{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:03:17Z","timestamp":1761894197081},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540635192"},{"type":"electronic","value":"9783540695905"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0000334","type":"book-chapter","created":{"date-parts":[[2005,10,27]],"date-time":"2005-10-27T06:16:19Z","timestamp":1130393779000},"page":"1-10","source":"Crossref","is-referenced-by-count":26,"title":["Embedding data in 3D models"],"prefix":"10.1007","author":[{"given":"Ryutarou","family":"Ohbuchi","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Masuda","sequence":"additional","affiliation":[]},{"given":"Masaki","family":"Aono","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"H. Berghel and L. O'Gorman, Protecting Ownership Rights Through Digital Watermarking, IEEE Computer, July 1996, pp101\u2013103.","DOI":"10.1109\/2.511977"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"G. Braudway, K. Magerlein, and F. Mintzer, Protecting Publicly-Available Images with a Visible Image Watermark, IBM Research Report, TC-20336 (89918), January 15, 1996.","DOI":"10.1117\/12.235469"},{"key":"1_CR3","unstructured":"I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, Technical Report 95-10, NEC Research Institute, 1995."},{"key":"1_CR4","unstructured":"G. Farin, Curves and Surfaces for CAGD: a Practical guide, 4th edition, Academic Press, 1996."},{"key":"1_CR5","unstructured":"ISO\/IEC JTC1 SC24\/N1596 CD #14772 Virtual Reality Model Language (VRML 2.0)"},{"key":"1_CR6","unstructured":"H. Masuda, Topological operations for non-manifold geometric modeling and their applications, Ph. D dissertation, Department of Precision Machinery Engineering, University of Tokyo, 1996 (in Japanese)."},{"key":"1_CR7","unstructured":"J. O'Rourke, Computational Geometry in C, Cambridge University Press, 1994."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"J. J. K. O'Ruanaidh, W. J. Dowling, and F. M. Boland, Watermarking digital images for copyright protection, IEE Proceedings on Vision, Image, and Signal Processing, Vol. 143, No. 4, pp.250\u2013256.","DOI":"10.1049\/ip-vis:19960711"},{"key":"1_CR9","unstructured":"B. Pfitzmann, Information Hiding Terminology, in R. Anderson, Ed., Lecture Notes in Computer Science No. 1174, pp347\u2013350, Springer-Verlag, 1996."},{"key":"1_CR10","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"B. Schneier, Applied Cryptography, Second edition, John Wiley & Sons, Inc., New York, 1996.","edition":"Second edition"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"J. R. Smith and B. O. Comiskey, Modulation and Information Hiding in Images, in R. Anderson, Ed., Lecture Notes in Computer Science No.1174, pp207\u2013296, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-61996-8_42"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"K. Tanaka, Y. Nakamura, and K. Matsui, Embedding Secret Information into a Dithered Multilevel Image, Proc. 1990 IEEE Military Communications Conference, pp216\u2013220, 1990.","DOI":"10.1109\/MILCOM.1990.117416"},{"key":"1_CR13","unstructured":"S. Walton, Image Authentication for a Slippery New Age, Dr. Dobb's Journal, April 1995."},{"key":"1_CR14","unstructured":"K. Weiler, The Radial Edge Structure: A Topological Representation for Non-Manifold Geometric Boundary Modeling, Geometric Modeling for CAD Applications, North Holland, pp3\u201336, May 1986."},{"key":"1_CR15","unstructured":"J. Zhao and E. Koch, Embedding Robust Labels into Images for Copyright Protection, Proc. of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge, and New Technologies, Vienna, August 1995."}],"container-title":["Lecture Notes in Computer Science","Interactive Distributed Multimedia Systems and Telecommunication Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T10:23:57Z","timestamp":1586514237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540635192","9783540695905"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/bfb0000334","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}