{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:33:42Z","timestamp":1761896022093,"version":"3.28.0"},"reference-count":24,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3,17]]},"DOI":"10.1117\/12.2076763","type":"proceedings-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T21:07:13Z","timestamp":1426626433000},"page":"939305","source":"Crossref","is-referenced-by-count":2,"title":["Joint synchronization and high capacity data hiding for 3D meshes"],"prefix":"10.1117","volume":"9393","author":[{"given":"Vincent","family":"Itier","sequence":"additional","affiliation":[]},{"given":"William","family":"Puech","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Gesqui\u00e8re","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Pedeboy","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","first-page":"5","article-title":"La cryptographie militaire","volume":"IX","author":"Kerckhoffs","year":"1883"},{"key":"c2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"c3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2010.09.010"},{"key":"c4","doi-asserted-by":"publisher","DOI":"10.1109\/38.736467"},{"key":"c5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73092-7"},{"key":"c6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2007350"},{"key":"c7","first-page":"462","article-title":"On the icosian calculus","volume":"6","author":"Hamilton","year":"1853"},{"key":"c8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008107127819"},{"key":"c9","first-page":"261","article-title":"Watermarking three-dimensional polygonal models through geometric and topological modifications","volume":"16","author":"Ohbuchi","year":"1997"},{"issue":"6","key":"c10","first-page":"400","article-title":"Lossless 3D steganography based on MST and connectivity modification","volume":"25","author":"Amat","year":"2010"},{"key":"c11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.882111"},{"key":"c12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2142004"},{"key":"c13","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2265673"},{"key":"c14","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.94"},{"issue":"3","key":"c15","first-page":"1055","article-title":"A novel high capacity 3D steganographic algorithm","volume":"7","author":"Li","year":"2011"},{"issue":"2S","key":"c16","first-page":"34:1","article-title":"A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models","volume":"8","author":"Gao","year":"2012"},{"key":"c17","doi-asserted-by":"publisher","DOI":"10.1109\/2945.764870"},{"key":"c18","first-page":"105","article-title":"Construction of a unique robust hamiltonian path for a vertex cloud","author":"Itier","year":"2013"},{"key":"c19","first-page":"657","article-title":"Notes on digital coding","volume":"37","author":"Golay","year":"1949"},{"key":"c20","first-page":"1","article-title":"A weight method of decoding the (23, 12, 7) golay code using reduced table lookup","author":"Chang","year":"2008"},{"key":"c21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855418"},{"key":"c22","unstructured":"Gonzalez, R. C. and Woods, R. E., [Digital Image Processing], Prentice Hall, 3rd ed. (2006)."},{"article-title":"Metro: Measuring error on simplified surfaces","year":"1996","author":"Cignoni","key":"c23"},{"key":"c24","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.2011.30.issue-5"}],"event":{"name":"IS&T\/SPIE Electronic Imaging","location":"San Francisco, California, United States"},"container-title":["SPIE Proceedings","Three-Dimensional Image Processing, Measurement (3DIPM), and Applications 2015"],"original-title":[],"deposited":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T22:06:22Z","timestamp":1538517982000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2076763"}},"subtitle":[],"editor":[{"given":"Robert","family":"Sitnik","sequence":"first","affiliation":[]},{"given":"William","family":"Puech","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2015,3,17]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1117\/12.2076763","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2015,3,17]]}}}