{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T20:43:50Z","timestamp":1763585030377,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,5,27]],"date-time":"2010-05-27T00:00:00Z","timestamp":1274918400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s11042-010-0536-9","type":"journal-article","created":{"date-parts":[[2010,5,26]],"date-time":"2010-05-26T08:55:51Z","timestamp":1274864151000},"page":"67-89","source":"Crossref","is-referenced-by-count":31,"title":["Watermarking geographical data on spatial topological relations"],"prefix":"10.1007","volume":"57","author":[{"given":"Chuanjian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhiyong","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yuwei","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Junzhou","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qingzhan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,5,27]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal R, Kiernan J (2002) Watermarking relational databases. In: Proceeding of the 28th VLDB conference, Hong Kong, China, pp 155\u2013166","key":"536_CR1","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"unstructured":"Allison DCS, Noga MT (1981) On the computation of minimnum encasing rectangles and set diameter. Technical report CS81017-R, Computer Science, Virginia Tech","key":"536_CR2"},{"doi-asserted-by":"crossref","unstructured":"Bazin C, Le Bars JM, Madelaine J (2007) A blind, fast and robust method for geographical data watermarking. In: ACM symposium on information, computer and communications security (ASIACCS\u201907), pp 265\u2013272","key":"536_CR3","DOI":"10.1145\/1229285.1266992"},{"key":"536_CR4","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"CS Collberg","year":"2002","unstructured":"Collberg CS, Thomborson C (2002) Watermarking, tamper-proofing, and obfuscation\u2014tools for software protection. IEEE Trans Softw Eng 28:735\u2013746","journal-title":"IEEE Trans Softw Eng"},{"key":"536_CR5","volume-title":"Digital watermarking: principles and practice","author":"J Cox","year":"2001","unstructured":"Cox J, Miller M, Bloom J (2001) Digital watermarking: principles and practice. Morgan Kaufmann, San Mateo, CA"},{"issue":"2","key":"536_CR6","first-page":"164","volume":"31","author":"M Deng","year":"2002","unstructured":"Deng M, Li CM, Liu WB (2002) Describing spatial relations between area objects via combining topological with metrication. Acta Geodaetica et Cartographica Sinica 31(2):164\u2013169 (in Chinese)","journal-title":"Acta Geodaetica et Cartographica Sinica"},{"issue":"5","key":"536_CR7","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/TVCG.2007.1050","volume":"13","author":"VR Doncel","year":"2007","unstructured":"Doncel VR, Nikolaidis N, Pitas I (2007) An optimal detector structure for the Fourier descriptors domain watermarking of 2D vector graphics. IEEE Trans Vis Comput Graph 13(5):851\u2013863","journal-title":"IEEE Trans Vis Comput Graph"},{"unstructured":"Egenhofer MJ, Herring J (1994) Categorizing binary topological relations between regions, lines and points in geographic databases. Technical report, Department of Surveying Engineering, University of Maine","key":"536_CR8"},{"issue":"10","key":"536_CR9","doi-asserted-by":"crossref","first-page":"3988","DOI":"10.1109\/TSP.2005.855411","volume":"53","author":"HM Gou","year":"2005","unstructured":"Gou HM and Wu M (2005) Data hiding in curves with application to fingerprinting maps. IEEE Trans Signal Process 53(10):3988\u20134005","journal-title":"IEEE Trans Signal Process"},{"unstructured":"Huang M, Zhou X, Cao JH et al (2007) Geo-WDBMS: an improved DBMS with the function of watermarking geographical data. In: DASFAA 2007. LNCS, vol 4443, pp 1098\u20131109","key":"536_CR10"},{"unstructured":"Kang H, Kim K, Choi J (2001) A vector watermarking using the generalized square mask. In: Proc. international symposium on information technology: coding and computing 2001, pp\u00a0234\u2013236","key":"536_CR11"},{"unstructured":"Lafaye J, B\u00e9guec J, Gross-Amblard D, Ruas A (2007) Invisible graffiti on your buildings: blind and squaring-proof watermarking of geographical databases. In: 10th international symposium on spatial and temporal databases. Lecture notes in computer science, advances in spatial and temporal databases. LNCS 4605, pp 312\u2013329","key":"536_CR12"},{"unstructured":"Li XJ, Cai JF (2007) Robust transmission of JPEG2000 encoded images over packet loss channel. ICME 2007, pp 947\u2013950","key":"536_CR13"},{"unstructured":"Li YY, Xu LP (2003) A blind watermarking of vector graphics images. In: Proceedings of fifth international conference on computational intelligence and multimedia applications (ICCIMA 2003), pp 424\u2013429","key":"536_CR14"},{"unstructured":"Ng W, Lau HL (2005) Effective approaches for watermarking XML data. In: Proceeding of DASFAA 2005. LNCS, vol 3453, pp 68\u201380","key":"536_CR15"},{"key":"536_CR16","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-540-71169-8_6","volume":"58","author":"XM Niu","year":"2007","unstructured":"Niu XM, Shao CY, Wang XT (2007) GIS watermarking: hiding data in 2D vector maps. Studies in Computational Intelligence (SCI) 58:123\u2013155","journal-title":"Studies in Computational Intelligence (SCI)"},{"unstructured":"Ohbuchi R, Ueda H, Endoh S (2002) Robust watermark of vector digital maps. ICME2002","key":"536_CR17"},{"unstructured":"Sakamoto M, Matsuura Y, Takashima Y (2000) A scheme of digital watermarking for geographical map data. In: Symposium on cryptography and information security","key":"536_CR18"},{"key":"536_CR19","volume-title":"Applied cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B (1996) Applied cryptography. Wiley, New York"},{"doi-asserted-by":"crossref","unstructured":"Schulz G, Voigt M (2004) A high capacity watermarking system for digital maps. In: Proceedings of the 2004 multimedia and security workshop on multimedia and security, pp 180\u2013186","key":"536_CR20","DOI":"10.1145\/1022431.1022463"},{"issue":"3","key":"536_CR21","first-page":"215","volume":"12","author":"ARBM Shariff","year":"1998","unstructured":"Shariff ARBM, Egenhofer MJ, Mark DM (1998) Natural-language spatial relations between linear and areal objects: the topology and metric of English-language terms. Int J Geogr Inf Sci 12(3): 215\u2013245","journal-title":"Int J Geogr Inf Sci"},{"issue":"1","key":"536_CR22","doi-asserted-by":"crossref","first-page":"2008","DOI":"10.1109\/TKDE.2007.190668","volume":"20","author":"M Shehab","year":"2008","unstructured":"Shehab M, Beritno E, Ghafoor A (2008) Watermarking relational databases using optimization-based techniques. IEEE Trans Knowl Data Eng 20(1):2008","journal-title":"IEEE Trans Knowl Data Eng"},{"doi-asserted-by":"crossref","unstructured":"Sion R (2004) Proving ownership over categorical data. In: Proceedings of the IEEE international conference on data engineering, vol 20, pp 584\u2013595","key":"536_CR23","DOI":"10.1109\/ICDE.2004.1320029"},{"issue":"6","key":"536_CR24","first-page":"2004","volume":"16","author":"R Sion","year":"2004","unstructured":"Sion R, Atallah M, Prabhakar S (2004) Rights protection for relational data. IEEE Trans Knowl Data Eng 16(6):2004","journal-title":"IEEE Trans Knowl Data Eng"},{"doi-asserted-by":"crossref","unstructured":"Solachidis V, Nikolaidis N, Pitas I (2000) Watermarking polygonal lines using Fourier descriptors. In: Proc. IEEE international conference on acoustics, speech and signal processing (ICASSP\u20192000), pp 1955\u20131958","key":"536_CR25","DOI":"10.1109\/ICASSP.2000.859213"},{"doi-asserted-by":"crossref","unstructured":"Topkara M, Taskiran CM, Delp EJ (2005) Natural language watermarking. In: Conference on security, steganography and watermarking of multimedia contents VII, pp 441\u2013452","key":"536_CR26","DOI":"10.1117\/12.593790"},{"unstructured":"Waston AB (1993) DCT quantization matrices optimized for individual images. In: Proceeding of SPIE 1913\u201314, pp 202\u2013216","key":"536_CR27"},{"issue":"7","key":"536_CR28","doi-asserted-by":"crossref","first-page":"982","DOI":"10.3923\/itj.2009.982.989","volume":"8","author":"Pu Yu-Chi","year":"2009","unstructured":"Yu-Chi Pu, I-Chang Jou(2009) Blind and robust watermarking for street-network vector maps. Inf Technol J 8(7):982\u2013989","journal-title":"Inf Technol J"},{"unstructured":"Zhao CY (2006) Studying on the technologies of storage and processing of spatial vector data in high-performance parallel GIS. Dissertation, Wuhan University (in Chinese)","key":"536_CR29"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-010-0536-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-010-0536-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-010-0536-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T04:41:08Z","timestamp":1740112868000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-010-0536-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,27]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["536"],"URL":"https:\/\/doi.org\/10.1007\/s11042-010-0536-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2010,5,27]]}}}