computing, Communications and Applications, vol.8, issue.2S, 2012.

M. J. Golay, Notes on digital coding, IEEE Proc, vol.37, p.657, 1949.

R. C. Gonzalez and R. E. Woods, , 2006.

W. R. Hamilton, On the icosian calculus, Proceedings of the Royal Irish Academy, vol.6, p.1853

V. Itier, W. Puech, J. Pedeboy, and G. Gesquiere, Construction of a unique robust hamiltonian path for a vertex cloud, pp.105-110, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01339264

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, IX, pp.5-38, 1883.

G. Lavoué, A multiscale metric for 3D mesh visual quality assessment, Computer Graphics Forum, vol.30, issue.5, pp.1427-1437, 2011.

M. T. Li, N. C. Huang, and C. M. Wang, A novel high capacity 3D steganographic algorithm, vol.7, pp.1055-1074, 2011.

M. Luo and A. Bors, Surface-preserving robust watermarking of 3-D shapes, IEEE Transactions on Image Processing, vol.20, issue.10, pp.2813-2826, 2011.

R. Ohbuchi, H. Masuda, and M. Aono, Watermaking three-dimensional polygonal models, vol.16, pp.261-272, 1997.

P. Rondao-alface and B. Macq, From 3D mesh data hiding to 3D shape blind and robust watermarking: A survey, vol.4499, pp.91-115, 2007.

J. Rossignac, Edgebreaker: Connectivity compression for triangle meshes, IEEE Transactions on Visualization and Computer Graphics, vol.5, issue.1, pp.47-61, 1999.

B. Vasic and B. Vasic, Simplification resilient LDPC-coded sparse-QIM watermarking for 3D-meshes, IEEE Transactions on Multimedia, vol.15, issue.7, pp.1532-1542, 2013.

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, A comprehensive survey on three-dimensional mesh watermarking, IEEE Transactions on Multimedia, vol.10, issue.8, pp.1513-1527, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01531229

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, Robust and blind mesh watermarking based on volume moments, Computer Graphics, issue.35, pp.1-19, 2011.
DOI : 10.1016/j.cag.2010.09.010

URL : https://hal.archives-ouvertes.fr/hal-00958591

B. Yeo and M. Yeung, Watermarking 3D objects for verification, IEEE Computer Graphics and Applications, vol.19, issue.1, pp.36-45, 1999.