{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:25Z","timestamp":1750307365872,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,9]],"date-time":"2010-09-09T00:00:00Z","timestamp":1283990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,9]]},"DOI":"10.1145\/1854229.1854255","type":"proceedings-article","created":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T14:53:20Z","timestamp":1284476000000},"page":"137-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A highly adaptable capacity and invisibility 3D watermarking based on four-points sets"],"prefix":"10.1145","author":[{"given":"Xifeng","family":"Gao","sequence":"first","affiliation":[{"name":"Shandong University, Jinan, China"}]},{"given":"Caiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shandong University;Shandong Economic University, Jinan, China"}]},{"given":"Yu","family":"Wei","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, China"}]},{"given":"Weitao","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, China"}]}],"member":"320","published-online":{"date-parts":[[2010,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288894"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/38.736468"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8659.00412"},{"key":"e_1_3_2_1_4_1","volume-title":"June","author":"Cayre F.","year":"2004","unstructured":"F. Cayre , O. Deviller , F. Schmitt , and H. Ma\u00eetre . Watermarking 3d triangle meshed for authentication and integrity. Inria researchreport rr-5223 , June 2004 . F. Cayre, O. Deviller, F. Schmitt, and H. Ma\u00eetre. Watermarking 3d triangle meshed for authentication and integrity. Inria researchreport rr-5223, June 2004."},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"309","article-title":"Application of spectral decomposition to compression and watermarking of 3d triangle mesh geometry","volume":"8","author":"Cayre F.","year":"2003","unstructured":"F. Cayre , P. Rondao-Alface , F. Schmitt , B. Macqb , and H. Mat\u00eere . Application of spectral decomposition to compression and watermarking of 3d triangle mesh geometry . Signal Processing , 8 ( 4 ): 309 -- 319 , 2003 . F. Cayre, P. Rondao-Alface, F. Schmitt, B. Macqb, and H. Mat\u00eere. Application of spectral decomposition to compression and watermarking of 3d triangle mesh geometry. Signal Processing, 8(4):309--319, 2003.","journal-title":"Signal Processing"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.08.016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.882111"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2006.06.009"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2009.20"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/311535.311577"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/237170.237216"},{"key":"e_1_3_2_1_12_1","first-page":"296","volume-title":"Proc. Sixth IFIP WG 5.2 Int'l Workshop Geometric Modeling","author":"Kanai S.","year":"1998","unstructured":"S. Kanai , H. Date , and T. Kishinami . Digital watermarking for 3d polygons using multiresolution wavelet decomposition . In Proc. Sixth IFIP WG 5.2 Int'l Workshop Geometric Modeling , pages 296 -- 307 , 1998 . S. Kanai, H. Date, and T. Kishinami. Digital watermarking for 3d polygons using multiresolution wavelet decomposition. In Proc. Sixth IFIP WG 5.2 Int'l Workshop Geometric Modeling, pages 296--307, 1998."},{"issue":"1","key":"e_1_3_2_1_13_1","first-page":"36","article-title":"A blind robust watermarking scheme for 3d triangular mesh models using 3d edge vertex detection","volume":"4","author":"Kuo C. T.","year":"2009","unstructured":"C. T. Kuo , S. C. Cheng , D. C. Wu , and C. C. Chang . A blind robust watermarking scheme for 3d triangular mesh models using 3d edge vertex detection . Asian Journal of Health and Information Sciences , 4 ( 1 ): 36 -- 63 , 2009 . C. T. Kuo, S. C. Cheng, D. C. Wu, and C. C. Chang. A blind robust watermarking scheme for 3d triangular mesh models using 3d edge vertex detection. Asian Journal of Health and Information Sciences, 4(1):36--63, 2009.","journal-title":"Asian Journal of Health and Information Sciences"},{"issue":"9","key":"e_1_3_2_1_14_1","first-page":"2811","article-title":"A fragile watermarking scheme for three-dimensional polygonal models using triangle strips","volume":"87","author":"Lee S. K.","year":"2004","unstructured":"S. K. Lee and Y. S. Ho . A fragile watermarking scheme for three-dimensional polygonal models using triangle strips . IEICE Trans. Comm. , 87 ( 9 ): 2811 -- 2815 , 2004 . S. K. Lee and Y. S. Ho. A fragile watermarking scheme for three-dimensional polygonal models using triangle strips. IEICE Trans. Comm., 87(9):2811--2815, 2004.","journal-title":"IEICE Trans. Comm."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2004.08.002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/266180.266377"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668977"},{"key":"e_1_3_2_1_18_1","first-page":"373","volume-title":"Proc. Eurographics'02","author":"Ohbuchi R.","year":"2002","unstructured":"R. Ohbuchi , A. Mukaiyama , and S. Takahashi . A frequency-domain approach to watermarking 3d shapes . In Proc. Eurographics'02 , pages 373 -- 382 , 2002 . R. Ohbuchi, A. Mukaiyama, and S. Takahashi. A frequency-domain approach to watermarking 3d shapes. In Proc. Eurographics'02, pages 373--382, 2002."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/311535.311540"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2007350"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.101"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(01)00065-6"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2005.71"}],"event":{"name":"MM&Sec '10: Multimedia and Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Roma Italy","acronym":"MM&Sec '10"},"container-title":["Proceedings of the 12th ACM workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1854229.1854255","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1854229.1854255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:41Z","timestamp":1750245761000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1854229.1854255"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,9]]},"references-count":23,"alternative-id":["10.1145\/1854229.1854255","10.1145\/1854229"],"URL":"https:\/\/doi.org\/10.1145\/1854229.1854255","relation":{},"subject":[],"published":{"date-parts":[[2010,9,9]]},"assertion":[{"value":"2010-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}