{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:54:33Z","timestamp":1742385273553,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/mmsp.2002.1203313","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"332-335","source":"Crossref","is-referenced-by-count":5,"title":["Robust watermarking of 3D mesh models"],"prefix":"10.1109","author":[{"family":"Han Sae Song","sequence":"first","affiliation":[]},{"family":"Nam Ik Cho","sequence":"additional","affiliation":[]},{"family":"Jong Weon Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/49.668977"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804120"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IM.1997.603886"},{"journal-title":"Numerical Recipes in C The Art of Scientific Programming","year":"1999","author":"press","key":"ref13"},{"key":"ref14","first-page":"581","article-title":"An Algorithm for Determining Intersection Segment-Polygon in 3D","volume":"22","author":"segura","year":"1998","journal-title":"Computers and Graphics Published by Elsevier Science"},{"key":"ref15","first-page":"46","article-title":"Watermarking 3D objects for Verification","author":"yeo","year":"1999","journal-title":"IEEE Comput Graph Special Issue on Image Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GMAP.2000.838252"},{"key":"ref17","first-page":"359","article-title":"Robust Invisible Watermarking of Volume Data using the 3D DCT","author":"wu","year":"2001","journal-title":"Computer Graphics International 2001"},{"year":"0","key":"ref18"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1117\/12.344683","article-title":"Watermarking of 3D Polygon Based Models with Robustness against Mesh Simplification","volume":"3657","author":"benedens","year":"1999","journal-title":"Proceedings of SPIE Security and Watermarking of Multimedia Contents"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/38.736468"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/237170.237220"},{"key":"ref5","first-page":"95","article-title":"Two High Capacity Methods for Embedding Public Watermarks into 3D Polygonal Models","author":"benedens","year":"1999","journal-title":"Proceedings of the Multimedia and Security-workshop at ACM Multimedia 99"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/311535.311540"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/5.771069"},{"key":"ref2","first-page":"15","article-title":"Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models","volume":"1975","author":"benedens","year":"2000","journal-title":"Springer Information Security Third International Workshop ISW 2000"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8659.00412"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CGI.1999.777952"}],"event":{"name":"2002 IEEE 5th Workshop on Multimedia Signal Processing","acronym":"MMSP-02","location":"St.Thomas, VI, USA"},"container-title":["2002 IEEE Workshop on Multimedia Signal Processing."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8561\/27103\/01203313.pdf?arnumber=1203313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T23:18:15Z","timestamp":1497568695000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1203313\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/mmsp.2002.1203313","relation":{},"subject":[]}}