{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:34:24Z","timestamp":1730208864102,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,17]]},"DOI":"10.1109\/codit55151.2022.9803968","type":"proceedings-article","created":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T19:42:22Z","timestamp":1656618142000},"page":"513-518","source":"Crossref","is-referenced-by-count":0,"title":["Robust approach linking cryptography,3D watermarking using RSA algorithm and spherical harmonics transform to secure multiresolution meshes transmission"],"prefix":"10.1109","author":[{"given":"Malika","family":"Jallouli","sequence":"first","affiliation":[{"name":"Universit&#x00E9; de Sousse,Ecole Nationale d&#x0027;Ing&#x00E9;nieurs de Sousse, LATIS Laboratory of Advanced Technology and Intelligent Systems,Sousse,Tunisie,4023"}]},{"given":"Ikbel","family":"Sayahi","sequence":"additional","affiliation":[{"name":"University of sfax,Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir,Monastir,Tunisia"}]},{"given":"Anouar Ben","family":"Mabrouk","sequence":"additional","affiliation":[{"name":"University of Kairouan,Higher Institute of Applied Mathematics and Computer Science,Department of Mathematics,Kairouan,Tunisia,3100"}]},{"given":"Mohamed Ali","family":"Mahjoub","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Sousse,Ecole Nationale d&#x0027;Ing&#x00E9;nieurs de Sousse, LATIS Laboratory of Advanced Technology and Intelligent Systems,Sousse,Tunisie,4023"}]},{"given":"Chokri Ben","family":"Amar","sequence":"additional","affiliation":[{"name":"University of sfax,Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir,Monastir,Tunisia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89131-2_32"},{"key":"ref11","article-title":"Assessment of Global Left Ventricule Deformation Using Recursive Spherical Harmonics","author":"jallouli","year":"0","journal-title":"International Conference on Natural Computation Fuzzy Systems and Knowledge Discovery"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29891-3_4"},{"key":"ref13","article-title":"Calcul efficace et direct des representations de mail-lages 3D utilisant les harmoniques spheriques","author":"moussa","year":"2007","journal-title":"These de Doctorat en Informatique Universite Claude Bernard Lyon 1 France"},{"key":"ref14","first-page":"1095","article-title":"Hamming Code Based Watermarking Scheme for 3D Model Verification","author":"jen-tse","year":"0","journal-title":"Inter-national Symposium on Computer Consumer and Control"},{"key":"ref15","first-page":"612","article-title":"Enhanced Watermarking Scheme for 3D Mesh Models","author":"lamiaa","year":"0","journal-title":"International Conference on Information Technology"},{"key":"ref16","first-page":"459","article-title":"Multi-scale 3d shape analysis using spherical wavelets","author":"nain","year":"2005","journal-title":"MICCAI"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1896-3"},{"key":"ref18","first-page":"331","article-title":"Blind watermarking algorithm for 3D multiresolution meshes based on spiral scanning method","volume":"14","author":"sayahi","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68548-9_58"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2008.918338"},{"key":"ref27","article-title":"An efficient 3D information hiding algorithm based on sampling concepts","author":"yuan","year":"2014","journal-title":"Multimedia Tools Appl"},{"key":"ref3","article-title":"Surface Representations Using Spherical Harmonics and Gabor Wavelets on the Sphere","author":"bulow","year":"2001","journal-title":"Technical Report No MS-CI S-01&#x2013;37"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00041-003-0018-9"},{"key":"ref5","article-title":"Spherical harmonic lighting: The gritty details","author":"green","year":"0","journal-title":"Game Developers Conf"},{"key":"ref8","article-title":"To-ward recursive spherical harmonics-issued-bi-filters Part I: theoretical framework","author":"jallouli","year":"2018","journal-title":"Soft Computing"},{"key":"ref7","article-title":"Uniform selection of vertices for watermark embedding in 3-D polygon mesh using IEEE754 floating point representation","author":"hitendra","year":"0","journal-title":"International Conference on Communication Systems and Network Technologies"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.129"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3596-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1515\/9783110481884-005"},{"key":"ref20","first-page":"150","article-title":"Robust Wa-termarking Algorithm For 3D Multiresolution Meshes","author":"sayahi","year":"0","journal-title":"International Conference on Computer Vision Theory and Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6721-y"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89131-2_33"},{"key":"ref24","article-title":"spherical harmonicss: efficiently repre-senting functions on the sphere","author":"schroder","year":"1995","journal-title":"ACM SIGGRAPH'95"},{"key":"ref23","first-page":"526","article-title":"A multi-resolution approach for blind watermarking of 3D meshes using scanning spiral method","author":"sayahi","year":"0","journal-title":"International Conference on Computational Intelligence in Security for Information Systems"},{"key":"ref26","first-page":"1","article-title":"A 3D Steganalytic Algorithm and Steganalysis-Resistant Watermarking","author":"xiao ying","year":"2016","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"ref25","article-title":"A DCT-based dual watermarking algorithm for three-dimensional mesh models","author":"xiao","year":"0","journal-title":"International Conference on Con-sumer Electronics Communications and Networks"}],"event":{"name":"2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)","start":{"date-parts":[[2022,5,17]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2022,5,20]]}},"container-title":["2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9803856\/9803880\/09803968.pdf?arnumber=9803968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:21:11Z","timestamp":1658780471000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9803968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/codit55151.2022.9803968","relation":{},"subject":[],"published":{"date-parts":[[2022,5,17]]}}}