{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T00:57:43Z","timestamp":1746320263881,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031223891"},{"type":"electronic","value":"9783031223907"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22390-7_3","type":"book-chapter","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T00:03:46Z","timestamp":1670544226000},"page":"40-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Crypto-Steganographic Validity for\u00a0Additive Manufacturing (3D Printing) Design Files"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4626-2754","authenticated-orcid":false,"given":"Mark","family":"Yampolskiy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0879-5114","authenticated-orcid":false,"given":"Lynne","family":"Graves","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9885-5696","authenticated-orcid":false,"given":"Jacob","family":"Gatlin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5266-7470","authenticated-orcid":false,"given":"J. Todd","family":"McDonald","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0848-0873","authenticated-orcid":false,"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,9]]},"reference":[{"key":"3_CR1","unstructured":"3D printing business directory (2022). https:\/\/www.3dprintingbusiness.directory"},{"key":"3_CR2","unstructured":"Collberg, C.: Engineering code obfuscation. In: Invited Talk at EUROCRYPT 2016 (2016)"},{"key":"3_CR3","volume-title":"Surreptitious Software: Obfuscation, Watermarking, And Tamperproofing For Software Protection","author":"C Collberg","year":"2009","unstructured":"Collberg, C., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, And Tamperproofing For Software Protection, 1st edn. Addison-Wesley Professional, Boston (2009)","edition":"1"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Cooper, D., et al.: Internet x. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280, pp. 1\u2013151 (2008)","DOI":"10.17487\/rfc5280"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Hansen, T.: RFC 6234: US secure hash algorithms (SHA and SHA-based HMAC and HKDF). IETF Std. (2011)","DOI":"10.17487\/rfc6234"},{"key":"3_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56127-7","volume-title":"Additive Manufacturing Technologies","author":"I Gibson","year":"2021","unstructured":"Gibson, I., Rosen, D., Stucker, B., Khorasani, M.: Additive Manufacturing Technologies. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-56127-7"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"103833","DOI":"10.1109\/ACCESS.2019.2931738","volume":"7","author":"LM Graves","year":"2019","unstructured":"Graves, L.M., Lubell, J., King, W., Yampolskiy, M.: Characteristic aspects of additive manufacturing security from security awareness perspectives. IEEE Access 7, 103833\u2013103853 (2019)","journal-title":"IEEE Access"},{"key":"3_CR8","unstructured":"International, A.: F2792-12a-standard terminology for additive manufacturing technologies. Rapid Manufact. Assoc. 12, 10\u201312 (2013)"},{"key":"3_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2020","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, USA (2020)"},{"key":"3_CR10","unstructured":"Kerry, C.F., Director, C.R.: FIPS PUB 186\u20134 federal information processing standards publication digital signature standard (DSS) (2013)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Macq, B., Alface, P.R., Montanola, M.: Applicability of watermarking for intellectual property rights protection in a 3D printing scenario. In: Proceedings of the 20th International Conference on 3D Web Technology, pp. 89\u201395. ACM, New York (2015)","DOI":"10.1145\/2775292.2775313"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Ohbuchi, R., Masuda, H., Aono, M.: Watermarking three-dimensional polygonal models. In: ACM Multimedia, vol. 97, pp. 261\u2013272. Citeseer (1997)","DOI":"10.1145\/266180.266377"},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/49.668977","volume":"16","author":"R Ohbuchi","year":"1998","unstructured":"Ohbuchi, R., Masuda, H., Aono, M.: Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Sel. Areas Commun. 16(4), 551\u2013560 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"7","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey. Proc. IEEE 87(7), 1062\u20131078 (1999)","journal-title":"Proc. IEEE"},{"issue":"8","key":"3_CR15","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1109\/TMM.2008.2007350","volume":"10","author":"K Wang","year":"2008","unstructured":"Wang, K., Lavou\u00e9, G., Denis, F., Baskurt, A.: A comprehensive survey on three-dimensional mesh watermarking. IEEE Trans. Multimed. 10(8), 1513\u20131527 (2008)","journal-title":"IEEE Trans. Multimed."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Yampolskiy, M., Andel, T.R., McDonald, J.T., Glisson, W.B., Yasinsac, A.: Intellectual property protection in additive layer manufacturing: requirements for secure outsourcing. In: Proceedings of the 4th Program Protection and Reverse Engineering Workshop, p. 7. ACM (2014)","DOI":"10.1145\/2689702.2689709"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Yampolskiy, M., Graves, L., Gatlin, J., Skjellum, A., Yung, M.: What did you add to my additive manufacturing data?: steganographic attacks on 3D printing files. In: 24th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 266\u2013281 (2021)","DOI":"10.1145\/3471621.3471843"},{"key":"3_CR18","first-page":"431","volume":"21","author":"M Yampolskiy","year":"2018","unstructured":"Yampolskiy, M., et al.: Security of additive manufacturing: attack taxonomy and survey. Addit. Manuf. 21, 431\u2013457 (2018)","journal-title":"Addit. Manuf."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22390-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T00:04:16Z","timestamp":1670544256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22390-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031223891","9783031223907"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22390-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bali","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indonesia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc2022.petra.ac.id\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}