{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T06:46:22Z","timestamp":1773125182970,"version":"3.50.1"},"reference-count":25,"publisher":"Elsevier BV","issue":"15","license":[{"start":{"date-parts":[[1998,10,1]],"date-time":"1998-10-01T00:00:00Z","timestamp":907200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1998,10]]},"DOI":"10.1016\/s0140-3664(98)00202-3","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:56:11Z","timestamp":1027652171000},"page":"1344-1354","source":"Crossref","is-referenced-by-count":56,"title":["Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models"],"prefix":"10.1016","volume":"21","author":[{"given":"Ryutarou","family":"Ohbuchi","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Masuda","sequence":"additional","affiliation":[]},{"given":"Masaki","family":"Aono","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(98)00202-3_BIB1","doi-asserted-by":"crossref","unstructured":"F. Mintzer, G.W. Braudway, M.M. Yeung, Effective and ineffective digital watermarks, in: Proceedings of the IEEE International Conference on Image Processing (ICIP) '97, IEEE, Piscataway, NJ, vol. 3, 1997, pp. 9\u201312.","DOI":"10.1109\/ICIP.1997.631957"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB2","unstructured":"B. Pfitzmann, Information hiding terminology, in: R. Anderson (Ed.), Lecture Notes in Computer Science No.1174, Springer, Berlin, 1996, pp. 347\u2013350."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB3","doi-asserted-by":"crossref","unstructured":"A.J. Menezes, P.C. van Oorshot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1996.","DOI":"10.1201\/9781439821916"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB4","doi-asserted-by":"crossref","unstructured":"K. Tanaka, Y. Nakamura, K. Matsui, Embedding secret information into a dithered multilevel image, in: Proceedings of the 1990 IEEE Military Communications Conference, 1990, IEEE, Piscataway, NJ, pp. 216\u2013220.","DOI":"10.1109\/MILCOM.1990.117416"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB5","unstructured":"S. Walton, Image authentication for a slippery new age, in: Dr. Dobb's Journal, Miller Freeman, Inc., San Francisco, CA, April 1995, pp. 18\u201326."},{"issue":"12","key":"10.1016\/S0140-3664(98)00202-3_BIB6","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Transactions Image Processing"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB7","doi-asserted-by":"crossref","unstructured":"W. Bender, D. Gruhl, N. Morimoto, Techniques for data embedding, IBM Systems Journal, IBM Corporation, Armonk, NY, 35 (3) (1996).","DOI":"10.1147\/sj.353.0313"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB8","doi-asserted-by":"crossref","unstructured":"G. Braudway, K. Magerlein, F. Mintzer, Protecting publicly-available images with a visible image watermark, IBM Research Report, TC-20336 (89918), January 15, 1996.","DOI":"10.1117\/12.235469"},{"issue":"4","key":"10.1016\/S0140-3664(98)00202-3_BIB9","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1049\/ip-vis:19960711","article-title":"Watermarking digital images for copyright protection","volume":"143","author":"O'Ruanaidh","year":"1996","journal-title":"IEE Proceedings \u2014 Visible Image Signal Processes"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB10","doi-asserted-by":"crossref","unstructured":"J.R. Smith, B.O. Comiskey, Modulation and information hiding in images, in: R. Anderson (Ed.), Lecture Notes in Computer Science No.1174, Springer, Berlin, 1996, pp. 207\u2013296.","DOI":"10.1007\/3-540-61996-8_42"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB11","unstructured":"J. Zhao, E. Koch, Embedding robust labels into images for copyright protection, in: Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, R. Oldenbourg, Munich, Germany, August 1995, pp. 241\u2013242."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB12","doi-asserted-by":"crossref","unstructured":"F. Hartung, B. Girod, Copyright protection in video delivery networks by watermarking of pre-compressed video, in: Lecture Notes in Computer Science, vol. 1242, Springer, Berlin, 1997, pp. 423\u2013436.","DOI":"10.1007\/BFb0037367"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB13","doi-asserted-by":"crossref","unstructured":"M.M. Yeung, F.C. Mintzer, G. Braudway, A.R. Rao, Digital watermarking for high-quality imaging, in: Proceedings of the First IEEE Workshop on Multimedia Signal Processing, Princeton, NJ, USA, IEEE, Piscataway, NJ, June 1997, pp. 357\u2013362.","DOI":"10.1109\/MMSP.1997.602661"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB14","doi-asserted-by":"crossref","unstructured":"M.M. Yeung, F. Mintzer, An invisible watermarking techniques for image verification, in: Proceedings of the IEEE ICIP '97, IEEE, Piscataway, NJ, vol. 2, 1997, pp. 680\u2013683.","DOI":"10.1109\/ICIP.1997.638587"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB15","unstructured":"ISO\/IEC 14772-1 Virtual Reality Model Language (VRML), ISO, 1997."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB16","unstructured":"ISO\/IEC JTC1\/SC29\/WG11 MPEG-4 Visual and MPEG-4 SNHC, ISO, 1997."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB17","doi-asserted-by":"crossref","unstructured":"R. Ohbuchi, H. Masuda, M. Aono, Embedding data in 3D models, in: Steinmetz, et al. (Eds.), Lecture Notes in Computer Science No. 1309, (Proceedings of the IDMS '97, Springer, Darmstadt, Germany, September 1997) 1997, pp. 1\u201311.","DOI":"10.1007\/BFb0000334"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB18","doi-asserted-by":"crossref","unstructured":"R. Ohbuchi, H. Masuda, M. Aono, Watermarking three-dimensional polygonal models, in: Proceedings of the ACM Multimedia '97, Seattle, Washington, USA, Addison-Wesley Publishing, Reading, WA, November 1997, pp. 261\u2013272.","DOI":"10.1145\/266180.266377"},{"issue":"4","key":"10.1016\/S0140-3664(98)00202-3_BIB19","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/49.668977","article-title":"Watermarking three-dimensional polygonal models through geometric and topological modifications","volume":"16","author":"Ohbuchi","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(98)00202-3_BIB20","unstructured":"M.E. Mortenson, Geometric Modeling, John Wiley & Sons, NY, 1997."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB21","unstructured":"G. Farin, Curves and Surfaces for CAGD: A Practical Guide, 4th ed., Academic Press, Chestnut Hill, MA, 1996."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB22","unstructured":"G. Taubin, Geometric compression through topological surgery, IBM Research Report, RC-20340 (89924), January 16, 1996."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB23","unstructured":"H. Masuda, Topological Operations for Non-Manifold Geometric Modeling and Their Applications, Ph.D dissertation, Department of Precision Machinery Engineering, University of Tokyo, 1996 (in Japanese)."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB24","unstructured":"K. Weiler, The radial edge structure: a topological representation for non-manifold geometric boundary modeling, in: Geometric Modeling for CAD Applications, North-Holland, Amsterdam, 1986, pp. 3\u201336."},{"key":"10.1016\/S0140-3664(98)00202-3_BIB25","unstructured":"A. Gueziec, G. Taubin, F. Lazarus, W. Horn, Cutting and stitching: efficient conversion of a non-manifold polygonal surface to a manifold, IBM Research Report RC-20935 (92693), July 1997."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498002023?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498002023?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T05:54:15Z","timestamp":1580882055000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366498002023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10]]},"references-count":25,"journal-issue":{"issue":"15","published-print":{"date-parts":[[1998,10]]}},"alternative-id":["S0140366498002023"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(98)00202-3","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1998,10]]}}}