1. 3D mesh compression: survey, comparisons, and emerging trends;Maglo;ACM Comput. Surv.,2015
2. Dell SecureWorks Counter Threat Unit Threat Intelligence, Stegoloader: A Stealthy Information Stealer, (https://www.secureworks.com/research/stegoloader-a-stealthy-information-stealer), Accessed: 2019-11-01.
3. B. Stone-Gross, Malware Analysis of the Lurk Downloader, (https://www.secureworks.com/research/malware-analysis-of-the-lurk-downloader), Accessed: 2019-11-01.
4. Rethinking the high capacity 3D steganography: increasing its resistance to steganalysis;Li,2017
5. Embedding data in 3D models;Ohbuchi,1997