{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T02:07:44Z","timestamp":1778810864478,"version":"3.51.4"},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272331"],"award-info":[{"award-number":["62272331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Visual Communication and Image Representation"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.jvcir.2026.104789","type":"journal-article","created":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T16:35:25Z","timestamp":1774283725000},"page":"104789","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Robust mesh watermarking against geometric distortions based on vertex valence distribution"],"prefix":"10.1016","volume":"117","author":[{"given":"Qingyuan","family":"Hou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1339-2504","authenticated-orcid":false,"given":"Hongxia","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.jvcir.2026.104789_b1","series-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems","first-page":"870","article-title":"Convolutional generation of textured 3D meshes","author":"Pavllo","year":"2020"},{"issue":"1","key":"10.1016\/j.jvcir.2026.104789_b2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1186\/s42492-020-00057-7","article-title":"Systematic review and meta-analysis of augmented reality in medicine, retail, and games","volume":"3","author":"Parekh","year":"2020","journal-title":"Vis. Comput. Ind. Biomed. Art"},{"issue":"7","key":"10.1016\/j.jvcir.2026.104789_b3","article-title":"Virtual and augmented reality for biomedical applications","volume":"2","author":"Venkatesan","year":"2021","journal-title":"Cell Rep. Med."},{"key":"10.1016\/j.jvcir.2026.104789_b4","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"7784","article-title":"Rethinking mesh watermark: Towards highly robust and adaptable deep 3D mesh watermarking","volume":"Vol. 38","author":"Zhu","year":"2024"},{"key":"10.1016\/j.jvcir.2026.104789_b5","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"22466","article-title":"The stable signature: Rooting watermarks in latent diffusion models","author":"Fernandez","year":"2023"},{"key":"10.1016\/j.jvcir.2026.104789_b6","series-title":"AMUSE: Adaptive multi-segment encoding for dataset watermarking","author":"Alvar","year":"2024"},{"key":"10.1016\/j.jvcir.2026.104789_b7","series-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"4756","article-title":"NFT-based data marketplace with digital watermarking","author":"Ranjbar Alvar","year":"2023"},{"issue":"11","key":"10.1016\/j.jvcir.2026.104789_b8","doi-asserted-by":"crossref","first-page":"6531","DOI":"10.1109\/TCSVT.2023.3272955","article-title":"Semi-fragile reversible watermarking for 3D models using spherical crown volume division","volume":"33","author":"Peng","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"10.1016\/j.jvcir.2026.104789_b9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2009.2039604","article-title":"Efficient general print-scanning resilient data hiding based on uniform log-polar mapping","volume":"5","author":"Kang","year":"2010","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.jvcir.2026.104789_b10","series-title":"Proceedings of the European Conference on Computer Vision","first-page":"657","article-title":"Hidden: Hiding data with deep networks","author":"Zhu","year":"2018"},{"issue":"10","key":"10.1016\/j.jvcir.2026.104789_b11","doi-asserted-by":"crossref","first-page":"2447","DOI":"10.1109\/TMM.2019.2907475","article-title":"Enhancing image watermarking with adaptive embedding parameter and PSNR guarantee","volume":"21","author":"Huang","year":"2019","journal-title":"IEEE Trans. Multimed."},{"issue":"12","key":"10.1016\/j.jvcir.2026.104789_b12","doi-asserted-by":"crossref","first-page":"4826","DOI":"10.1109\/TCSVT.2021.3055255","article-title":"Local geometric distortions resilient watermarking scheme based on symmetry","volume":"31","author":"Ma","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jvcir.2026.104789_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2024.104300","article-title":"Robust text watermarking based on average skeleton mass of characters against cross-media attacks","volume":"104","author":"Huang","year":"2024","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2026.104789_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2024.104339","article-title":"Color image watermarking using vector SNCM-HMT","volume":"105","author":"Wang","year":"2024","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"8","key":"10.1016\/j.jvcir.2026.104789_b15","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1109\/TMM.2008.2007350","article-title":"A comprehensive survey on three-dimensional mesh watermarking","volume":"10","author":"Wang","year":"2008","journal-title":"IEEE Trans. Multimed."},{"issue":"1","key":"10.1016\/j.jvcir.2026.104789_b16","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1109\/TSP.2006.882111","article-title":"An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms","volume":"55","author":"Cho","year":"2007","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"10.1016\/j.jvcir.2026.104789_b17","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TMM.2008.2008913","article-title":"Blind robust 3-D mesh watermarking based on oblate spheroidal harmonics","volume":"11","author":"Konstantinides","year":"2008","journal-title":"IEEE Trans. Multimed."},{"issue":"1","key":"10.1016\/j.jvcir.2026.104789_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cag.2010.09.010","article-title":"Robust and blind mesh watermarking based on volume moments","volume":"35","author":"Wang","year":"2011","journal-title":"Comput. Graph."},{"issue":"10","key":"10.1016\/j.jvcir.2026.104789_b19","doi-asserted-by":"crossref","first-page":"2813","DOI":"10.1109\/TIP.2011.2142004","article-title":"Surface-preserving robust watermarking of 3-D shapes","volume":"20","author":"Luo","year":"2011","journal-title":"IEEE Trans. Image Process."},{"issue":"9","key":"10.1016\/j.jvcir.2026.104789_b20","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1109\/TIFS.2014.2336376","article-title":"Triangle surface mesh watermarking based on a constrained optimization framework","volume":"9","author":"Rolland-Neviere","year":"2014","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.jvcir.2026.104789_b21","series-title":"International Conference on Information and Communications Security","first-page":"573","article-title":"Robust reversible watermarking for 3D models based on auto diffusion function","author":"Lin","year":"2025"},{"issue":"1","key":"10.1016\/j.jvcir.2026.104789_b22","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1186\/s42400-022-00125-w","article-title":"Deep 3D mesh watermarking with self-adaptive robustness","volume":"5","author":"Wang","year":"2022","journal-title":"Cybersecurity"},{"key":"10.1016\/j.jvcir.2026.104789_b23","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"10031","article-title":"Deep 3D-to-2D watermarking: Embedding messages in 3D meshes and extracting them from 2D renderings","author":"Yoo","year":"2022"},{"issue":"4","key":"10.1016\/j.jvcir.2026.104789_b24","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/49.668977","article-title":"Watermarking three-dimensional polygonal models through geometric and topological modifications","volume":"16","author":"Ohbuchi","year":"1998","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.jvcir.2026.104789_b25","series-title":"Security and Watermarking of Multimedia Contents III","first-page":"253","article-title":"Watermarking 3D geometric models through triangle subdivision","volume":"Vol. 4314","author":"Mao","year":"2001"},{"issue":"6","key":"10.1016\/j.jvcir.2026.104789_b26","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1016\/j.image.2010.05.002","article-title":"Lossless 3D steganography based on MST and connectivity modification","volume":"25","author":"Amat","year":"2010","journal-title":"Signal Process.-Image Commun."},{"issue":"3","key":"10.1016\/j.jvcir.2026.104789_b27","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1007\/s11042-012-1135-8","article-title":"An adaptive steganographic algorithm for 3D polygonal models using vertex decimation","volume":"69","author":"Tsai","year":"2014","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.jvcir.2026.104789_b28","series-title":"Proceedings of 37th Conference on Foundations of Computer Science","first-page":"96","article-title":"Spectral partitioning works: Planar graphs and finite element meshes","author":"Spielman","year":"1996"},{"key":"10.1016\/j.jvcir.2026.104789_b29","series-title":"2009 IEEE International Conference on Acoustics, Speech and Signal Processing","first-page":"1501","article-title":"Constrained optimisation of 3D polygonal mesh watermarking by quadratic programming","author":"Hu","year":"2009"},{"key":"10.1016\/j.jvcir.2026.104789_b30","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"11004","article-title":"Mesh watermark removal attack and mitigation: A novel perspective of function space","volume":"Vol. 39","author":"Zhu","year":"2025"},{"key":"10.1016\/j.jvcir.2026.104789_b31","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"165","article-title":"Deepsdf: Learning continuous signed distance functions for shape representation","author":"Park","year":"2019"},{"key":"10.1016\/j.jvcir.2026.104789_b32","series-title":"Modern Graph Theory","author":"Bollob\u00e1s","year":"1998"},{"key":"10.1016\/j.jvcir.2026.104789_b33","series-title":"Seminal Graphics Papers: Pushing the Boundaries, Volume 2","first-page":"149","article-title":"Implicit fairing of irregular meshes using diffusion and curvature flow","author":"Desbrun","year":"2023"},{"issue":"12","key":"10.1016\/j.jvcir.2026.104789_b34","doi-asserted-by":"crossref","first-page":"8394","DOI":"10.1109\/TCSVT.2022.3192542","article-title":"A semi-fragile reversible watermarking for authenticating 3D models in dual domains based on variable direction double modulation","volume":"32","author":"Peng","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jvcir.2026.104789_b35","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1912","article-title":"3D shapenets: A deep representation for volumetric shapes","author":"Wu","year":"2015"},{"key":"10.1016\/j.jvcir.2026.104789_b36","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"803","article-title":"Omniobject3D: Large-vocabulary 3D object dataset for realistic perception, reconstruction and generation","author":"Wu","year":"2023"}],"container-title":["Journal of Visual Communication and Image Representation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1047320326000842?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1047320326000842?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:44:50Z","timestamp":1776127490000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1047320326000842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":36,"alternative-id":["S1047320326000842"],"URL":"https:\/\/doi.org\/10.1016\/j.jvcir.2026.104789","relation":{},"ISSN":["1047-3203"],"issn-type":[{"value":"1047-3203","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Robust mesh watermarking against geometric distortions based on vertex valence distribution","name":"articletitle","label":"Article Title"},{"value":"Journal of Visual Communication and Image Representation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jvcir.2026.104789","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104789"}}