{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:40:08Z","timestamp":1739317208436,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044304"},{"type":"electronic","value":"9783642044311"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04431-1_14","type":"book-chapter","created":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T14:32:43Z","timestamp":1251815563000},"page":"191-205","source":"Crossref","is-referenced-by-count":3,"title":["Roughness-Adaptive 3D Watermarking of Polygonal Meshes"],"prefix":"10.1007","author":[{"given":"Kwangtaek","family":"Kim","sequence":"first","affiliation":[]},{"given":"Mauro","family":"Barni","sequence":"additional","affiliation":[]},{"given":"Hong Z.","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Ohbuchi, R., Masuda, H., Aono, M.: Watermarking Three-Dimensional Polygonal Models. In: Proceedings of the ACM International Multimedia Conference and Exhibition, pp. 261\u2013272 (1997)","DOI":"10.1145\/266180.266377"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Wagner, M.G.: Robust Watermarking of Polygonal Meshes. In: Proceedings of Geometric Modeling and Processing, pp. 201\u2013208 (2000)","DOI":"10.1109\/GMAP.2000.838252"},{"issue":"1","key":"14_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/38.736468","volume":"19","author":"O. Benedens","year":"1999","unstructured":"Benedens, O.: Geometry-Based Watermarking of 3D models. IEEE Computer Graphics and Applications\u00a019(1), 46\u201355 (1999)","journal-title":"IEEE Computer Graphics and Applications"},{"issue":"3","key":"14_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1111\/1467-8659.00412","volume":"19","author":"O. Benedens","year":"2000","unstructured":"Benedens, O., Busch, C.: Towards Blind Detection of Robust Watermarks in Polygonal Models. Computer Graphics Forum\u00a019(3), 199\u2013208 (2000)","journal-title":"Computer Graphics Forum"},{"issue":"1","key":"14_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/38.736467","volume":"19","author":"B. Yeo","year":"1999","unstructured":"Yeo, B., Yeung, M.M.: Watermarking 3D Objects for Verification. IEEE Computer Graphics and Applications\u00a019(1), 36\u201345 (1999)","journal-title":"IEEE Computer Graphics and Applications"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Bors, A.G.: Blind Watermarking of 3D Shapes using localized constraints. In: Proceedings of 3D Data Processing, Visualization and Transmission 2004, 3DPVT, pp. 242\u2013249 (2004)","DOI":"10.1109\/TDPVT.2004.1335201"},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/TIP.2005.863116","volume":"15","author":"A.G. Bors","year":"2006","unstructured":"Bors, A.G.: Watermarking Mesh-Based Representations of 3-D Objects Using Local Moments. IEEE Transactions on Image processing\u00a015(3), 687\u2013701 (2006)","journal-title":"IEEE Transactions on Image processing"},{"issue":"4","key":"14_CR8","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1109\/TSP.2003.809380","volume":"51","author":"F. Cayre","year":"2003","unstructured":"Cayre, F., Macq, B.: Data Hiding on 3-D Triangle Meshes. IEEE Transactions on Signal Processing\u00a051(4), 939\u2013949 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"14_CR9","first-page":"309","volume":"18","author":"F. Cayre","year":"2003","unstructured":"Cayre, F., Rondao-Alface, P., Schmitt, F., Macq, B., Maitre, H.: Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry. Signal Processing\u00a018(4), 309\u2013319 (2003)","journal-title":"Signal Processing"},{"key":"14_CR10","unstructured":"Ohbuchi, R., Takahashi, S., Miyazawa, T., Mukaiyama, A.: Watermarking 3D Polygonal Meshes in the Mesh Spectral Domain. In: Proceedings of Graphics interface, pp. 9\u201317 (2001)"},{"issue":"6","key":"14_CR11","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1109\/TMM.2005.858412","volume":"7","author":"H.-Y. Lin","year":"2005","unstructured":"Lin, H.-Y., Liao, H.-Y., Lu, C.-S., Lin, J.-C.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia\u00a07(6), 997\u20131006 (2005)","journal-title":"IEEE Trans. Multimedia"},{"issue":"5","key":"14_CR12","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TVCG.2005.71","volume":"11","author":"S. Zafeiriou","year":"2005","unstructured":"Zafeiriou, S., Tefas, A., Pitas, I.: Blind Robust Watermarking Schemes for Copyright Protection of 3D Mesh Objects. IEEE Trans. Visualization and Computer Graphics\u00a011(5), 596\u2013607 (2005)","journal-title":"IEEE Trans. Visualization and Computer Graphics"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Corsini, M., Gelasca, E.D., Ebrahimi, T., Barni, M.: Watermarked 3D Mesh Quality Assessment. IEEE Transactions on Multimedia (2007)","DOI":"10.1109\/TMM.2006.886261"},{"key":"14_CR14","unstructured":"Kanai, S., Date, H., Kishinami, T.: Digital Watermarking for 3D Polygons Using Multiresolution Wavelet Decomposition. In: Proceeding of IFIP WG, pp. 296\u2013307 (1998)"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1121\/1.1912375","volume":"49","author":"H. Levitt","year":"1971","unstructured":"Levitt, H.: Transformed Up-Down Methods in Psychoacoustics. The Journal of the Acoustical Society of America\u00a049, 467\u2013477 (1971)","journal-title":"The Journal of the Acoustical Society of America"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04431-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:05:22Z","timestamp":1739315122000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04431-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044304","9783642044311"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04431-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}