{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T18:08:36Z","timestamp":1758823716592,"version":"3.37.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2009,8,12]],"date-time":"2009-08-12T00:00:00Z","timestamp":1250035200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s00530-009-0163-3","type":"journal-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T10:44:42Z","timestamp":1249987482000},"page":"325-336","source":"Crossref","is-referenced-by-count":3,"title":["Hiding data: a high-capacity distortionless approach"],"prefix":"10.1007","volume":"15","author":[{"given":"Charlie","family":"Irawan Tan","sequence":"first","affiliation":[]},{"given":"Cong-Kai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wen-Kai","family":"Tai","sequence":"additional","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,12]]},"reference":[{"issue":"3","key":"163_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/4236.935180","volume":"5","author":"D. Artz","year":"2001","unstructured":"Artz D.: Digital steganography: Hiding data within data. IEEE Internet Comput. 5(3), 1\u201380 (2001). doi: 10.1109\/4236.935180","journal-title":"IEEE Internet Comput."},{"key":"163_CR2","doi-asserted-by":"crossref","unstructured":"Aspert, N., Drelie, E., Maret, Y., Ebrahimi, T.: Steganography for three-dimensional polygonal meshes. In: Proceedings of SPIE, vol. 4790, pp. 211\u2013219 (2002)","DOI":"10.1117\/12.455358"},{"issue":"1","key":"163_CR3","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/38.736468","volume":"19","author":"O. Benedens","year":"1999","unstructured":"Benedens O.: Geometry-based watermarking of 3d models. IEEE Comput. Graph. Appl. 19(1), 46\u201355 (1999). doi: 10.1109\/38.736468","journal-title":"IEEE Comput. Graph. Appl."},{"key":"163_CR4","doi-asserted-by":"crossref","unstructured":"Cachin, C.: An information-theoretic model for steganography. Lecture Notes in Computer Science, vol. 1525, pp. 306\u2013318 (1998). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.19.9769","DOI":"10.1007\/3-540-49380-8_21"},{"key":"163_CR5","unstructured":"Cayre, F., Devillers, O., Schmitt, F., Ma\u00eetre, H.: Watermarking 3d triangle meshes for authentication and integrity. In: INRIA Research Report RR-5223 (2004)"},{"issue":"4","key":"163_CR6","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1109\/TSP.2003.809380","volume":"51","author":"F. Cayre","year":"2003","unstructured":"Cayre F., Macq B.: Data hiding on 3-d triangle meshes. IEEE Trans. Signal Processing 51(4), 939\u2013949 (2003)","journal-title":"IEEE Trans. Signal Processing"},{"issue":"9","key":"163_CR7","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1007\/s00371-006-0069-4","volume":"22","author":"Y.M. Cheng","year":"2006","unstructured":"Cheng Y.M., Wang C.M.: A high-capacity steganographic approach for 3d polygonal meshes. Vis. Comput. 22(9), 845\u2013855 (2006). doi: 10.1007\/s00371-006-0069-4","journal-title":"Vis. Comput."},{"issue":"9\u201311","key":"163_CR8","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1007\/s00371-007-0147-2","volume":"23","author":"Y.M. Cheng","year":"2007","unstructured":"Cheng Y.M., Wang C.M.: An adaptive steganographic algorithm for 3d polygonal meshes. Vis. Comput. 23(9\u201311), 721\u2013732 (2007). doi: 10.1007\/s00371-007-0147-2","journal-title":"Vis. Comput."},{"key":"163_CR9","doi-asserted-by":"crossref","unstructured":"Cotting, D., Weyrich, T., Pauly, M., Gross, M.: Robust watermarking of point-sampled geometry. In: SMI\u201904: International Conference on Shape Modeling and Applications 2004, pp. 233\u2013242 (2004)","DOI":"10.1109\/SMI.2004.1314510"},{"key":"163_CR10","unstructured":"Group, I.G.: 3d meshes research database. http:\/\/www-c.inria.fr\/gamma\/download\/download.php"},{"key":"163_CR11","unstructured":"Kanai, S., Date, H., Kishinami, T.: Digital watermarking for 3d polygons using multiresolution wavelet decomposition. In: Proceedings of Sixth IFIP WG 5.2 GEO-6, pp. 296\u2013307 (1998)"},{"key":"163_CR12","doi-asserted-by":"crossref","unstructured":"Maret, Y., Ebrahimi, T.: Data hiding on 3d polygonal meshes. In: MM&Sec\u201904: Proceedings of the 2004 workshop on Multimedia and security, pp. 68\u201374. ACM Press, New York, (2004). doi: 10.1145\/1022431.1022445","DOI":"10.1145\/1022431.1022445"},{"key":"163_CR13","doi-asserted-by":"crossref","unstructured":"Ohbuchi, R., Masuda, H., Aono, M.: Watermaking three-dimensional polygonal models. In: MULTIMEDIA\u201997: Proceedings of the fifth ACM international conference on Multimedia, pp. 261\u2013272. ACM Press, New York (1997). doi: 10.1145\/266180.266377","DOI":"10.1145\/266180.266377"},{"key":"163_CR14","doi-asserted-by":"crossref","unstructured":"Ohbuchi, R., Mukaiyama, A., Takahashi, S.: Watermarking a 3d shape model defined as a point set. In: CW\u201904: Third International Conference on Cyberworlds 2004, pp. 392\u2013399 (2004)","DOI":"10.1109\/CW.2004.70"},{"issue":"3","key":"163_CR15","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1111\/1467-8659.t01-1-00597","volume":"21","author":"R. Ohbuchi","year":"2005","unstructured":"Ohbuchi R., Mukaiyama A., Takahashi S.: Surfaces, shapes, and compression: a frequency-domain approach to watermarking 3d shapes. Comput. Graph. Forum 21(3), 373\u2013382 (2005)","journal-title":"Comput. Graph. Forum"},{"key":"163_CR16","unstructured":"Ohbuchi, R., Takahashi, S., Miyazawa, T., Mukaiyama, A.: Watermarking 3d polygonal meshes in the mesh spectral domain. In: GRIN\u201901: No description on Graphics interface 2001, pp. 9\u201317. Canadian Information Processing Society, Toronto (2001)"},{"key":"163_CR17","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding\u2014a survey. Proc. IEEE 87(7), 1062\u20131078 (1999). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.21.4574"},{"key":"163_CR18","doi-asserted-by":"crossref","unstructured":"Wagner, M.G.: Robust watermarking of polygonal meshes. In: Proceedings of Geometric Modeling and Processing, pp. 201\u2013208 (2003)","DOI":"10.1109\/GMAP.2000.838252"},{"issue":"3","key":"163_CR19","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1111\/j.1467-8659.2005.00884.x","volume":"24","author":"C.M. Wang","year":"2005","unstructured":"Wang C.M., Cheng Y.M.: An efficient information hiding algorithm for polygon models. Comput. Graph. Forum 24(3), 591\u2013600 (2005)","journal-title":"Comput. Graph. Forum"},{"issue":"2","key":"163_CR20","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.cag.2006.01.030","volume":"30","author":"C.M. Wang","year":"2006","unstructured":"Wang C.M., Wang P.C.: Steganography on point-sampled geometry. Comput. Graph. 30(2), 244\u2013254 (2006)","journal-title":"Comput. Graph."},{"key":"163_CR21","unstructured":"Wayner, P.: Disappearing cryptography. http:\/\/www.wayner.org\/books\/discrypt2\/sorted.php"},{"issue":"11","key":"163_CR22","doi-asserted-by":"crossref","first-page":"2603","DOI":"10.1016\/S0031-3203(03)00086-4","volume":"36","author":"Z. Yu","year":"2003","unstructured":"Yu Z., Ip H.H.S., Kwok L.F.: A robust watermarking scheme for 3d triangular mesh models. Pattern Recognit. 36(11), 2603\u20132614 (2003)","journal-title":"Pattern Recognit."},{"issue":"5","key":"163_CR23","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1109\/TVCG.2005.71","volume":"11","author":"S. Zafeiriou","year":"2005","unstructured":"Zafeiriou S., Tefas A., Pitas I.: Blind robust watermarking schemes for copyright protection of 3d mesh objects. IEEE Trans. Vis. Comput. Graph. 11(5), 596\u2013607 (2005)","journal-title":"IEEE Trans. Vis. Comput. Graph."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-009-0163-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00530-009-0163-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-009-0163-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T18:25:30Z","timestamp":1739298330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00530-009-0163-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,12]]},"references-count":23,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["163"],"URL":"https:\/\/doi.org\/10.1007\/s00530-009-0163-3","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2009,8,12]]}}}