{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:30:59Z","timestamp":1771468259976,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s00530-024-01455-0","type":"journal-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T13:04:39Z","timestamp":1724159079000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["3D model watermarking using surface integrals of generated random vector fields"],"prefix":"10.1007","volume":"30","author":[{"given":"Luke","family":"Vandenberghe","sequence":"first","affiliation":[]},{"given":"Chris","family":"Joslin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,20]]},"reference":[{"issue":"3","key":"1455_CR1","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.35940\/ijeat.C5773.029320","volume":"9","author":"AA Embaby","year":"2020","unstructured":"Embaby, A.A., Mohamed, A., Shalaby, W., Elsayed, K.: Digital watermarking properties, classification and techniques. Int. J. Eng. Adv. Technol. 9(3), 2742\u20132750 (2020)","journal-title":"Int. J. Eng. Adv. Technol."},{"issue":"1","key":"1455_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"23","author":"N Ahmed","year":"1974","unstructured":"Ahmed, N., Natarajan, T., Rao, K.R.: Discrete cosine transform. IEEE Trans. Comput. C 23(1), 90\u201393 (1974). https:\/\/doi.org\/10.1109\/T-C.1974.223784","journal-title":"IEEE Trans. Comput. C"},{"key":"1455_CR3","volume-title":"Mathematical Methods and Boundary Value Problems","author":"S Melkonian","year":"2018","unstructured":"Melkonian, S.: Mathematical Methods and Boundary Value Problems. Nelson, Toronto (2018)"},{"key":"1455_CR4","doi-asserted-by":"publisher","unstructured":"Liu, Y., Prabhakaran, B., Guo, X.: A robust spectral approach for blind watermarking of manifold surfaces. In: Proceedings of the 10th ACM Workshop on Multimedia and Security. MM &Sec \u201908, pp. 43\u201352. Association for Computing Machinery, New York (2008). https:\/\/doi.org\/10.1145\/1411328.1411338","DOI":"10.1145\/1411328.1411338"},{"issue":"5","key":"1455_CR5","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.1109\/TIFS.2012.2204251","volume":"7","author":"Y Liu","year":"2012","unstructured":"Liu, Y., Prabhakaran, B., Guo, X.: Spectral watermarking for parameterized surfaces. IEEE Trans. Inform. Forens. Secur. 7(5), 1459\u20131471 (2012). https:\/\/doi.org\/10.1109\/TIFS.2012.2204251","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"key":"1455_CR6","doi-asserted-by":"publisher","unstructured":"Vandenberghe, L., Joslin, C.: 3D model watermarking using surface integrals of generated random vector fields. https:\/\/www.codeocean.com\/ (2024). https:\/\/doi.org\/10.24433\/CO.0174131.v4","DOI":"10.24433\/CO.0174131.v4"},{"key":"1455_CR7","volume-title":"Geostatistics for Environmental Scientists","author":"R Webster","year":"2009","unstructured":"Webster, R., Oliver, M.A.: Geostatistics for Environmental Scientists. Wiley, New York (2009)"},{"issue":"1","key":"1455_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1063\/1.1692799","volume":"13","author":"RH Kraichnan","year":"1970","unstructured":"Kraichnan, R.H.: Diffusion by a random velocity fie. Phys. Fluids 13(1), 22\u201331 (1970). https:\/\/doi.org\/10.1063\/1.1692799","journal-title":"Phys. Fluids"},{"key":"1455_CR9","volume-title":"The ABC\u2019S of Calculus","author":"A Mingarelli","year":"2019","unstructured":"Mingarelli, A.: The ABC\u2019S of Calculus, vol. 2. Angelo Mingarelli, Ottawa (2019)"},{"issue":"12","key":"1455_CR10","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997). https:\/\/doi.org\/10.1109\/83.650120","journal-title":"IEEE Trans. Image Process."},{"key":"1455_CR11","volume-title":"Deep Learning","author":"IJ Goodfellow","year":"2016","unstructured":"Goodfellow, I.J., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016)"},{"key":"1455_CR12","doi-asserted-by":"publisher","unstructured":"Ohbuchi, R., Masuda, H., Aono, M.: Watermaking three-dimensional polygonal models. In: Proceedings of the Fifth ACM International Conference on Multimedia. MULTIMEDIA \u201997, pp. 261\u2013272. Association for Computing Machinery, New York (1997). https:\/\/doi.org\/10.1145\/266180.266377","DOI":"10.1145\/266180.266377"},{"issue":"2","key":"1455_CR13","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/TVCG.2008.101","volume":"15","author":"Y-P Wang","year":"2009","unstructured":"Wang, Y.-P., Hu, S.-M.: A new watermarking method for 3d models based on integral invariants. IEEE Trans. Vis. Comput. Graph. 15(2), 285\u2013294 (2009). https:\/\/doi.org\/10.1109\/TVCG.2008.101","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"1455_CR14","doi-asserted-by":"publisher","unstructured":"Xu, T., Cai, Z.-Q.: A novel semi-fragile watermarking algorithm for 3d mesh models. In: 2012 International Conference on Control Engineering and Communication Technology, pp. 782\u2013785 (2012). https:\/\/doi.org\/10.1109\/ICCECT.2012.180","DOI":"10.1109\/ICCECT.2012.180"},{"key":"1455_CR15","doi-asserted-by":"publisher","unstructured":"Huang, C.-C., Yang, Y.-W., Fan, C.-M., Wang, J.-T.: A spherical coordinate based fragile watermarking scheme for 3d models, pp. 566\u2013571 (2013). https:\/\/doi.org\/10.1007\/978-3-642-38577-3_58","DOI":"10.1007\/978-3-642-38577-3_58"},{"issue":"8","key":"1455_CR16","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1109\/TCSVT.2007.903553","volume":"17","author":"YM Cheung","year":"2007","unstructured":"Cheung, Y.M., Wu, H.T.: A sequential quantization strategy for data embedding and integrity verification. IEEE Trans. Circuits Syst. Video Technol. 17(8), 1007\u20131016 (2007). https:\/\/doi.org\/10.1109\/TCSVT.2007.903553","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1455_CR17","doi-asserted-by":"publisher","unstructured":"Maheshwari, P., Agarwal, P., Prabhakaran, B.: Progressive compression invariant semi-fragile watermarks for 3d meshes. In: Proceedings of the 9th Workshop on Multimedia & Security. MM &Sec \u201907, pp. 245\u2013250. Association for Computing Machinery, New York (2007). https:\/\/doi.org\/10.1145\/1288869.1288904","DOI":"10.1145\/1288869.1288904"},{"key":"1455_CR18","doi-asserted-by":"publisher","first-page":"3867","DOI":"10.1007\/s13369-018-03714-5","volume":"44","author":"S Borah","year":"2019","unstructured":"Borah, S., Borah, B.: A blind, semi-fragile 3d mesh watermarking algorithm using minimum distortion angle quantization index modulation (3d-mdaqim). Arab. J. Sci. Eng. 44, 3867\u20133882 (2019). https:\/\/doi.org\/10.1007\/s13369-018-03714-5","journal-title":"Arab. J. Sci. Eng."},{"key":"1455_CR19","doi-asserted-by":"publisher","unstructured":"Borah, S., Borah, B.: Three-Dimensional (3D) Polygon Mesh Authentication Using Sequential Bit Substitution Strategy, pp. 617\u2013627 (2020). https:\/\/doi.org\/10.1007\/978-981-13-8676-3_52","DOI":"10.1007\/978-981-13-8676-3_52"},{"key":"1455_CR20","doi-asserted-by":"publisher","unstructured":"Bochkarev, M., Vybornova, Y.: A qim-based watermarking method for 3d mesh integrity protection. In: 2021 International Conference on Information Technology and Nanotechnology (ITNT), pp. 1\u20134 (2021).https:\/\/doi.org\/10.1109\/ITNT52450.2021.9649306","DOI":"10.1109\/ITNT52450.2021.9649306"},{"key":"1455_CR21","doi-asserted-by":"publisher","unstructured":"Peng, F., Long, B., Long, M.: A semi-fragile reversible watermarking for authenticating 3D models based on virtual polygon projection and double modulation strategy. In: IEEE Transactions on Multimedia, pp. 1\u20131 (2021) https:\/\/doi.org\/10.1109\/TMM.2021.3134159","DOI":"10.1109\/TMM.2021.3134159"},{"issue":"12","key":"1455_CR22","doi-asserted-by":"publisher","first-page":"8394","DOI":"10.1109\/TCSVT.2022.3192542","volume":"32","author":"F Peng","year":"2022","unstructured":"Peng, F., Liao, T., Long, M.: A semi-fragile reversible watermarking for authenticating 3d models in dual domains based on variable direction double modulation. IEEE Trans. Circ. Syst. Video Technol. 32(12), 8394\u20138408 (2022). https:\/\/doi.org\/10.1109\/TCSVT.2022.3192542","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"1455_CR23","doi-asserted-by":"publisher","unstructured":"Kaye, D., Ivrissimtzis, I.: Mesh alignment using grid based pca. In: Proceedings of the 10th International Conference on Computer Graphics Theory and Applications. GRAPP 2015, pp. 174\u2013181. SCITEPRESS-Science and Technology Publications, Lda, Setubal, PRT (2015). https:\/\/doi.org\/10.5220\/0005313801740181","DOI":"10.5220\/0005313801740181"},{"key":"1455_CR24","volume-title":"Contributions to Spectral Spatial Statistics","author":"RMC asais","year":"2007","unstructured":"asais, R.M.C.: Contributions to Spectral Spatial Statistics. Santiago de Compostela, Santiago de Compostela (2007)"},{"key":"1455_CR25","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.envsoft.2014.01.013","volume":"55","author":"H Falk","year":"2014","unstructured":"Falk, H., Vladyslav, P., Steffen, S., Sabine, A.: Generating random fields with a truncated power-law variogram: a comparison of several numerical methods. Environ. Model. Softw. 55, 32\u201348 (2014). https:\/\/doi.org\/10.1016\/j.envsoft.2014.01.013","journal-title":"Environ. Model. Softw."},{"key":"1455_CR26","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.gmod.2008.12.006","volume":"71","author":"M Chaouch","year":"2009","unstructured":"Chaouch, M., Verroust, A.: Alignment of 3d models. Graph. Models 71, 63\u201376 (2009). https:\/\/doi.org\/10.1016\/j.gmod.2008.12.006","journal-title":"Graph. Models"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01455-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01455-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01455-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T18:10:11Z","timestamp":1730139011000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01455-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,20]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1455"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01455-0","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,20]]},"assertion":[{"value":"20 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"253"}}