{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T14:58:21Z","timestamp":1767193101566,"version":"build-2065373602"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Earth Sci Inform"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12145-025-01836-7","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T23:51:41Z","timestamp":1741650701000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Robust watermarking algorithm for oblique photography 3D models based on multi-level curvature and weighted distance"],"prefix":"10.1007","volume":"18","author":[{"given":"Ruigang","family":"Nan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liming","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yan","family":"Jin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianing","family":"Xie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuaikang","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haoran","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"key":"1836_CR1","doi-asserted-by":"publisher","unstructured":"Abdel H, Mohamed, Hassaballah M, Aly S, Abdel R, Ahmed S (2018) A High Payload Steganography Method based on Pixel Value Differencing. Proceedings of the 11th International Conference on Informatics & Systems (INFOS 2018) 7.\u00a0https:\/\/doi.org\/10.2139\/ssrn.3389800\u00a0","DOI":"10.2139\/ssrn.3389800"},{"key":"1836_CR2","doi-asserted-by":"publisher","unstructured":"Bekhet S, Hassaballah M, Kenk MA, Hameed MA (2020) An Artificial Intelligence Based Technique for COVID-19 Diagnosis from Chest X-Ray.\u00a02020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES) 191\u2013195. https:\/\/doi.org\/10.1109\/NILES50944.2020.9257930","DOI":"10.1109\/NILES50944.2020.9257930"},{"key":"1836_CR3","doi-asserted-by":"publisher","unstructured":"Chen J, Liu J, Tian H (2022) Basic Positioning and Technical Pathways of Real-Scene 3D China Construction. J Wuhan Univ (Information Science Edition) 47(10):1568\u20131575. https:\/\/doi.org\/10.13203\/j.whugis20220576","DOI":"10.13203\/j.whugis20220576"},{"issue":"1","key":"1836_CR4","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/TSP.2006.882111","volume":"55","author":"J Cho","year":"2007","unstructured":"Cho J, Prost R, Jung H (2007) An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms. IEEE Trans Signal Process 55(1):142\u2013155. https:\/\/doi.org\/10.1109\/TSP.2006.882111","journal-title":"IEEE Trans Signal Process"},{"key":"1836_CR5","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/CIIS.2017.47","volume":"2017","author":"A Dong","year":"2017","unstructured":"Dong A, Zeng R (2017) Research and Implementation Based on Three-Dimensional Model Watermarking Algorithm. International Conference on Computing Intelligence and Information System (CIIS) 2017:277\u2013282. https:\/\/doi.org\/10.1109\/CIIS.2017.47","journal-title":"International Conference on Computing Intelligence and Information System (CIIS)"},{"key":"1836_CR6","doi-asserted-by":"publisher","unstructured":"Feng X (2016) A New Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation. Comput Sci Eng 59420131. https:\/\/doi.org\/10.2991\/NCEECE-15.2016.173.","DOI":"10.2991\/NCEECE-15.2016.173"},{"key":"1836_CR7","doi-asserted-by":"publisher","unstructured":"Gong W, Zhu C, Cui H, Ren N (2022) Digital Watermarking Algorithm for 3D Models from Oblique Photogrammetry Based on Feature Line Ratio. Sci Surv Mapp 47(4): 80\u201386+152. https:\/\/doi.org\/10.16251\/j.cnki.1009-2307.2022.04.011","DOI":"10.16251\/j.cnki.1009-2307.2022.04.011"},{"key":"1836_CR8","doi-asserted-by":"publisher","first-page":"14705","DOI":"10.1007\/s11042-017-5056-4","volume":"77","author":"MA Hameed","year":"2018","unstructured":"Hameed MA, Aly S, Hassaballah M (2018) An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimed Tools Appl 77:14705\u201314723. https:\/\/doi.org\/10.1007\/s11042-017-5056-4","journal-title":"Multimed Tools Appl"},{"key":"1836_CR9","doi-asserted-by":"publisher","first-page":"185189","DOI":"10.1109\/ACCESS.2019.2960254","volume":"7","author":"MA Hameed","year":"2019","unstructured":"Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques. IEEE Access 7:185189\u2013185204. https:\/\/doi.org\/10.1109\/ACCESS.2019.2960254","journal-title":"IEEE Access"},{"key":"1836_CR10","doi-asserted-by":"publisher","unstructured":"Hassaballah M, Hameed MA, Aly S, AbdelRady AS (2020) 2-A color image steganography method based on ADPVD and HOG techniques. Digit Media Steganography 17\u201340. https:\/\/doi.org\/10.1016\/B978-0-12-819438-6.00010-4.","DOI":"10.1016\/B978-0-12-819438-6.00010-4"},{"key":"1836_CR11","doi-asserted-by":"publisher","unstructured":"Hassaballah M, Hameed MA, Monagi HA (2020) 1-Introduction to digital image steganography. Digit Media Steganography 1\u201315. https:\/\/doi.org\/10.1016\/B978-0-12-819438-6.00009-8","DOI":"10.1016\/B978-0-12-819438-6.00009-8"},{"issue":"11","key":"1836_CR12","doi-asserted-by":"publisher","first-page":"7743","DOI":"10.1109\/TII.2021.3053595","volume":"17","author":"M Hassaballah","year":"2021","unstructured":"Hassaballah M, Hameed MA, Awad AI, Muhammad K (2021) A Novel Image Steganography Method for Industrial Internet of Things Security. IEEE Trans Industr Inf 17(11):7743\u20137751. https:\/\/doi.org\/10.1109\/TII.2021.3053595","journal-title":"IEEE Trans Industr Inf"},{"key":"1836_CR13","doi-asserted-by":"publisher","unstructured":"Hameed MA, Hassaballah M, Hosney ME, Alqahtani A (2022) An AI-Enabled Internet of Things Based Autism Care System for Improving Cognitive Ability of Children with Autism Spectrum Disorders. Comput Intell Neurosci 9878709. https:\/\/doi.org\/10.1155\/2022\/2247675","DOI":"10.1155\/2022\/2247675"},{"key":"1836_CR14","doi-asserted-by":"publisher","unstructured":"Hameed MA, Hassaballah M, Bekhet S, C N, Kenk MA (2023) A High Quality Secure Medical Image Steganography Method. 2023 3rd International Conference on Computing and Information Technology (ICCIT) 465\u2013470. https:\/\/doi.org\/10.1109\/ICCIT58132.2023.10273950","DOI":"10.1109\/ICCIT58132.2023.10273950"},{"key":"1836_CR15","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s12652-022-04366-y","volume":"14","author":"MA Hameed","year":"2023","unstructured":"Hameed MA, Abdel-Aleem OA, Hassaballah M (2023a) A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J Ambient Intell Human Comput 14:4639\u20134657. https:\/\/doi.org\/10.1007\/s12652-022-04366-y","journal-title":"J Ambient Intell Human Comput"},{"key":"1836_CR16","doi-asserted-by":"publisher","unstructured":"Hameed MA (2024) Scrambled Encryption Approach for Color Images Based on 9-D Chaotic Systems with 3-D Substitution Bit Levels. Aswan Univ J Sci Technol. https:\/\/doi.org\/10.21608\/aujst.2024.337900","DOI":"10.21608\/aujst.2024.337900"},{"key":"1836_CR17","doi-asserted-by":"publisher","unstructured":"Hafiz AM, Hassaballah M, Alqahtani A, Alsubai S, Hameed MA (2023) Reinforcement learning with an ensemble of binary action deep q-networks. Comput Syst Sci Eng 46(3):2651\u20132666.\u00a0https:\/\/doi.org\/10.32604\/csse.2023.031720","DOI":"10.32604\/csse.2023.031720"},{"issue":"24","key":"1836_CR18","doi-asserted-by":"publisher","first-page":"13088","DOI":"10.3390\/app132413088","volume":"13","author":"Y Jiao","year":"2023","unstructured":"Jiao Y, Ma C, Luo J, Qiu Y (2023) Security Protection of 3D Models of Oblique Photography by Digital Watermarking and Data Encryption. Appl Sci 13(24):13088. https:\/\/doi.org\/10.3390\/app132413088","journal-title":"Appl Sci"},{"key":"1836_CR19","doi-asserted-by":"publisher","unstructured":"Kenk MA, Hassaballah M, Hameed MA, Bekhet S (2020) Visibility Enhancer: Adaptable for Distorted Traffic Scenes by Dusty Weather. 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES) 213\u2013218. https:\/\/doi.org\/10.1109\/NILES50944.2020.9257952","DOI":"10.1109\/NILES50944.2020.9257952"},{"key":"1836_CR20","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1016\/j.jisa.2022.103414","volume":"73","author":"J-S Lee","year":"2023","unstructured":"Lee J-S, Chen Y-C, Chew C-J, Hung W-C, Fan Y-Y, Li B (2023) Constructing gene features for robust 3D mesh zero-watermarking. J Inf Secur Appl 73:2214\u20132126. https:\/\/doi.org\/10.1016\/j.jisa.2022.103414","journal-title":"J Inf Secur Appl"},{"issue":"9","key":"1836_CR21","doi-asserted-by":"publisher","first-page":"3501","DOI":"10.3390\/su12093501","volume":"12","author":"M Lin","year":"2020","unstructured":"Lin M, Li F-Y, Zhou H (2020) A Research on the Combination of Oblique Photography and Mobile Applications Based on the Sustainable Development of Tourism. Sustainability 12(9):3501. https:\/\/doi.org\/10.3390\/su12093501","journal-title":"Sustainability"},{"key":"1836_CR22","doi-asserted-by":"publisher","unstructured":"Liu J, Yang Y, Ma D, He W, Wang Y (2019) A novel watermarking algorithm for three-dimensional point-cloud models based on vertex curvature. Int J Distrib Sensor Netw 15. https:\/\/doi.org\/10.1177\/1550147719826042","DOI":"10.1177\/1550147719826042"},{"key":"1836_CR23","unstructured":"Liu X, Fang H (2023) Application and Accuracy Analysis of UAV Oblique Photogrammetry in Urba 3D Real Scene Modeling. Urban Construction Theory Research (Electronic Edition) 119\u2013121.\u00a0http:\/\/dx.chinadoi.cn\/10.12359\/202304040"},{"key":"1836_CR24","doi-asserted-by":"publisher","unstructured":"Ma L, Wang D, Zhang C et al (2024) Exploratory application of fusion modeling of oblique photography and LiDAR point clouds in fine mapping of urban villages. Bull Surv Mapp 156\u2013159. https:\/\/doi.org\/10.13474\/j.cnki.11-2246.2024.S232","DOI":"10.13474\/j.cnki.11-2246.2024.S232"},{"key":"1836_CR25","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/s00530-021-00860-z","volume":"28","author":"M Narendra","year":"2022","unstructured":"Narendra M, Valarmathi M-L, Anbarasi L-J (2022) Watermarking techniques for three-dimensional (3D) mesh models: a survey. Multimedia Syst 28:623\u2013641. https:\/\/doi.org\/10.1007\/s00530-021-00860-z","journal-title":"Multimedia Syst"},{"key":"1836_CR26","doi-asserted-by":"publisher","first-page":"31365","DOI":"10.1007\/s11042-019-07982-7","volume":"78","author":"Y Qiu","year":"2019","unstructured":"Qiu Y, Gu H, Sun J, Duan H, Luo J (2019) Rich-information watermarking scheme for 3D models of oblique photography. Multimed Tools Appl 78:31365\u201331386. https:\/\/doi.org\/10.1007\/s11042-019-07982-7","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"1836_CR27","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.3390\/rs15051211","volume":"15","author":"Y-G Qiu","year":"2023","unstructured":"Qiu Y-G, Jiao Y-Q, Luo J-H, Tan Z-Y, Huang L-S, Zhao J-L, Xiao Q-T, Duan H-T (2023) A Rapid Water Region Reconstruction Scheme in 3D Watershed Scene Generated by UAV Oblique Photography. Remote Sensing 15(5):1211. https:\/\/doi.org\/10.3390\/rs15051211","journal-title":"Remote Sensing"},{"key":"1836_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2023.105515","volume":"183","author":"C Qu","year":"2024","unstructured":"Qu C, Du J, Xi X, Tian H, Zhang J (2024) A hybrid domain-based watermarking for vector maps utilizing a complementary advantage of discrete fourier transform and singular value decomposition. Comput Geosci 183:105515. https:\/\/doi.org\/10.1016\/j.cageo.2023.105515","journal-title":"Comput Geosci"},{"key":"1836_CR29","doi-asserted-by":"publisher","first-page":"221481","DOI":"10.1109\/ACCESS.2020.3043450","volume":"8","author":"N Ren","year":"2020","unstructured":"Ren N, Zhu C, Tong D, Chen W, Zhou Q (2020) Commutative Encryption and Watermarking Algorithm Based on Feature Invariants for Secure Vector Map. IEEE Access 8:221481\u2013221493. https:\/\/doi.org\/10.1109\/ACCESS.2020.3043450","journal-title":"IEEE Access"},{"issue":"5","key":"1836_CR30","doi-asserted-by":"publisher","first-page":"294","DOI":"10.3390\/ijgi10050294","volume":"10","author":"N Ren","year":"2021","unstructured":"Ren N, Zhao Y, Zhu C, Zhou Q, Xu D (2021) Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps. ISPRS Int J Geo Inf 10(5):294. https:\/\/doi.org\/10.3390\/ijgi10050294","journal-title":"ISPRS Int J Geo Inf"},{"key":"1836_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120217","volume":"226","author":"N Ren","year":"2023","unstructured":"Ren N, Guo S, Zhu C, Hu Y (2023) A zero-watermarking scheme based on spatial topological relations for vector dataset. Expert Syst Appl 226:120217. https:\/\/doi.org\/10.1016\/j.eswa.2023.120217","journal-title":"Expert Syst Appl"},{"key":"1836_CR32","doi-asserted-by":"publisher","unstructured":"Shang J, Sun L, Wang W, Qing Y, Zhou Z (2015) Holographic Blind Watermarking for 3D Point Cloud Models Based on Discrete Cosine Transform. Packag Eng 36(13): 111\u2013114+121. https:\/\/doi.org\/10.19554\/j.cnki.1001-3563.2015.13.024","DOI":"10.19554\/j.cnki.1001-3563.2015.13.024"},{"key":"1836_CR33","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.cageo.2015.07.008","volume":"83","author":"K Svennevig","year":"2015","unstructured":"Svennevig K, Guarnieri P, Stemmerik L (2015) From oblique photogrammetry to a 3D model Structural modeling of Kilen, eastern North Greenland. Comput Geosci 83:120\u2013126. https:\/\/doi.org\/10.1016\/j.cageo.2015.07.008","journal-title":"Comput Geosci"},{"key":"1836_CR34","doi-asserted-by":"publisher","first-page":"4114","DOI":"10.1109\/TIFS.2024.3372811","volume":"19","author":"Y Tang","year":"2024","unstructured":"Tang Y, Wang C, Xiang S, Cheng Y-M (2024) A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding. IEEE Trans Inf Forensics Secur 19:4114\u20134129. https:\/\/doi.org\/10.1109\/TIFS.2024.3372811","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1836_CR35","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s00530-024-01455-0","volume":"30","author":"L Vandenberghe","year":"2024","unstructured":"Vandenberghe L, Joslin C (2024) 3D model watermarking using surface integrals of generated random vector fields. Multimedia Syst 30:253. https:\/\/doi.org\/10.1007\/s00530-024-01455-0","journal-title":"Multimedia Syst"},{"key":"1836_CR36","doi-asserted-by":"publisher","unstructured":"Wang P, Zhang L, Wang S, Zhang Z, Zhang Q (2024) Reversible Watermarking Algorithm for Oblique Photogrammetry 3D Models with Controllable Accuracy. Geogr Geo-Inf Sci 40(3): 1\u20137. https:\/\/doi.org\/10.3969\/j.issn.1672-0504.2024.03.001","DOI":"10.3969\/j.issn.1672-0504.2024.03.001"},{"key":"1836_CR37","doi-asserted-by":"publisher","unstructured":"Wang G, Ren N, Zhu C, Jing M (2018) Digital Watermarking Algorithm for 3D Models from Oblique Photogrammetry. J Geo-Inf Sci 20(6): 738\u2013743. https:\/\/doi.org\/10.12082\/dqxxkx.2018.180011","DOI":"10.12082\/dqxxkx.2018.180011"},{"issue":"2","key":"1836_CR38","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/TVCG.2008.101","volume":"15","author":"Y-P Wang","year":"2009","unstructured":"Wang Y-P, Hu S-M (2009) A New Watermarking Method for 3D Models Based on Integral Invariants. IEEE Trans Visual Comput Graphics 15(2):285\u2013294. https:\/\/doi.org\/10.1109\/TVCG.2008.101","journal-title":"IEEE Trans Visual Comput Graphics"},{"key":"1836_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119981","volume":"224","author":"J Wang","year":"2023","unstructured":"Wang J, Wu D, Li L, Zhao J, Wu H, Tang Y (2023) Robust periodic blind watermarking based on sub-block mapping and block encryption. Expert Syst Appl 224:119981. https:\/\/doi.org\/10.1016\/j.eswa.2023.119981","journal-title":"Expert Syst Appl"},{"key":"1836_CR40","unstructured":"Wu Y, Geng G, He Y (2012) Digital Watermarking Algorithm for 3D Point Cloud Models Based on DWT. Comput Eng 38(6):151\u2013152+155.\u00a0http:\/\/dx.chinadoi.cn\/10.3969\/j.issn.1000-3428.2012.06.049. Accessed 26 Jun 2024"},{"key":"1836_CR41","unstructured":"Xu T, Lu J (2011) Zero-Watermarking Algorithm for 3D Mesh Models Based on Frequency Domain. Comput Simul 28(5):135\u2013138.\u00a0http:\/\/dx.chinadoi.cn\/10.3969\/j.issn.1006-9348.2011.05.033. Accessed 12 Jun 2024"},{"key":"1836_CR42","unstructured":"Yang M, Ye G (2020) Blind Watermarking Algorithm for 3D Mesh Models Based on Wavelet Transform. J Fujian Normal Univ (Natural Science Edition) 36(3): 32\u201336+51.\u00a0http:\/\/dx.chinadoi.cn\/10.12046\/j.issn.1000-5277.2020.03.004. Accessed 29 Jun 2024"},{"issue":"5","key":"1836_CR43","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TVCG.2005.71","volume":"11","author":"S Zafeiriou","year":"2005","unstructured":"Zafeiriou S, Tefas A, Pitas I (2005) Blind robust watermarking schemes for copyright protection of 3D mesh objects. IEEE Trans Visual Comput Graphics 11(5):596\u2013607. https:\/\/doi.org\/10.1109\/TVCG.2005.71","journal-title":"IEEE Trans Visual Comput Graphics"},{"key":"1836_CR44","unstructured":"Zhang J, Wen X, Lei M, Xu H, Qin C, Liu J (2014) Research on 3D Mesh Digital Watermarking Technology Based on Wavelet Transform. Comput Eng Appl 50(4): 98\u2013102. http:\/\/dx.chinadoi.cn\/10.3778\/j.issn.1002-8331.1204-0169. Accessed 26 Jun 2024"},{"key":"1836_CR45","doi-asserted-by":"publisher","unstructured":"Zhang Z, Zhang L, Wang S, Wang P, Zhang Q (2023) A Digital Watermarking Algorithm for 3D Point Cloud Data Based on Grid Partitioning. Sci Surv Mapp 48(9):252\u2013261. https:\/\/doi.org\/10.16251\/j.cnki.1009-2307.2023.09.024","DOI":"10.16251\/j.cnki.1009-2307.2023.09.024"},{"key":"1836_CR46","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1631\/jzus.C1300306","volume":"15","author":"Y Zhan","year":"2014","unstructured":"Zhan Y, Li Y, Wang X (2014) A blind watermarking algorithm for 3D mesh models based on vertex curvature. J Zhejiang Univ Sci C 15:351\u2013362. https:\/\/doi.org\/10.1631\/jzus.C1300306","journal-title":"J Zhejiang Univ Sci C"},{"key":"1836_CR47","doi-asserted-by":"crossref","unstructured":"Zhou T, Lv L, Liu J, Wan J (2021) Application of uav oblique photography in real scene 3d modeling. Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci 413-418. http:\/\/dx.doi.org\/10.5194\/isprs-archives-XLIII-B2-2021-413-2021","DOI":"10.5194\/isprs-archives-XLIII-B2-2021-413-2021"},{"key":"1836_CR48","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/ISCTIS51085.2021.00045","volume":"2021","author":"C Zhu","year":"2021","unstructured":"Zhu C, Chen L, Lu W, Xiao Q (2021) 3D Real-Scene Model of Oblique Photography Based on Retinex. Int Symp Comput Technol Inf Sci (ISCTIS) 2021:182\u2013185. https:\/\/doi.org\/10.1109\/ISCTIS51085.2021.00045","journal-title":"Int Symp Comput Technol Inf Sci (ISCTIS)"}],"container-title":["Earth Science Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-025-01836-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12145-025-01836-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-025-01836-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:03:09Z","timestamp":1760216589000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12145-025-01836-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,11]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["1836"],"URL":"https:\/\/doi.org\/10.1007\/s12145-025-01836-7","relation":{},"ISSN":["1865-0473","1865-0481"],"issn-type":[{"type":"print","value":"1865-0473"},{"type":"electronic","value":"1865-0481"}],"subject":[],"published":{"date-parts":[[2025,3,11]]},"assertion":[{"value":"6 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"321"}}