{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T06:44:16Z","timestamp":1648536256515},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T00:00:00Z","timestamp":1377129600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s11042-013-1677-4","type":"journal-article","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T23:40:30Z","timestamp":1377042030000},"page":"1687-1707","source":"Crossref","is-referenced-by-count":2,"title":["Authenticating topological integrity of process plant models through digital watermarking"],"prefix":"10.1007","volume":"73","author":[{"given":"Zhiyong","family":"Su","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lang","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guangjie","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianshou","family":"Kong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,8,22]]},"reference":[{"issue":"9","key":"1677_CR1","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"CC Chang","year":"2011","unstructured":"Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462\u20131470","journal-title":"J Syst Softw"},{"issue":"1","key":"1677_CR2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TIFS.2012.2224108","volume":"8","author":"G Coatrieux","year":"2013","unstructured":"Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111\u2013120","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"1677_CR3","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/0010-4485(87)90259-4","volume":"19","author":"MR Dow","year":"1987","unstructured":"Dow MR (1987) Integration of calculation models and CAD systems in building services design. Comput Aided Des 19(5):226\u2013232","journal-title":"Comput Aided Des"},{"key":"1677_CR4","doi-asserted-by":"crossref","unstructured":"Feng XQ, Zhang WY, Liu YN (2012) Double watermarks of 3D mesh model based on feature segmentation and redundancy information. Multimed Tools Appl 1\u201319. doi: 10.1007\/s11042-012-1039-7","DOI":"10.1007\/s11042-012-1039-7"},{"issue":"S2","key":"1677_CR5","first-page":"34:1","volume":"8","author":"XF Gao","year":"2012","unstructured":"Gao XF, Zhang CM, Huang Y, Deng ZG (2012) A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models. ACM Trans Multimed Comput 8(S2):34:1\u201334:21","journal-title":"ACM Trans Multimed Comput"},{"issue":"2","key":"1677_CR6","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"26","author":"RW Hamming","year":"1950","unstructured":"Hamming RW (1950) Error detecting and error correcting codes. Bell Syst Tech J 26(2):147\u2013160","journal-title":"Bell Syst Tech J"},{"key":"1677_CR7","doi-asserted-by":"crossref","unstructured":"Kwon KR, Chang HJ, Jung GS, Moon KS, Lee SH (2006) 3D CAD drawing watermarking based on three components. In: Proceedings of the IEEE international conference on image processing, Atlanta, GA, USA, pp 1385\u20131388","DOI":"10.1109\/ICIP.2006.312593"},{"key":"1677_CR8","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/11815921_23","volume":"4109","author":"KR Kwon","year":"2006","unstructured":"Kwon KR, Lee SH, Lee EJ, Kwon SG (2006) Watermarking for 3D CAD drawings based on three components. Lect Notes Comput Sci 4109:217\u2013225","journal-title":"Lect Notes Comput Sci"},{"issue":"6","key":"1677_CR9","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/j.cad.2011.02.006","volume":"43","author":"SH Kwon","year":"2011","unstructured":"Kwon SH, Kim TW, Choi HI, Moon HP, Park SH, Shin HJ, Sohn JK (2011) Blind digital watermarking of rational B\u00e9ier and B-spline curves and surfaces with robustness against affine transformations and m\u00f6ius reparameterization. Comput Aided Des 43(6):629\u2013638","journal-title":"Comput Aided Des"},{"issue":"3","key":"1677_CR10","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.cag.2007.01.022","volume":"31","author":"G Lavou\u00e9","year":"2007","unstructured":"Lavou\u00e9 G, Denis F, Dupont F (2007) Subdivision surface watermarking. Comput Graph-UK 31(3):480\u2013492","journal-title":"Comput Graph-UK"},{"issue":"14","key":"1677_CR11","doi-asserted-by":"crossref","first-page":"2142","DOI":"10.1155\/S1110865704407148","volume":"2004","author":"JJ Lee","year":"2004","unstructured":"Lee JJ, Cho NI, Lee SU (2004) Watermarking algorithms for 3D NURBS graphic data. EURASIP J Appl Sig P 2004(14):2142\u20132152","journal-title":"EURASIP J Appl Sig P"},{"issue":"5","key":"1677_CR12","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1016\/j.dsp.2010.01.003","volume":"20","author":"SH Lee","year":"2010","unstructured":"Lee SH, Kwon KR (2010) CAD drawing watermarking scheme. Digital Signal Process 20(5):1379\u20131399","journal-title":"Digital Signal Process"},{"issue":"5","key":"1677_CR13","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1016\/j.dsp.2012.04.015","volume":"22","author":"SH Lee","year":"2012","unstructured":"Lee SH, Kwon KR (2012) Robust 3D mesh model hashing based on feature object. Digital Signal Process 22(5):744\u2013759","journal-title":"Digital Signal Process"},{"key":"1677_CR14","first-page":"33:1","volume":"33","author":"J Li","year":"2012","unstructured":"Li J, Liu HM, Huang JW, Shi YQ (2012) Reference index-based H.264 video watermarking scheme. ACM Trans Multimed Comput 8(2s):33:1\u201333:22","journal-title":"ACM Trans Multimed Comput"},{"issue":"5","key":"1677_CR15","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1016\/j.chaos.2005.09.029","volume":"30","author":"A Mooney","year":"2006","unstructured":"Mooney A, Keating JG, Heffernan DM (2006) A detailed study of the generation of optically detectable watermarks using the logistic map. Chaos, Soliton Fractals 30(5):1088\u20131097","journal-title":"Chaos, Soliton Fractals"},{"key":"1677_CR16","unstructured":"Ohbuchi R, Masuda H (2000) Managing CAD data as a multimedia data type using digital watermarking. In: Proceedings of the IFIP TC5 WG5.2 fourth workshop on knowledge intensive CAD to knowledge intensive engineering, Parma, Italy, pp 103\u2013116"},{"key":"1677_CR17","doi-asserted-by":"crossref","unstructured":"Ohbuchi R, Masuda H, Aono M (1999) A shape-preserving data embedding algorithm for NURBS curves and surfaces. In: Proceedings of the computer graphics international, Alberta, Canada, pp 180\u2013187","DOI":"10.1109\/CGI.1999.777952"},{"issue":"12","key":"1677_CR18","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1016\/j.cad.2010.08.004","volume":"42","author":"F Peng","year":"2010","unstructured":"Peng F, Guo RS, Li CT, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput Aided Des 42(12):1207\u20131216","journal-title":"Comput Aided Des"},{"issue":"8","key":"1677_CR19","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1016\/j.cad.2011.03.011","volume":"43","author":"F Peng","year":"2011","unstructured":"Peng F, Lei YZ, Long M, Sun XM (2011) A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput Aided Des 43(8):1018\u20131024","journal-title":"Comput Aided Des"},{"issue":"2","key":"1677_CR20","first-page":"1","volume":"61","author":"J Singh","year":"2012","unstructured":"Singh J, Garg P, De A (2012) Multiplicative watermarking of audio in DFT magnitude. Multimed Tools Appl 61(2):1\u201323","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"1677_CR21","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1016\/j.cad.2013.04.001","volume":"45","author":"ZY Su","year":"2013","unstructured":"Su ZY, Li WQ, Kong JS, Dai YW, Tang WQ (2013) Watermarking 3d capd models for topology verification. Comput Aided Des 45(7):1042\u20131052","journal-title":"Comput Aided Des"},{"issue":"4","key":"1677_CR22","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.cag.2013.02.009","volume":"37","author":"ZY Su","year":"2013","unstructured":"Su ZY, Zhou L, Li WQ, Dai YW, Tang WQ (2013) Topology authentication for capd models based on laplacian coordinates. Comput Graph-UK 37(4):269\u2013279","journal-title":"Comput Graph-UK"},{"issue":"8","key":"1677_CR23","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1109\/TMM.2008.2007350","volume":"10","author":"K Wang","year":"2008","unstructured":"Wang K, Lavou\u00e9 G, Denis F, Baskurt A (2008) A comprehensive survey on three-dimensional mesh watermarking. IEEE Trans Multimedia 10(8):1513\u20131527","journal-title":"IEEE Trans Multimedia"},{"issue":"1","key":"1677_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cag.2010.09.010","volume":"35","author":"K Wang","year":"2011","unstructured":"Wang K, Lavou\u00e9 G, Denis F, Baskurt A (2011) Robust and blind mesh watermarking based on volume moments. Comput Graph-UK 35(1):1\u201319","journal-title":"Comput Graph-UK"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1677-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1677-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1677-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,21]],"date-time":"2019-07-21T10:40:31Z","timestamp":1563705631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1677-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,22]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["1677"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1677-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,22]]}}}