{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:02:10Z","timestamp":1743073330758,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662457368"},{"type":"electronic","value":"9783662457375"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-45737-5_14","type":"book-chapter","created":{"date-parts":[[2015,2,3]],"date-time":"2015-02-03T23:44:54Z","timestamp":1423007094000},"page":"143-150","source":"Crossref","is-referenced-by-count":2,"title":["GIS Spatial Data Updating Algorithm Based on Digital Watermarking Technology"],"prefix":"10.1007","author":[{"given":"Na","family":"Ren","sequence":"first","affiliation":[]},{"given":"Qisheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Changqing","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.cad.2013.10.005","volume":"47","author":"N. Wang","year":"2014","unstructured":"Wang, N., Zhang, H., Men, C.-G.: A High Capacity Reversible Data Hiding Method for 2D Vector Maps Based on Virtual Coordinates. Computer-Aided Design\u00a047, 108\u2013117 (2014)","journal-title":"Computer-Aided Design"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.compenvurbsys.2010.10.004","volume":"35","author":"H. Yan","year":"2011","unstructured":"Yan, H., Li, J., Wen, H.: A Key Points-Based Blind Watermarking Approach for Vector Geo-Spatial Data. Computers, Environment and Urban Systems\u00a035, 485\u2013492 (2011)","journal-title":"Computers, Environment and Urban Systems"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11042-010-0536-9","volume":"57","author":"C. Wang","year":"2010","unstructured":"Wang, C., Peng, Z., Peng, Y., Yu, L., Wang, J., Zhao, Q.: Watermarking Geographical Data on Spatial Topological Relations. Multimedia Tools and Applications\u00a057, 67\u201389 (2010)","journal-title":"Multimedia Tools and Applications"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1109\/TVCG.2007.1050","volume":"13","author":"V.R. Doncel","year":"2007","unstructured":"Doncel, V.R., Nikolaidis, N., Pitas, I.: An Optimal Detector Structure for The Fourier Descriptors Domain Watermarking of 2D Vector Graphics. IEEE Transactions on Visualization and Computer Graphics\u00a013, 851\u2013863 (2007)","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"14_CR5","first-page":"1301","volume":"2","author":"X. Niu","year":"2006","unstructured":"Niu, X., Shao, C., Wang, X.: A Survey of Digital Vector Map Watermarking. International Journal of Innovative Computing Information and Control\u00a02, 1301\u20131316 (2006)","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Voigt, M., Yang, B., Busch, C.: Reversible Watermarking of 2D-Vector Data. In: Proceedings of the Multimedia and Security Workshop, pp. 160\u2013165 (2004)","DOI":"10.1117\/12.588195"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"3045","DOI":"10.1016\/j.ins.2010.03.027","volume":"180","author":"C.-C. Chang","year":"2010","unstructured":"Chang, C.-C., Kieu, T.D.: A Reversible Data Hiding Scheme Using Complementary Embedding Strategy. Information Sciences\u00a0180, 3045\u20133058 (2010)","journal-title":"Information Sciences"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"9717","DOI":"10.3390\/s111009717","volume":"11","author":"H.-C. Huang","year":"2011","unstructured":"Huang, H.-C., Fang, W.-C.: Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree Concepts. Sensors\u00a011, 9717\u20139731 (2011)","journal-title":"Sensors"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1016\/j.cad.2010.08.004","volume":"42","author":"F. Peng","year":"2010","unstructured":"Peng, F., Guo, R.-S., Li, C.-T., Long, M.: A Semi-Fragile Watermarking Algorithm for Authenticating2D CAD Engineering Graphics Based on Log-Polar Transformation. Computer-Aided Design\u00a042, 1207\u20131216 (2010)","journal-title":"Computer-Aided Design"},{"key":"14_CR10","first-page":"326","volume":"2005","author":"C. Shao","year":"2005","unstructured":"Shao, C., Wang, X., Xu, X.: Security Issues of Vector Maps and Reversible Authentication Scheme. Doctoral Forum of China\u00a02005, 326\u2013331 (2005)","journal-title":"Doctoral Forum of China"}],"container-title":["Communications in Computer and Information Science","Geo-Informatics in Resource Management and Sustainable Ecosystem"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45737-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T02:29:20Z","timestamp":1559096960000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45737-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662457368","9783662457375"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45737-5_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}