{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:27:00Z","timestamp":1725852420609},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_19","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T04:15:28Z","timestamp":1459311328000},"page":"232-238","source":"Crossref","is-referenced-by-count":5,"title":["Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers"],"prefix":"10.1007","author":[{"given":"Piyarat","family":"Silapasuphakornwong","sequence":"first","affiliation":[]},{"given":"Masahiro","family":"Suzuki","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Unno","sequence":"additional","affiliation":[]},{"given":"Hideyuki","family":"Torii","sequence":"additional","affiliation":[]},{"given":"Kazutake","family":"Uehira","sequence":"additional","affiliation":[]},{"given":"Youichi","family":"Takashima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"4499","key":"19_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-540-73092-7_5","volume":"II","author":"PR Alface","year":"2007","unstructured":"Alface, P.R., Macq, B.: From 3D mesh data hiding to 3D shape blind and robust watermarking: a survey. Trans. Data Hiding Multimed. Secur. II(4499), 91\u2013115 (2007)","journal-title":"Trans. Data Hiding Multimed. Secur."},{"issue":"10","key":"19_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"H Wang","year":"2004","unstructured":"Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76\u201382 (2004)","journal-title":"Commun. ACM"},{"issue":"6","key":"19_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1064830.1064861","volume":"48","author":"D Koller","year":"2005","unstructured":"Koller, D., Levoy, M.: Protecting 3D graphics content. Commun. ACM 48(6), 74\u201380 (2005)","journal-title":"Commun. ACM"},{"issue":"115","key":"19_CR4","first-page":"265","volume":"114","author":"P Silapasuphakornwong","year":"2014","unstructured":"Silapasuphakornwong, P., Suzuki, M., Unno, H., Uehira, K., Takashima, Y.: Information hiding technology for copyright protection of digital data for 3-D printing. Electron. Inf. Commun. Eng. Tech. Rep. EMM2014-37 114(115), 265\u2013270 (2014)","journal-title":"Electron. Inf. Commun. Eng. Tech. Rep. EMM2014-37"},{"issue":"222","key":"19_CR5","first-page":"37","volume":"114","author":"P Silapasuphakornwong","year":"2014","unstructured":"Silapasuphakornwong, P., Suzuki, M., Uehira, K., Takashima, Y., Unno, H.: 3-D printer shaped object nondestructive readout by thermography of information embedded inside. Electron. Inf. Commun. Eng. Tech. Rep. EMM2014-50 114(222), 37\u201340 (2014)","journal-title":"Electron. Inf. Commun. Eng. Tech. Rep. EMM2014-50"},{"key":"19_CR6","unstructured":"Suzuki, M., Silapasuphakornwong, P., Uehira, K., Takashima, Y., Unno, H.: Copyright protection technology of digital data for the 3-D printer. In: Cryptography and Information Security Symposium Proceedings, Kitakyushu, Fukuoka Prefecture, 1B2-1, January 2015"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Suzuki, M., Silapasuphakornwong, P., Uehira, K., Unno, H., Takashima, Y.: Copyright protection for 3-D printing by embedding information inside real fabricated objects. In: Proceedings of VISIGRAPP 2015, pp. 1\u20136 (2015)","DOI":"10.5220\/0005342401800185"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:53:16Z","timestamp":1559415196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}