{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:29Z","timestamp":1740099089455,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319773827"},{"type":"electronic","value":"9783319773834"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77383-4_86","type":"book-chapter","created":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T13:02:26Z","timestamp":1525870946000},"page":"880-889","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication"],"prefix":"10.1007","author":[{"given":"Guoyin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qingan","family":"Da","sequence":"additional","affiliation":[]},{"given":"Liguo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianguo","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Qilong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Kou","sequence":"additional","affiliation":[]},{"given":"WenShan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,10]]},"reference":[{"issue":"2","key":"86_CR1","doi-asserted-by":"crossref","first-page":"265","DOI":"10.14257\/ijmue.2016.11.2.26","volume":"11","author":"NN Wang","year":"2016","unstructured":"Wang, N.N., Zhao, X., Xie, C.: RST invariant reversible watermarking for 2D vector map. Int. J. Multimed. Ubiquit. Eng. 11(2), 265\u2013276 (2016)","journal-title":"Int. J. Multimed. Ubiquit. Eng."},{"issue":"4","key":"86_CR2","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cad.2011.11.001","volume":"44","author":"NN Wang","year":"2012","unstructured":"Wang, N.N., Men, C.G.: Reversible fragile watermarking for 2-D vector map authentication with localization. Comput. Aided Des. 44(4), 320\u2013330 (2012)","journal-title":"Comput. Aided Des."},{"key":"86_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-642-34778-8_29","volume-title":"Advances in Multimedia Information Processing \u2013 PCM 2012","author":"L Weng","year":"2012","unstructured":"Weng, L., Darazi, R., Preneel, B., Macq, B., Dooms, A.: Robust image content authentication using perceptual hashing and watermarking. In: Lin, W., Xu, D., Ho, A., Wu, J., He, Y., Cai, J., Kankanhalli, M., Sun, M.-T. (eds.) PCM 2012. LNCS, vol. 7674, pp. 315\u2013326. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34778-8_29"},{"issue":"3","key":"86_CR4","first-page":"397","volume":"40","author":"FU Haojun","year":"2011","unstructured":"Haojun, F.U., Zhu, C., Jian, M.: Multipurpose watermarking algorithm for digital raster map based on wavelet transformation. Acta Geod. Cartogr. Sin. 40(3), 397\u2013400 (2011)","journal-title":"Acta Geod. Cartogr. Sin."},{"key":"86_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-34778-8_30","volume-title":"Advances in Multimedia Information Processing \u2013 PCM 2012","author":"C Li","year":"2012","unstructured":"Li, C., Ma, B., Wang, Y., Huang, D., Zhang, Z.: A secure semi-fragile self-recoverable watermarking algorithm using group-based wavelet quantization. In: Lin, W., Xu, D., Ho, A., Wu, J., He, Y., Cai, J., Kankanhalli, M., Sun, M.-T. (eds.) PCM 2012. LNCS, vol. 7674, pp. 327\u2013336. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34778-8_30"},{"key":"86_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-24078-7_22","volume-title":"Advances in Multimedia Information Processing \u2013 PCM 2015","author":"M Fujiyoshi","year":"2015","unstructured":"Fujiyoshi, M., Kiya, H.: Histogram-based near-lossless data hiding and its application to image compression. In: Ho, Y.-S., Sang, J., Ro, Y.M., Kim, J., Wu, F. (eds.) PCM 2015. LNCS, vol. 9315, pp. 225\u2013235. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24078-7_22"},{"issue":"1","key":"86_CR7","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s11042-014-2301-y","volume":"75","author":"H Shi","year":"2016","unstructured":"Shi, H., Li, M.C., Guo, C., et al.: A region-adaptive semi-fragile dual watermarking scheme. Multimed. Tools Appl. 75(1), 465\u2013495 (2016)","journal-title":"Multimed. Tools Appl."},{"key":"86_CR8","doi-asserted-by":"crossref","unstructured":"Ren, N., Wang, Q., Zhu, C.: Selective authentication algorithm based on semi-fragile watermarking for vector geographical data. In: 22nd International Conference on GeoInformatics (2014)","DOI":"10.1109\/GEOINFORMATICS.2014.6950830"},{"key":"86_CR9","doi-asserted-by":"crossref","unstructured":"Neyman, S.N., Sitohang, B., Cahyono, F.: An improvement technique of fragile watermarking to assurance the data integrity on vector maps. In: IC3INA, vol. 25, pp. 179\u2013184. Springer (2013)","DOI":"10.1109\/IC3INA.2013.6819170"},{"key":"86_CR10","doi-asserted-by":"crossref","unstructured":"Neyman, S.N., Wijaya, Y.H., Sitohang, B.: A new scheme to hide the data integrity marker on vector maps using a feature-based fragile watermarking algorithm. In: International Conference on Data and Software Engineering (ICODSE) (2014)","DOI":"10.1109\/ICODSE.2014.7062486"},{"key":"86_CR11","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.cad.2013.10.005","volume":"47","author":"NN Wang","year":"2014","unstructured":"Wang, N.N., Zhang, H., Men, C.G.: A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates. Comput. Aided Des. 47, 108\u2013117 (2014)","journal-title":"Comput. Aided Des."},{"issue":"2","key":"86_CR12","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MCG.2009.20","volume":"29","author":"CM Chou","year":"2009","unstructured":"Chou, C.M., Tseng, D.C.: Affine-transformation-invariant public fragile watermarking for 3D model authentication. IEEE Comput. Graph. Appl. 29(2), 72\u201379 (2009)","journal-title":"IEEE Comput. Graph. Appl."},{"issue":"4","key":"86_CR13","doi-asserted-by":"crossref","first-page":"155","DOI":"10.14257\/ijmue.2015.10.4.16","volume":"10","author":"NN Wang","year":"2015","unstructured":"Wang, N.N., Bian, J., Zhang, H.: RST invariant fragile watermarking for 2D vector map authentication. Int. J. Multimed. Ubiquit. Eng. 10(4), 155\u2013172 (2015)","journal-title":"Int. J. Multimed. Ubiquit. Eng."},{"issue":"3","key":"86_CR14","doi-asserted-by":"crossref","first-page":"60","DOI":"10.4018\/IJDCF.2015070104","volume":"7","author":"NN Wang","year":"2015","unstructured":"Wang, N.N., Zhao, X., Zhang, H.: Block-based reversible fragile watermarking for 2D vector map authentication. Int. J. Digit. Crime Forensics 7(3), 60\u201380 (2015)","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"86_CR15","doi-asserted-by":"crossref","unstructured":"Yue, M., Peng, Z., Peng, Y.: A fragile watermarking scheme for modification type characterization in 2D vector maps. In: Asia-Pacific Web Conference (2014)","DOI":"10.1007\/978-3-319-11116-2_12"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing \u2013 PCM 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77383-4_86","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T16:29:51Z","timestamp":1571329791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77383-4_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319773827","9783319773834"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77383-4_86","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}