{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:06Z","timestamp":1740122826793,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T00:00:00Z","timestamp":1475625600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300160"],"award-info":[{"award-number":["61300160"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11042-016-3994-x","type":"journal-article","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T22:04:06Z","timestamp":1475618646000},"page":"20663-20689","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A unified framework for authenticating topology integrity of 2D heterogeneous engineering CAD drawings"],"prefix":"10.1007","volume":"76","author":[{"given":"Zhiyong","family":"Su","sequence":"first","affiliation":[]},{"given":"Lang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yaobin","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Weiqing","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"issue":"1\u20132","key":"3994_CR1","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/S0098-1354(03)00180-7","volume":"28","author":"A Burdorf","year":"2004","unstructured":"Burdorf A, Kampczyk B, Lederhose M, Schmidt-Traub H (2004) CAPD-Computer-aided plant design. Comput Chem Eng 28(1\u20132):73\u201381","journal-title":"Comput Chem Eng"},{"issue":"9","key":"3994_CR2","doi-asserted-by":"crossref","first-page":"3013","DOI":"10.1007\/s11042-013-1766-4","volume":"74","author":"G Ciocca","year":"2015","unstructured":"Ciocca G, Cusano C, Schettini R (2015) Image orientation detection using lbp-based features and logistic regression. Multimedia Tools and Applications 74(9):3013\u20133034","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"3994_CR3","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/0010-4485(87)90259-4","volume":"19","author":"M Dow","year":"1987","unstructured":"Dow M (1987) Integration of calculation models and CAD systems in building services design. Comput Aided Des 19(5):226\u2013232","journal-title":"Comput Aided Des"},{"issue":"4","key":"3994_CR4","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/0020-0190(72)90045-2","volume":"1","author":"R Graham","year":"1972","unstructured":"Graham R (1972) An efficient algorithm for determining the convex hull of a finite planar set. Inf Process Lett 1(4):132\u2013133","journal-title":"Inf Process Lett"},{"issue":"1","key":"3994_CR5","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.compchemeng.2005.08.009","volume":"30","author":"R Guirardello","year":"2005","unstructured":"Guirardello R, Swaney R (2005) Optimization of process plant layout with pipe routing. Comput Chem Eng 30(1):99\u2013114","journal-title":"Comput Chem Eng"},{"issue":"6","key":"3994_CR6","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1109\/TSMCC.2011.2118750","volume":"41","author":"D Huang","year":"2011","unstructured":"Huang D, Shan C, Ardabilian M, Wang Y, Chen L (2011) Local binary patterns and its application to facial image analysis: A survey. IEEE Trans Syst Man Cybern Part C Appl Rev 41(6):765\u2013781","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"issue":"5","key":"3994_CR7","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1016\/j.dsp.2010.01.003","volume":"20","author":"S Lee","year":"2010","unstructured":"Lee S, Kwon K (2010) CAD Drawing watermarking scheme. Digital Signal Process 20(5):1379\u20131399","journal-title":"Digital Signal Process"},{"issue":"2","key":"3994_CR8","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s00530-013-0339-8","volume":"20","author":"W Mazurczyk","year":"2014","unstructured":"Mazurczyk W, Szczypiorski K (2014) Advances in digital media security and right management. Multimedia Systems 20(2):101\u2013103","journal-title":"Multimedia Systems"},{"issue":"3","key":"3994_CR9","doi-asserted-by":"crossref","first-page":"3634","DOI":"10.1016\/j.eswa.2011.09.054","volume":"39","author":"L Nanni","year":"2012","unstructured":"Nanni L, Lumini A, Brahnam S (2012) Survey on LBP based texture descriptors for image classification. Expert Syst Appl 39(3):3634\u20133641","journal-title":"Expert Syst Appl"},{"key":"3994_CR10","unstructured":"Ohbuchi R, Masuda H (2001) Managing CAD data as a multimedia data type using digital watermarking. In: Proceedings of the IFIP TC5 WG5.2 fourth workshop on knowledge intensive CAD to knowledge intensive engineering. Deventer, The Netherlands, The Netherlands, pp 103\u2013116"},{"issue":"1","key":"3994_CR11","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","volume":"29","author":"T Ojala","year":"1996","unstructured":"Ojala T, Pietik\u00e4inen M., Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn 29(1):51\u201359","journal-title":"Pattern Recogn"},{"issue":"12","key":"3994_CR12","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1016\/j.cad.2010.08.004","volume":"42","author":"F Peng","year":"2010","unstructured":"Peng F, Guo R, Li C, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput Aided Des 42(12):1207\u20131216","journal-title":"Comput Aided Des"},{"issue":"4","key":"3994_CR13","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.cad.2013.12.006","volume":"49","author":"F Peng","year":"2014","unstructured":"Peng F, Liu Y, Long M (2014) Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting. Comput Aided Des 49(4):42\u201350","journal-title":"Comput Aided Des"},{"issue":"7","key":"3994_CR14","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1016\/j.cad.2013.04.001","volume":"45","author":"Z Su","year":"2013","unstructured":"Su Z, Li W, Kong J, Dai Y, Tang W (2013) Watermarking 3D CAPD models for topology verification. Comput Aided Des 45(7):1042\u20131052","journal-title":"Comput Aided Des"},{"issue":"9","key":"3994_CR15","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.cad.2015.04.005","volume":"66","author":"Z Su","year":"2015","unstructured":"Su Z, Yang X, Liu G, Li W, Tang W (2015) Topology authentication for piping isometric drawing. Comput Aided Des 66(9):33\u201344","journal-title":"Comput Aided Des"},{"issue":"3","key":"3994_CR16","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.cagd.2009.12.003","volume":"27","author":"HA van der Meiden","year":"2010","unstructured":"van der Meiden HA, Bronsvoort WF (2010) Tracking topological changes in parametric models. Comput Aided Geom Des 27(3):281\u2013293","journal-title":"Comput Aided Geom Des"},{"issue":"5","key":"3994_CR17","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.cagd.2010.02.003","volume":"27","author":"Y Wang","year":"2010","unstructured":"Wang Y, Hu S (2010) Optimization approach for 3d model watermarking by linear binary programming. Comput Aided Geom Des 27(5):395\u2013404","journal-title":"Comput Aided Geom Des"},{"issue":"3","key":"3994_CR18","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1007\/s11042-012-1333-4","volume":"67","author":"N Wang","year":"2013","unstructured":"Wang N, Men C (2013) Reversible fragile watermarking for locating tampered blocks in 2d vector maps. Multimedia Tools and Applications 67(3):709\u2013739","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"3994_CR19","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1016\/j.cad.2008.03.001","volume":"40","author":"W Wang","year":"2008","unstructured":"Wang W, Zheng G, Yong J, Gu H (2008) A numerically stable fragile watermarking scheme for authenticating 3D models. Comput Aided Des 40(5):634\u2013645","journal-title":"Comput Aided Des"},{"issue":"6","key":"3994_CR20","doi-asserted-by":"crossref","first-page":"2109","DOI":"10.1007\/s11042-013-1744-x","volume":"74","author":"D Xiao","year":"2015","unstructured":"Xiao D, Hu S, Zheng H (2015) A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics. Multimedia Tools and Applications 74(6):2109\u20132126","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"3994_CR21","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s11042-012-1264-0","volume":"73","author":"H Yang","year":"2014","unstructured":"Yang H, Cao Y, Su H, Fan Y, Zheng S (2014) The large-scale crowd analysis based on sparse spatial-temporal local binary pattern. Multimedia Tools and Applications 73(1):41\u201360","journal-title":"Multimedia Tools and Applications"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3994-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3994-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3994-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T07:38:12Z","timestamp":1505374692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3994-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,5]]},"references-count":21,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["3994"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3994-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,10,5]]}}}