{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T10:05:20Z","timestamp":1748685920136,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_18","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"233-243","source":"Crossref","is-referenced-by-count":14,"title":["High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain"],"prefix":"10.1007","author":[{"given":"Zhe-Ming","family":"Lu","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original mesh containing embedded data. US Patent application, Docket No: 77102\/E\u2013D (1999)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Jun, T.: High capacity reversible data embedding and content authentication. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, vol.\u00a03, pp. 517\u2013520 (2003)","DOI":"10.1109\/ICASSP.2003.1199525"},{"key":"18_CR3","unstructured":"Xuan, G.R., Shi, Y.Q., Ni, Z.C., Chen, J., Yang, C., Zhen, Y., Zhu, J.: High capacity lossless data hiding based on integer wavelet transform. In: Proceedings - IEEE International Symposium on Circuits and Systems, vol.\u00a02 (2004)"},{"key":"18_CR4","unstructured":"Shi, Y.Q., Ni, Z., Zou, D., Liang, C., Xuan, G.: Lossless data hiding: Fundamentals, algorithms and applications. In: Proceedings - IEEE International Symposium on Circuits and Systems, vol.\u00a02 (2004)"},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"N. Zhicheng","year":"2006","unstructured":"Zhicheng, N., Yun-Qing, S., Nirwan, A., Wei, S.: Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology\u00a016(3), 354\u2013361 (2006)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Celik Mehmet, U., Gaurav, S., Murat, T.A., Eli, S.: Reversible data hiding. In: IEEE International Conference on Image Processing, vol.\u00a02, pp. II\/157\u2013II\/160 (2002)","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Guorong, X., Chengyun, Y., Yizhan, Z., Yunqing, S., Zhicheng, N.: Reversible data hiding based on wavelet spread spectrum. In: IEEE 6th Workshop on Multimedia Signal Processing, pp. 211\u2013214 (2004)","DOI":"10.1109\/MMSP.2004.1436530"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Zhicheng, N., Yunqing., S., Nirwan, A., Wei, S., Qibin, S., Xiao, L.: Robust lossless image data hiding. In: IEEE International Conference on Multimedia and Expo, vol.\u00a03, pp. 2199\u20132202 (2004)","DOI":"10.1109\/ICME.2004.1394706"},{"key":"18_CR9","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible Authentication Watermark for JPEG Images. In: Proc. IEEE International Conference on Information Technology: Coding and Computing (2001)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Dittmann, J., Benedens, O.: Invertible Authentication for 3d-Meshes. In: Proceedings of SPIE - The International Society for Optical Engineering, vol.\u00a05020, pp. 653\u2013664 (2003)","DOI":"10.1117\/12.476824"},{"key":"18_CR11","unstructured":"Wu, H.-T., Ming-Cheung, Y.: A Reversible Data Hiding Approach to Mesh Authentication. In: Proceedings of IEEE\/WIC\/ACM International Conference on Web Intelligence (2005)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Sun, Z., Lu, Z.-M., Li, Z.: Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 593\u2013596 (2006)","DOI":"10.1109\/IIH-MSP.2006.265072"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1109\/18.720541","volume":"44","author":"R. Gray","year":"1998","unstructured":"Gray, R., Neuhoff, D.: Quantization. IEEE Transactions on Information Theory\u00a044, 2325\u20132384 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Chou, P.H., Meng, T.H.: Vertex Data Compression through Vector Quantization. IEEE Transactions on Visualization and Computer Graphics\u00a08(4) (October-December 2002)","DOI":"10.1109\/TVCG.2002.1044522"},{"key":"18_CR15","unstructured":"Princeton University. 3D model search engine, http:\/\/shape.cs.princeton.edu"},{"issue":"10","key":"18_CR16","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/83.718481","volume":"7","author":"C. Zhu","year":"1998","unstructured":"Zhu, C., Po, L.M.: Minimax Partial Distortion Competitive Learning for Optimal Codebook Design. IEEE Transactions on Image Processing\u00a07(10), 1400\u20131409 (1998)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"9","key":"18_CR17","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1109\/82.257335","volume":"40","author":"S.W. Ra","year":"1993","unstructured":"Ra, S.W., Kim, J.K.: Fast Mean-Distance-Ordered Partial Codebook Search Algorithm for Image Vector Quantization. IEEE Transactions on Circuits and Systems-II\u00a040(9), 576\u2013579 (1993)","journal-title":"IEEE Transactions on Circuits and Systems-II"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:58:08Z","timestamp":1738821488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}