{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:52:07Z","timestamp":1725483127972},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540711681"},{"type":"electronic","value":"9783540711698"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-71169-8_6","type":"book-chapter","created":{"date-parts":[[2007,4,25]],"date-time":"2007-04-25T00:34:39Z","timestamp":1177461279000},"page":"123-155","source":"Crossref","is-referenced-by-count":13,"title":["GIS Watermarking: Hiding Data in 2D Vector Maps"],"prefix":"10.1007","author":[{"given":"Xia-Mu","family":"Niu","sequence":"first","affiliation":[]},{"given":"Cheng-Yong","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Xiao-Tong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1_Ref","unstructured":". \n                    http:\/\/www.thedigitalmap.com"},{"key":"6_CR2_Ref","unstructured":". Sakamoto, M., Matsuura, Y., and Takashima, Y. (2000): A scheme of digital watermarking for geographical map data. Symposium on cryptography and Information security"},{"key":"6_CR3_Ref","doi-asserted-by":"crossref","unstructured":". Kang, H. (2001): A vector watermarking using the generalized square mask. Proc. International Symposium on Information Technology: Coding and Computing, 234-236","DOI":"10.1109\/ITCC.2001.918797"},{"key":"6_CR4_Ref","doi-asserted-by":"crossref","unstructured":". Schulz, G. and Voigt, M. (2004): A high capacity watermarking system for digital maps. Proceedings of the 2004 multimedia and security workshop on Multimedia and security, 180-186","DOI":"10.1145\/1022431.1022463"},{"key":"6_CR5_Ref","unstructured":". Huber, B.: Gis & steganography - part 3: Vector steganography. Available: \n                    http:\/\/www.directionsmag.com\/"},{"key":"6_CR6_Ref","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1117\/12.476815","volume":"5020","author":"M. Voigt","year":"2003","unstructured":"Voigt, M. and Busch, C. (2003): Feature-based watermarking of 2d-vector data. Proceedings of SPIE, Security and watermarking of Multimedia Content, 5020, 359-366","journal-title":"Proceedings of SPIE, Security and watermarking of Multimedia Content"},{"key":"6_CR7_Ref","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/ICME.2002.1035847","volume":"1","author":"R. Ohbuchi","year":"2002","unstructured":"Ohbuchi, R., Ueda, H., and Endoh, S. (2002): Robust watermarking of vector digital maps. Proc. IEEE International Conference on Multimedia and Expo, (ICME \u201902), 1, 577-580","journal-title":"Proc. IEEE International Conference on Multimedia and Expo, (ICME \u201902)"},{"key":"6_CR8_Ref","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1117\/12.465322","volume":"4675","author":"M. Voigt","year":"2002","unstructured":"Voigt, M. and Busch, C. (2002): Watermarking 2d-vector data for geographical information systems. Proceedings of SPIE, Security and watermarking of Multimedia Content, 4675, 621-628","journal-title":"Proceedings of SPIE, Security and watermarking of Multimedia Content"},{"key":"6_CR9_Ref","first-page":"9","volume":"3","author":"N. Nikolaidis","year":"2000","unstructured":"Nikolaidis, N., Pitas, I., and Solachidis, V. (2000): Fourier descriptors watermarking of vector graphics images. Proc. IEEE International Conference on Image Processing, 3, 9-12","journal-title":"Proc. IEEE International Conference on Image Processing"},{"key":"6_CR10_Ref","doi-asserted-by":"crossref","unstructured":". Solachidis, V., Nikolaidis, N. and Pitas I. (2000): Watermarking polygonal lines using Fourier descriptors. Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u20192000), 1955-1958","DOI":"10.1109\/ICASSP.2000.859213"},{"key":"6_CR11_Ref","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/ICME.2002.1035674","volume":"2","author":"N. Nikolaidis","year":"2002","unstructured":"Nikolaidis, N., Pitas, I., and Giannoula, A. (2002): Watermarking of sets of polygonal lines using fusion techniques. Proc. IEEE International Conference on Multimedia and Expo (ICME \u201902), 2, 549-552","journal-title":"Proc. IEEE International Conference on Multimedia and Expo (ICME \u201902)"},{"key":"6_CR12_Ref","first-page":"1191","volume":"3","author":"I. Kitamura","year":"2001","unstructured":"Kitamura, I., Kanai, S. and Kishinami, T. (2001): Copyright protection of vector map using digital watermarking method based on discrete Fourier transform. Proc. IEEE International Geoscience and Remote Sensing Symposium (IGARSS \u201901), 3, 1191-1193","journal-title":"Proc. IEEE International Geoscience and Remote Sensing Symposium (IGARSS \u201901)"},{"key":"6_CR13_Ref","unstructured":". Li, Y. and Xu, L. (2003): A blind watermarking of vector graphics images. Proc. Fifth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2003), 424-429"},{"key":"6_CR14_Ref","doi-asserted-by":"crossref","unstructured":". Ohbuchi, R., Ueda, H., and Endoh, S. (2003): Watermarking 2d vector maps in the mesh-spectral domain. Proc. International Conference on Shape Modeling and Applications, 216-225","DOI":"10.1109\/SMI.2003.1199619"},{"key":"6_CR15_Ref","unstructured":". Ohbuchi, R., Takahashi, S., Miyazawa, T., and Mukaiyama, A. (2001): Watermarking 3d polygonal meshes in the mesh spectral domain. Proc. Graphics Interface, 9-17"},{"key":"6_CR16_Ref","doi-asserted-by":"crossref","first-page":"112","DOI":"10.3138\/FM57-6770-U75U-7727","volume":"10","author":"D.H. Douglas","year":"1973","unstructured":"Douglas, D.H. and Peucker, T.K. (1973): Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Canadian Cartographer, 10, 112-122","journal-title":"Canadian Cartographer"},{"key":"6_CR17_Ref","first-page":"278","volume":"6","author":"C. Honsinger","year":"1999","unstructured":"Honsinger, C., Jones, P., Rabbani, M., and Stoffel, J. (1999): Lossless recovery of an original image containing embedded data. U.S. Patent 6 278-791","journal-title":"Patent"},{"key":"6_CR18_Ref","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1117\/12.435400","volume":"3971","author":"J. Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., and Du, R. (2001): Invertible authentication. Proc. SPIE, Security and Watermarking of Multimedia Contents, 3971, pp. 197-208","journal-title":"Proc. SPIE, Security and Watermarking of Multimedia Contents"},{"key":"6_CR19_Ref","unstructured":". Ni, Z., Shi, Y., Ansari, N., and Su, W. (2003): Reversible data hiding. Proceedings IEEE of ISCAS\u201903, 2, II-912-II-915"},{"key":"6_CR20_Ref","first-page":"731","volume":"2","author":"A. Leest","year":"2003","unstructured":"Leest, A., Veen, M. and Bruekers, F. (2003): Reversible image watermarking. Proc. IEEE International Conference on Image Processing, 2, 731-734","journal-title":"Proc. IEEE International Conference on Image Processing"},{"key":"6_CR21_Ref","unstructured":". Tian, J. (2002): Reversible watermarking by difference expansion. Proc. of Workshop on Multimedia and Security, 19-22"},{"key":"6_CR22_Ref","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/12.476858","volume":"5020","author":"M. Veen","year":"2003","unstructured":"Veen, M., Bruekers, F., Leest, A., and Cavin, S. (2003): High capacity reversible watermarking for audio. Proceedings of the SPIE, 5020, 1-11","journal-title":"Proceedings of the SPIE"},{"key":"6_CR23_Ref","doi-asserted-by":"crossref","unstructured":". Voigt, M., Yang, B., and Busch, C. (2004): Reversible watermarking of 2dvector data. Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and Security, 160-165","DOI":"10.1145\/1022431.1022459"}],"container-title":["Studies in Computational Intelligence","Intelligent Multimedia Data Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71169-8_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:41:55Z","timestamp":1619516515000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71169-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540711681","9783540711698"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71169-8_6","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2007]]}}}