{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:34:09Z","timestamp":1743032049104,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540895978"},{"type":"electronic","value":"9783540895985"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89598-5_13","type":"book-chapter","created":{"date-parts":[[2008,11,22]],"date-time":"2008-11-22T08:40:04Z","timestamp":1227343204000},"page":"201-217","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Framework for Watermarking: The Data-Abstracted Approach"],"prefix":"10.1007","author":[{"given":"Cyril","family":"Bazin","sequence":"first","affiliation":[]},{"given":"Jean-Marie","family":"Le Bars","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Madelaine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"Digital Watermarking","author":"I. Cox","year":"2001","unstructured":"Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035, 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"13_CR3","unstructured":"Niu, X., Shao, C., Wand, X.: A survey of digital vector map watermarking. ICIC International (2006)"},{"key":"13_CR4","unstructured":"Ohbuchi, R., Ueda, H., Endoh, S.: Watermarking 2d vector maps in the mesh-spectral domain. In: Shape Modeling International (2003)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-540-73540-3_18","volume-title":"Advances in Spatial and Temporal Databases","author":"J. Lafaye","year":"2007","unstructured":"Lafaye, J., Beguec, J., Gross-Amblard, D., Ruas, A.: Invisible graffiti on your buildings: Blind & squarring-proof watermarking of geographical databases. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol.\u00a04605, pp. 312\u2013329. Springer, Heidelberg (2007)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Bazin, C., Le Bars, J.M., Madelaine, J.: A fast, blind and robust method for geographical data watermarking. In: ASIACCS 2007 (2007)","DOI":"10.1145\/1229285.1266992"},{"key":"13_CR7","volume-title":"28th International Conference on Very Large Databases (VLDB)","author":"R. Agrawal","year":"2002","unstructured":"Agrawal, R., Kiernan, J.: Watermarking relational databases. In: 28th International Conference on Very Large Databases (VLDB), vol.\u00a02. IEEE, Los Alamitos (2002)"},{"key":"13_CR8","unstructured":"Open Geospatial Consortium, http:\/\/www.opengeospatial.org"},{"key":"13_CR9","unstructured":"Georges, P.L., Borouchaki, H.: Triangulation de Delaunay et maillage. Hermes (1997)"},{"key":"13_CR10","unstructured":"Yvinec, M.: 2d triangulations. In: CGAL User and Reference Manual. 3.3 (2007)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. In: PODS 2003, San Diego, CA (2003)","DOI":"10.1145\/773153.773172"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Constantion, C., Gross-Amblard, D., Guerrouani, M.: Watermill: an optimized fingerprinting system for highly constrained data. In: ACM multimedia and security workshop (2005)","DOI":"10.1145\/1073170.1073196"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Dakowicz, M., Gold, C.: Structuring kinetic maps. In: Progress in Spatial Data Handling, University of Glamorgan, pp. 477\u2013493 (2006)","DOI":"10.1007\/3-540-35589-8_31"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89598-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T08:04:54Z","timestamp":1684656294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89598-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540895978","9783540895985"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89598-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}