{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:32:21Z","timestamp":1725514341470},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540728221"},{"type":"electronic","value":"9783540728238"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72823-8_29","type":"book-chapter","created":{"date-parts":[[2007,7,22]],"date-time":"2007-07-22T21:40:19Z","timestamp":1185140419000},"page":"338-349","source":"Crossref","is-referenced-by-count":1,"title":["A Scale-Space Reeb-Graph of Topological Invariants of Images and Its Applications to Content Identification"],"prefix":"10.1007","author":[{"given":"Jinhui","family":"Chao","sequence":"first","affiliation":[]},{"given":"Shintaro","family":"Suzuki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","volume-title":"Intelligent watermarking techniques","author":"J.P.H. Huang","year":"2004","unstructured":"Huang, J.P.H., Jain, L.C.: Intelligent watermarking techniques. World Scientific, Singapore (2004)"},{"key":"29_CR2","volume-title":"Techniques and application of watermarking and content protection","author":"M. Arnold","year":"2003","unstructured":"Arnold, M., Schmucker, M., Wolthusen, S.D.: Techniques and application of watermarking and content protection. Artech House, Boston (2003)"},{"issue":"2","key":"29_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.1276112","volume":"21","author":"B.B. Zhu","year":"2004","unstructured":"Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When seeing isn\u2019t believing. IEEE Signal Processing Magazine\u00a021(2), 40\u201349 (2004)","journal-title":"IEEE Signal Processing Magazine"},{"key":"29_CR4","unstructured":"Lu, C.S., et al.: Robust Mesh-based Hashing for Copy Detection and Tracing of Images. In: Proceedings of ICME2004, Taiwan (2004)"},{"key":"29_CR5","unstructured":"Chao, J., Suzuki, S.: Copyright tracing using topological invariants of content. In: Proceedings of ICIP 2004, Singapore (2004)"},{"key":"29_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-4-431-66956-2","volume-title":"Topological Modeling for Visualization","author":"A.T. Fomenko","year":"1997","unstructured":"Fomenko, A.T., Kunii, T.L.: Topological Modeling for Visualization. Springer, Heidelberg (1997)"},{"key":"29_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-6465-9","volume-title":"Scale-space theory in computer vision","author":"T. Linderberg","year":"1994","unstructured":"Linderberg, T.: Scale-space theory in computer vision. Kluwer Academic Publishers, Dordrecht (1994)"},{"key":"29_CR8","series-title":"AMS","doi-asserted-by":"crossref","DOI":"10.1515\/9781400881802","volume-title":"Morse Theory","author":"J. Milnor","year":"1963","unstructured":"Milnor, J.: Morse Theory. AMS, vol.\u00a051. Princeton University Press, Princeton (1963)"},{"key":"29_CR9","unstructured":"Reeb, G.: Surles points singuliers d\u00fane form de pfaff completement integrable ou d\u00fane fonction numerique. Comptes Rendus Acad. Sciences Paris 222, 847-849."},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1023\/A:1008304909717","volume":"12","author":"L. Florack","year":"2000","unstructured":"Florack, L., Kuijper, A.: The topological structure of scale space images. Journal of Mathematical Imaging and Vision\u00a012, 65\u201379 (2000)","journal-title":"Journal of Mathematical Imaging and Vision"},{"issue":"5","key":"29_CR11","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/34.494642","volume":"18","author":"J.A. Bangham","year":"1996","unstructured":"Bangham, J.A., et al.: Multiscale nonlinear decomposition: the sieve decomposition theorem. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a018(5), 529\u2013539 (1996)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Shinagawa, Y., Kunii, T.: Unconstrained automatic image matching using multiresolutional critical-point filters. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a020(9) (1998)","DOI":"10.1109\/34.713364"},{"issue":"1","key":"29_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1023\/B:VISI.0000016145.44583.5f","volume":"58","author":"K. Habuka","year":"2004","unstructured":"Habuka, K., Shinagawa, Y.: Image interpolation using enhanced multiresolutional critical-point filters. Int. Journal of Computer Vision\u00a058(1), 19\u201335 (2004)","journal-title":"Int. Journal of Computer Vision"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-63167-4_67","volume-title":"Scale-Space Theory in Computer Vision","author":"R. Harvey","year":"1997","unstructured":"Harvey, R., Bangham, J.A., Bosson, A.: Scale-space filters and their robustness. In: ter Haar Romeny, B.M., Florack, L.M.J., Viergever, M.A. (eds.) Scale-Space 1997. LNCS, vol.\u00a01252, pp. 341\u2013344. Springer, Heidelberg (1997)"},{"key":"29_CR15","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198501626.001.0001","volume-title":"Fast Parallel Algorithms for Graph Matching Problems: Combinatorial, Algebraic & Probabilistic Approach","author":"M. Karpinski","year":"1998","unstructured":"Karpinski, M., Rytter, W.: Fast Parallel Algorithms for Graph Matching Problems: Combinatorial, Algebraic & Probabilistic Approach. Oxford University Press, Oxford (1998)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Hilaga, M., et al.: Topology matching for fully automatic similarity estimation of 3D shapes. In: Proc. ACM SIGGRAPH (2001)","DOI":"10.1145\/383259.383282"},{"key":"29_CR17","unstructured":"Kim, J., Chao, J.: Topological invariants of color images and their application to copy right protection. In: Proc. of 2003 Symposium on Cryptography and Information Security, SCIS2003, Jan. 2003, pp. 959\u2013964 (2003)"},{"key":"29_CR18","unstructured":"Suzuki, M., Kim, J., Chao, J.: Copyright protection using topological invariants of Image. In: Proc. of 2002 Symposium on Cryptography and Information Security, SCI2002, Jan. 2002, pp. 903\u2013907 (2002)"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"van Villet, L.J., Young, I.T., Verbeek, P.W.: Recursive Gaussian Derivative Filters. In: Proceedings of ICPR1998, Australia (1998)","DOI":"10.1109\/ICPR.1998.711192"},{"key":"29_CR20","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/0165-1684(95)00020-E","volume":"44","author":"I.T. Young","year":"1995","unstructured":"Young, I.T., van Viliet, L.J.: Recursive implementation of the Gaussian filter. Signal Processing\u00a044, 139\u2013151 (1995)","journal-title":"Signal Processing"},{"key":"29_CR21","unstructured":"http:\/\/www.petitcolas.net\/fabien\/watermarking\/stirmark\/"}],"container-title":["Lecture Notes in Computer Science","Scale Space and Variational Methods in Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72823-8_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T00:44:38Z","timestamp":1708130678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72823-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540728221","9783540728238"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72823-8_29","relation":{},"subject":[]}}