Fig. 1From: Deep 3D mesh watermarking with self-adaptive robustness3D mesh watermarking model. Actual watermarking procedure includes three processes: watermark embedding, attack and watermark extracting. Attack process represents the possible operations on the watermarked meshBack to article page