Fig. (4) Different attacks: (a) Original volume data; (b) Gaussian noise(3%); (c) JPEG compression(4%); (d) Median filter([3×3]) ;(e) Rotation(20°); (f) Scaling(0.5 times); (g) Translation(10%, down); (h) Cropping(8%, from z direction).