{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T15:49:32Z","timestamp":1763567372351,"version":"3.45.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"vor","delay-in-days":9,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"the Jordan Scientific Research Support Fund (SRSF), the Ministry of Higher Education and Scientific Research, in the Hashemite Kingdom of Jordan","award":["2023-2022\/06\/01"],"award-info":[{"award-number":["2023-2022\/06\/01"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s44443-025-00343-5","type":"journal-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T14:31:39Z","timestamp":1762785099000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["3D GLB object extraction framework for encrypting metaverse assets"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2307-2053","authenticated-orcid":false,"given":"Manar A.","family":"Mizher","sequence":"first","affiliation":[]},{"given":"Manal A.","family":"Mizher","sequence":"additional","affiliation":[]},{"given":"Ahmad A.","family":"Mazhar","sequence":"additional","affiliation":[]},{"given":"Ayman M.","family":"Abdallah","sequence":"additional","affiliation":[]},{"given":"Aman S.","family":"Altamimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"343_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla AMA, Sulaiman R, Al-Jabbar MA, Ahmadian A (2021) Cryptosystem for meshed 3D through cellular automata, vol 1. Routledge Taylor & Francis Group. ISBN:9781003138341","DOI":"10.1201\/9781003138341-9-9"},{"issue":"3","key":"343_CR2","first-page":"398","volume":"15","author":"F Abu-Dabaseh","year":"2025","unstructured":"Abu-Dabaseh F, Khtatbeh MM, Al\u2019Ararah K, Alassuli A (2025) Exploring the role of digital transformation in mitigating accounting fraud: a cybersecurity perspective. Int Rev Manag Market 15(3):398","journal-title":"Int Rev Manag Market"},{"key":"343_CR3","doi-asserted-by":"publisher","unstructured":"Aho AV, Corasick MJ (1975) Efficient string matching: an aid to bibliographic search. Commun ACM 18(6). https:\/\/doi.org\/10.1145\/360825.360855","DOI":"10.1145\/360825.360855"},{"key":"343_CR4","doi-asserted-by":"crossref","unstructured":"Al-Afeef M, Jaradat H, Al-Smadi RW, Al\u00a0Shbail M (2024) Nurturing trust in islamic banking within the metaverse for market success. J Islam Market","DOI":"10.1108\/JIMA-01-2024-0040"},{"key":"343_CR5","unstructured":"Albalawee N, Shakhatreh HJM, AlSalamat MAM, Al-Marashdeh ZM, Alwraikat MA, Azzam YHA, Azzam HA (2024) Metaverse technology and corporate governance: a study on the impact of virtual reality technologies on corporate governance. Rela\u00e7\u00f5es Internacionais no Mundo Atual 2(44)"},{"key":"343_CR6","doi-asserted-by":"crossref","unstructured":"Alhanatleh H, Khaddam A, Alzghoul A (2024) Measuring factors affecting consumer attitudes toward metaverse adoption: islamic banking services setting. Banks and Bank Systems","DOI":"10.21511\/bbs.19(4).2024.16"},{"key":"343_CR7","doi-asserted-by":"publisher","unstructured":"Al-Jabbar\u00a0Ahmad Mizher MA, Sulaiman R, Aref Abdalla AM, Ahmad Mizher MA (2021) A simple flexible cryptosystem for meshed 3d objects and images. J King Saud Univ - Comput Inf Sci 33(6):629\u2013646. ISSN 1319-1578. https:\/\/doi.org\/10.1016\/j.jksuci.2019.03.008","DOI":"10.1016\/j.jksuci.2019.03.008"},{"key":"343_CR8","doi-asserted-by":"publisher","unstructured":"Aljaidi M, Alsarhan A, Al-Fraihat D, Al-Arjan A, Igried B, El-Salhi SM, Khalid M, Al-Na\u2019amneh Q (2023) Cybersecurity threats in the era of ai: detection of phishing domains through classification rules. In: 2023 2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI). https:\/\/doi.org\/10.1109\/EICEEAI60672.2023.10590011","DOI":"10.1109\/EICEEAI60672.2023.10590011"},{"key":"343_CR9","doi-asserted-by":"publisher","unstructured":"Al-Khalaileh L, Al-Billeh T, Al-Hammouri A (2025) The legal authority of the electronic authentication certificate and its role in proving e-commerce transactions. Int J Electron Secur Digit Forensics 17(1-2). https:\/\/doi.org\/10.1504\/IJESDF.2025.143469","DOI":"10.1504\/IJESDF.2025.143469"},{"key":"343_CR10","doi-asserted-by":"publisher","unstructured":"Al-Nawaiseh S (2025) The effectiveness of augmented reality technology (metaverse) on mathematics achievement among students with learning difficulties. J Appl Sci-Humanities Series 42(1). https:\/\/doi.org\/10.4018\/979-8-3693-9005-4.ch011","DOI":"10.4018\/979-8-3693-9005-4.ch011"},{"issue":"3","key":"343_CR11","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.5267\/j.ijdns.2024.4.007","volume":"8","author":"A AlShorman","year":"2024","unstructured":"AlShorman A, Shannaq F, Shehab M (2024) Machine learning approaches for enhancing smart contracts security: a systematic literature review. Int J Data Netw Sci 8(3):1349\u20131368. https:\/\/doi.org\/10.5267\/j.ijdns.2024.4.007","journal-title":"Int J Data Netw Sci"},{"key":"343_CR12","doi-asserted-by":"publisher","unstructured":"Baker MB, Sihwail R, Mizher M (2023) Integrating cyber security factors with tam framework for implementation in the jordanian banks. AIP Conf Proc 2979(1):040004. ISSN 0094-243X. https:\/\/doi.org\/10.1063\/5.0174720","DOI":"10.1063\/5.0174720"},{"key":"343_CR13","doi-asserted-by":"publisher","unstructured":"Bani Salameh AK, Malak MZ, El-Qirem FA, Alhussami M, El-hneiti M (2024) Effect of virtual reality simulation as a teaching strategy on nursing students\u2019 satisfaction, self-confidence, performance, and physiological measures in jordan. Teach Learn Nurs 19(1). ISSN 1557-3087. https:\/\/doi.org\/10.1016\/j.teln.2023.11.005. Special Issue on Evaluation","DOI":"10.1016\/j.teln.2023.11.005"},{"key":"343_CR14","unstructured":"Broder AZ (1997) On the resemblance and containment of documents. In: Proceedings of the compression and complexity of sequences 1997 (SEQUENCES \u201997), Washington, DC, USA. IEEE Computer Society"},{"key":"343_CR15","doi-asserted-by":"publisher","unstructured":"Haitham MA, Gouher A (2024) Factors affecting attitude to use metaverse technology application. Int J Data Netw Sci. https:\/\/doi.org\/10.5267\/j.ijdns.2024.4.018","DOI":"10.5267\/j.ijdns.2024.4.018"},{"key":"343_CR16","doi-asserted-by":"publisher","unstructured":"Hamming RW (1950) Error detecting and error correcting codes. Bell Syst Tech J 29(2). https:\/\/doi.org\/10.1002\/j.1538-7305.1950.tb00463.x","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"issue":"10","key":"343_CR17","doi-asserted-by":"publisher","first-page":"379","DOI":"10.3390\/fi16100379","volume":"16","author":"M Hatami","year":"2024","unstructured":"Hatami M, Qian Q, Chen Y, Kholidy H, Blasch E, Ardiles-Cruz E (2024) A survey of the real-time metaverse: challenges and opportunities. Future Internet 16(10):379. https:\/\/doi.org\/10.3390\/fi16100379","journal-title":"Future Internet"},{"key":"343_CR18","doi-asserted-by":"crossref","unstructured":"Jin X, Zhu S, Wu L, Zhao G, Li X, Zhou Q, Lu H (2020) Multi-level chaotic maps for 3d textured model encryption. In: 2nd EAI international conference on robotic sensor networks: ROSENET 2018. Springer, pp 107\u2013117","DOI":"10.1007\/978-3-030-17763-8_10"},{"key":"343_CR19","unstructured":"KhronosGroup (2000) gltf 2.0 specification. https:\/\/registry.khronos.org\/glTF\/specs\/2.0\/glTF-2.0.html#glb-file-format-specification. Accessed August 2024"},{"key":"343_CR20","doi-asserted-by":"publisher","unstructured":"Knuth DE, Morris JH, Pratt VR (1977) Fast pattern matching in strings. SIAM J Comput 6(2). https:\/\/doi.org\/10.1137\/0206024","DOI":"10.1137\/0206024"},{"key":"343_CR21","doi-asserted-by":"crossref","unstructured":"Li X, Zhang P, Zhou K, Wang X, Yin H, Xie X, Wei X (2024) A method for comparative analysis of multidimensional data based on product characteristics. In: Advanced fiber laser conference (AFL2023), vol 13104. SPIE","DOI":"10.1117\/12.3023743"},{"key":"343_CR22","doi-asserted-by":"publisher","unstructured":"Mart\u00ednez VG, Hern\u00e1ndez-\u00c1lvarez F, Hern\u00e1ndez Encinas L (2020) An improved bytewise approximate matching algorithm suitable for files of dissimilar sizes. Mathematics 8(4). https:\/\/doi.org\/10.3390\/math8040503","DOI":"10.3390\/math8040503"},{"key":"343_CR23","unstructured":"Melis PEC (2021) glbdump - dump the contents of a binary gltf (.glb) file. https:\/\/github.com\/paulmelis\/glbdump?tab=MIT-1-ov-file. Accessed June 2023"},{"key":"343_CR24","unstructured":"Miller L (2018) pygltflib: a python library for reading, writing and handling gltf files. https:\/\/gitlab.com\/dodgyville\/pygltflib. Accessed August 2023"},{"key":"343_CR25","doi-asserted-by":"publisher","unstructured":"Mizher MA, Sihwail R, Baker MB, Mazhar AA, Mizher MA, Ibrahim D (2023b) A review of cybersecurity for internet-of-things based on next generation healthcare networks. AIP Conf Proc 2979(1):070004. ISSN 0094-243X. https:\/\/doi.org\/10.1063\/5.0174729","DOI":"10.1063\/5.0174729"},{"key":"343_CR26","doi-asserted-by":"publisher","unstructured":"Mizher MA, Sulaiman R, Abdalla AM, Mizher MA (2019) An improved simple flexible cryptosystem for 3d objects with texture maps and 2d images. J Inf Secur Appl 47:390\u2013409. ISSN 2214-2126. https:\/\/doi.org\/10.1016\/j.jisa.2019.06.005","DOI":"10.1016\/j.jisa.2019.06.005"},{"key":"343_CR27","doi-asserted-by":"publisher","unstructured":"Mizher M, Hamdan S, Mizher M, Mazhar AA, Mimi H, Heyari AM (2023a) Three dimensional objects encryption algorithms: a review. In: 2023 International Conference on Information Technology (ICIT). https:\/\/doi.org\/10.1109\/ICIT58056.2023.10226134","DOI":"10.1109\/ICIT58056.2023.10226134"},{"key":"343_CR28","doi-asserted-by":"publisher","unstructured":"Pooyandeh M, Han K-J, Sohn I (2022) Cybersecurity in the ai-based metaverse: a survey. Appl Sci 12(24). https:\/\/doi.org\/10.3390\/app122412993","DOI":"10.3390\/app122412993"},{"key":"343_CR29","unstructured":"Schneier B (1996) Applied cryptography: protocols, algorithms, and source code in c. In: Applied cryptography. Wiley. ISBN :978-0471117094"},{"key":"343_CR30","doi-asserted-by":"publisher","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3). https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"343_CR31","doi-asserted-by":"publisher","unstructured":"Siyal R, Long J, Asim M, Ahmad N, Fathi H, Alshinwan M (2024) Blockchain-enabled secure data sharing with honey encryption and dsnn-based key generation. Mathematics 12(13). https:\/\/doi.org\/10.3390\/math12131956","DOI":"10.3390\/math12131956"},{"key":"343_CR32","doi-asserted-by":"publisher","unstructured":"Wang Y, Su Z, Zhang N, Xing R, Liu D, Luan TH, Shen X (2023) A survey on metaverse: fundamentals, security, and privacy. IEEE Commun Surv Tutor 25(1). ISSN 1553-877X. https:\/\/doi.org\/10.1109\/COMST.2022.3202047","DOI":"10.1109\/COMST.2022.3202047"},{"key":"343_CR33","doi-asserted-by":"publisher","unstructured":"Yasmin N, Gupta R (2023) Ultra-lightweight encryption for stl files in iot-based 3d printing. Int J Safety Security Eng 13(4). https:\/\/doi.org\/10.18280\/ijsse.130407","DOI":"10.18280\/ijsse.130407"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00343-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00343-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00343-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T15:46:04Z","timestamp":1763567164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00343-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":33,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["343"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00343-5","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"type":"print","value":"1319-1578"},{"type":"electronic","value":"2213-1248"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"14 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors certify that this manuscript has not been published and is not being considered elsewhere, and they have no conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"307"}}