S. C-¸-iftçi, A. O. Akyüz, and T. Ebrahimi, A reliable and reversible image privacy protection based on false colors, IEEE Transactions on Multimedia, vol.20, issue.1, pp.68-81, 2018.

Z. Shahid and W. Puech, Visual protection of hevc video by selective encryption of cabac binstrings, IEEE Transactions on Multimedia, vol.16, issue.1, pp.24-36, 2014.
URL : https://hal.archives-ouvertes.fr/lirmm-01237024

Y. Zheng, X. Yuan, X. Wang, J. Jiang, C. Wang et al., Toward encrypted cloud media center with secure deduplication, IEEE Transactions on Multimedia, vol.19, issue.2, pp.251-265, 2017.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

G. R. Blakley, Safeguarding cryptographic keys, Proceedings of the National Computer Conference, vol.48, pp.313-317, 1979.

C. Thien and J. Lin, Secret image sharing, Computers & Graphics, vol.26, issue.5, pp.765-770, 2002.

, An image-sharing method with user-friendly shadow images, IEEE Transactions on circuits and systems for video technology, vol.13, pp.1161-1169, 2003.

C. Lin and W. Tsai, Secret image sharing with steganography and authentication, Journal of Systems and software, vol.73, issue.3, pp.405-414, 2004.

C. Yang, T. Chen, K. H. Yu, and C. Wang, Improvements of image sharing with steganography and authentication, Journal of Systems and software, vol.80, issue.7, pp.1070-1076, 2007.

E. Elsheh and A. B. Hamza, Secret sharing approaches for 3d object encryption, Expert Systems with Applications, vol.38, issue.11, pp.13-906, 2011.

L. J. Anbarasi and G. A. Mala, Verifiable multi secret sharing scheme for 3d models, International Arab Journal of Information Technology, vol.12, issue.6, pp.708-713, 2015.

A. Martín-del and R. , A multi-secret sharing scheme for 3d solid objects, Expert Systems with Applications, vol.42, issue.4, pp.2114-2120, 2015.

Y. Tsai, A secret 3d model sharing scheme with reversible data hiding based on space subdivision, 3D Research, vol.7, issue.1, p.1, 2016.

S. Lee, Y. Huang, and J. Lin, Protection of 3d models using cross recovery, Multimedia Tools and Applications, vol.76, issue.1, pp.243-264, 2017.

D. A. Huffman, A method for the construction of minimum-redundancy codes, Proceedings of the IRE, vol.40, pp.1098-1101, 1952.

P. Deutsch and J. Gailly, Zlib compressed data format specification version 3.3, 1996.

R. Wang and C. Su, Secret image sharing with smaller shadow images, Pattern Recognition Letters, vol.27, issue.6, pp.551-555, 2006.

C. Yang, T. Chang, and M. Hwang, A (t,n) multi-secret sharing scheme, vol.151, pp.483-490

J. Zhao, J. Zhang, and R. Zhao, A practical verifiable multi-secret sharing scheme, vol.29, pp.138-141, 2007.

A. M. Rey, J. P. Mateus, and G. R. Sánchez, A secret sharing scheme based on cellular automata, Applied mathematics and computation, vol.170, issue.2, pp.1356-1364, 2005.

J. Rossignac, Edgebreaker: connectivity compression for triangle meshes, IEEE Transactions on Visualization and Computer Graphics, vol.5, issue.1, pp.47-61, 1999.

I. S. Reed and G. Solomon, Polynomial codes over certain finite fields, Journal of the society for industrial and applied mathematics, vol.8, issue.2, pp.300-304, 1960.

C. Lin, M. Chao, J. Chen, C. Yu, and W. Hsu, A highcapacity distortion-free information hiding algorithm for 3d polygon models, International Journal of Innovative Computing, Information & Control, vol.9, issue.3, pp.1321-1335, 2013.

A. Bogomjakov, C. Gotsman, and M. Isenburg, Distortion-free steganography for polygonal meshes, Computer graphics forum, vol.27, pp.637-642, 2008.

M. Gschwandtner and A. Uhl, Protected Progressive Meshes, 2009.

M. Eluard, Y. Maetz, and G. Doërr, Impact of geometry-preserving encryption on rendering time, IEEE International Conference on Image Processing (ICIP, 2014.

K. Wang, G. Lavoue, F. Denis, and A. Baskurt, A comprehensive survey on three-dimensional mesh watermarking, IEEE Transactions on Multimedia, vol.10, issue.8, pp.1513-1527, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01531229

R. Jiang, H. Zhou, W. Zhang, and N. Yu, Reversible data hiding in encrypted three-dimensional mesh models, IEEE Transactions on Multimedia, vol.20, issue.1, pp.55-67, 2018.

, Ieee standard for floating-point arithmetic, IEEE Std, pp.1-70, 2008.

N. Aspert, D. Santa-cruz, and T. Ebrahimi, Mesh: Measuring errors between surfaces using the hausdorff distance, IEEE International Conference on Multimedia and Expo (ICME), 2002.

P. Cignoni, C. Rocchini, and R. Scopigno, Metro: Measuring error on simplified surfaces, Computer Graphics Forum, vol.17, issue.2, pp.167-174, 1998.

G. Lavoue and M. Corsini, A comparison of perceptually-based metrics for objective evaluation of geometry processing, IEEE Transactions on Multimedia, vol.12, issue.7, pp.636-649, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01381540

S. Jeong and J. Sim, Saliency detection for 3d surface geometry using semi-regular meshes, IEEE Transactions on Multimedia, vol.19, issue.12, pp.2692-2705, 2017.

L. Dong, Y. Fang, W. Lin, and H. S. Seah, Perceptual quality assessment for 3d triangle mesh based on curvature, IEEE Transactions on Multimedia, vol.17, issue.12, pp.2174-2184, 2015.

A. Said, Measuring the strength of partial encryption schemes, IEEE International Conference on Image Processing (ICIP), 2005.

L. Herrmann, Laplacian-isoparametric grid generation scheme, Journal of the Engineering Mechanics Division, vol.102, issue.5, pp.749-907, 1976.

G. Taubin, Curve and surface smoothing without shrinkage, Proceedings., Fifth International Conference on, pp.852-857, 1995.

W. E. Lorensen and H. E. Cline, Marching cubes: A high resolution 3d surface construction algorithm, SIGGRAPH Computer Graphics, vol.21, issue.4, pp.163-169, 1987.

, Since then, he prepares his Ph.D. Degree in applied computer sciences, through a thesis between the LIRMM Laboratory and STRATEGIES company. His current interests are mainly in the areas of Computer Graphics, Sébastien Beugnon received his M.D. in Computer Sciences from the Univ, 2016.