{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T12:36:29Z","timestamp":1751373389710},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030141172"},{"type":"electronic","value":"9783030141189"}],"license":[{"start":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T00:00:00Z","timestamp":1552780800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-14118-9_66","type":"book-chapter","created":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T15:02:59Z","timestamp":1552748579000},"page":"669-679","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Fragile Watermarking Techniques for 3D Model Authentication: Review"],"prefix":"10.1007","author":[{"given":"Kariman M.","family":"Mabrouk","sequence":"first","affiliation":[]},{"given":"Noura A.","family":"Semary","sequence":"additional","affiliation":[]},{"given":"Hatem","family":"Abdul-Kader","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,17]]},"reference":[{"issue":"2","key":"66_CR1","first-page":"328","volume":"7","author":"CM Chou","year":"2007","unstructured":"Chou, C.M., Tseng, D.C.: Technologies for 3D model watermarking: a survey. Int. J. Comput. Sci. Netw. Secur. 7(2), 328\u2013334 (2007)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"3","key":"66_CR2","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/TIP.2005.863116","volume":"15","author":"AG Bors","year":"2006","unstructured":"Bors, A.G.: Watermarking mesh-based representations of 3-D objects using local moments. IEEE Trans. Image Process. 15(3), 687\u2013701 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"66_CR3","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/49.668977","volume":"16","author":"R Ohbuchi","year":"1998","unstructured":"Ohbuchi, R., Masuda, H., Aono, M.: Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Sel. Areas Commun. 16(4), 551\u2013560 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"volume-title":"3D Object Processing: Compression Indexing and Watermarking","year":"2008","key":"66_CR4","unstructured":"Dugelay, J.L., Baskurt, A., Daoudi, M. (eds.): 3D Object Processing: Compression Indexing and Watermarking. Wiley, Hoboken (2008)"},{"issue":"1","key":"66_CR5","first-page":"225","volume":"10","author":"S Ichikawa","year":"2002","unstructured":"Ichikawa, S., Chiyama, H., Akabane, K.: Redundancy in 3D polygon models and its application to digital signature. J. WSCG 10(1), 225\u2013232 (2002)","journal-title":"J. WSCG"},{"key":"66_CR6","doi-asserted-by":"crossref","unstructured":"Wu, H.T., Cheung, Y.M.: Public authentication of 3D mesh models. In: 2006 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings) (WI 2006), Hong Kong, pp. 940\u2013948, December 2006","DOI":"10.1109\/WI.2006.140"},{"key":"66_CR7","doi-asserted-by":"crossref","unstructured":"Bennour, J., Dugelay, J.L.: Protection of 3D object visual representations. In: 2006 IEEE International Conference on Multimedia and Expo, Toronto, Ontario, pp. 1113\u20131116, July 2006","DOI":"10.1109\/ICME.2006.262730"},{"key":"66_CR8","unstructured":"Bennour, J., Dugelay, J.L.: Protection of 3D object through silhouette watermarking. In: 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, Toulouse, pp. 221\u2013224, May 2006"},{"key":"66_CR9","unstructured":"Sales, M.M., Rondao Alface, P., Macq, B.: 3D objects watermarking and tracking of their visual representations. In: The Third International Conferences on Advances in Multimedia (2011)"},{"key":"66_CR10","doi-asserted-by":"crossref","unstructured":"Werghi, N., Medimegh, N., Gazzah, S.: Watermarking of 3D triangular mesh models using ordered ring facets. In: 10th International Multi-Conference on Systems, Signals and Devices, SSD, pp. 1\u20136 (2013)","DOI":"10.1109\/SSD.2013.6564006"},{"key":"66_CR11","doi-asserted-by":"crossref","unstructured":"Mao, X., Shiba, M., Imamiya, A.: Watermarking 3D geometric models through triangle subdivision. In: Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 253\u2013260, August 2001","DOI":"10.1117\/12.435406"},{"issue":"1","key":"66_CR12","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/38.736467","volume":"19","author":"BL Yeo","year":"1999","unstructured":"Yeo, B.L., Yeung, M.M.: Watermarking 3D objects for verification. IEEE Comput. Graph. Appl. 19(1), 36\u201345 (1999)","journal-title":"IEEE Comput. Graph. Appl."},{"issue":"6","key":"66_CR13","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1109\/TMM.2005.858412","volume":"7","author":"HY Lin","year":"2005","unstructured":"Lin, H.Y., Liao, H.Y., Lu, C.S., Lin, J.C.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997\u20131006 (2005)","journal-title":"IEEE Trans. Multimedia"},{"issue":"11","key":"66_CR14","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.cad.2006.06.009","volume":"38","author":"CM Chou","year":"2006","unstructured":"Chou, C.M., Tseng, D.C.: A public fragile watermarking scheme for 3D model authentication. Comput. Aided Des. 38(11), 1154\u20131165 (2006)","journal-title":"Comput. Aided Des."},{"issue":"4","key":"66_CR15","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1109\/TSP.2003.809380","volume":"51","author":"F Cayre","year":"2003","unstructured":"Cayre, F., Macq, B.: Data hiding on 3-D triangle meshes. IEEE Trans. Signal Process. 51(4), 939\u2013949 (2003)","journal-title":"IEEE Trans. Signal Process."},{"key":"66_CR16","doi-asserted-by":"crossref","unstructured":"Tsai, Y.Y., Tsai, Y.S., Chang, C.C.: An improved region-based tampered detection algorithm for 3D polygonal models. In: 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, pp. 1163\u20131166 (2018)","DOI":"10.1109\/ICASI.2018.8394492"},{"issue":"2","key":"66_CR17","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MCG.2009.20","volume":"29","author":"CM Chou","year":"2009","unstructured":"Chou, C.M., Tseng, D.C.: Affine-transformation-invariant public fragile watermarking for 3D model authentication. IEEE Comput. Graph. Appl. 29(2), 72\u201379 (2009)","journal-title":"IEEE Comput. Graph. Appl."},{"key":"66_CR18","doi-asserted-by":"crossref","unstructured":"Huang, C.C., Yang, Y.W., et al.: Spherical coordinate based fragile watermarking scheme for 3D models. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 566\u2013571. Springer, Heidelberg, June 2013","DOI":"10.1007\/978-3-642-38577-3_58"},{"issue":"4","key":"66_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/3DRes.04(2013)4","volume":"4","author":"AM Molaei","year":"2013","unstructured":"Molaei, A.M., Ebrahimnezhad, H., Sedaaghi, M.H.: A blind fragile watermarking method for 3D models based on geometric properties of triangles. 3D Res. 4(4), 4 (2013)","journal-title":"3D Res."},{"key":"66_CR20","unstructured":"Tao, X., Zhao-Quan, C.: A novel semi-fragile watermarking algorithm for 3D mesh models. In: 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 782\u2013785 (2012)"},{"issue":"5","key":"66_CR21","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.cad.2008.03.001","volume":"40","author":"WB Wang","year":"2008","unstructured":"Wang, W.B., Zheng, G.Q., Yong, J.H., Gu, H.J.: A numerically stable fragile watermarking scheme for authenticating 3D models. Comput. Aided Des. 40(5), 634\u2013645 (2008)","journal-title":"Comput. Aided Des."},{"issue":"2","key":"66_CR22","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/TVCG.2008.101","volume":"15","author":"YP Wang","year":"2009","unstructured":"Wang, Y.P., Hu, S.M.: A new watermarking method for 3D models based on integral invariants. IEEE Trans. Vis. Comput. Graph. 15(2), 285\u2013294 (2009)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"issue":"12","key":"66_CR23","first-page":"4561","volume":"5","author":"TY Chen","year":"2009","unstructured":"Chen, T.Y., Hwang, M.S., Jan, J.K.: Adaptive authentication schemes for 3D mesh models. Int. J. Innovative Comput. Inf. Control 5(12), 4561\u20134572 (2009)","journal-title":"Int. J. Innovative Comput. Inf. Control"},{"key":"66_CR24","doi-asserted-by":"crossref","unstructured":"Wang, J.T., et al: Hamming code based watermarking scheme for 3D model verification. In: 2014 International Symposium on Computer, Consumer and Control (I3C), Taichung, pp. 1095\u20131098 (2014)","DOI":"10.1109\/IS3C.2014.285"},{"key":"66_CR25","doi-asserted-by":"crossref","unstructured":"Wang, J.T., et al.: Error detecting code based fragile watermarking scheme for 3D models. In: 2014 International Symposium on Computer, Consumer and Control (I3C), Taichung, pp. 1099\u20131102, June 2014","DOI":"10.1109\/IS3C.2014.286"},{"key":"66_CR26","doi-asserted-by":"crossref","unstructured":"Chang, Y.C., et al.: An error-detecting code based fragile watermarking scheme in spherical coordinate system. In: 2016 International Symposium on Computer, Consumer and Control (IS3C), Xi\u2019an, pp. 287\u2013290, July 2016","DOI":"10.1109\/IS3C.2016.82"},{"key":"66_CR27","doi-asserted-by":"crossref","unstructured":"Wang, J.T., et al.: A novel chaos sequence based 3D fragile watermarking scheme. In: 2014 International Symposium on Computer, Consumer and Control (IS3C), Taichung, pp. 745\u2013748, June 2014","DOI":"10.1109\/IS3C.2014.198"},{"key":"66_CR28","doi-asserted-by":"crossref","unstructured":"Lavou\u00e9, G.: A roughness measure for 3D mesh visual masking. In: Proceedings of the 4th Symposium on Applied perception in Graphics and Visualization, pp. 57\u201360. ACM (2007)","DOI":"10.1145\/1272582.1272593"}],"container-title":["Advances in Intelligent Systems and Computing","The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14118-9_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T06:55:16Z","timestamp":1558162516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14118-9_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,17]]},"ISBN":["9783030141172","9783030141189"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14118-9_66","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,17]]},"assertion":[{"value":"17 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AMLTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Machine Learning Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Egypt","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"amlta2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/egyptscience.net\/AMLTA19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}