{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:23Z","timestamp":1750307483540,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,29]],"date-time":"2010-10-29T00:00:00Z","timestamp":1288310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,29]]},"DOI":"10.1145\/1877972.1877979","type":"proceedings-article","created":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T15:01:31Z","timestamp":1289314891000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Semantic object watermark re-synchronization based on skeleton vertex corresponds"],"prefix":"10.1145","author":[{"given":"Paraskevi","family":"Tzouveli","sequence":"first","affiliation":[{"name":"School of Electrical &amp; Computer Engineering, National Technical University of Athens, Athens, Greece"}]},{"given":"Konstantinos","family":"Raftopoulos","sequence":"additional","affiliation":[{"name":"School of Electrical &amp; Computer Engineering, National Technical University of Athens, Athens, Greece"}]},{"given":"Klimis","family":"Ntalianis","sequence":"additional","affiliation":[{"name":"School of Electrical &amp; Computer Engineering, National Technical University of Athens, Athens, Greece"}]},{"given":"Stefanos","family":"Kollias","sequence":"additional","affiliation":[{"name":"School of Electrical &amp; Computer Engineering, National Technical University of Athens, Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2010,10,29]]},"reference":[{"volume-title":"San Mateo","year":"2001","author":"Cox J.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.901206"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.823831"},{"volume-title":"Conf. on Image Processing ICIP","year":"2002","author":"Dong P.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Kay and E. Izquierdo \"Robust content based image watermarking \" in WIAMIS 2001 - Workshop on Image Analysis for Multimedia Interactive Services (Tampere Finland) 16--17 May 2001.  S. Kay and E. Izquierdo \"Robust content based image watermarking \" in WIAMIS 2001 - Workshop on Image Analysis for Multimedia Interactive Services (Tampere Finland) 16--17 May 2001."},{"volume-title":"Security and Watermarking of Multimedia Contents V","year":"2003","author":"Lichtenauer J.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"S. Baudry P. Nguyen and H. Ma\u00eetre \"Estimation of geometric distortions in digital watermarking \" In IEEE- ICIP 2002.  S. Baudry P. Nguyen and H. Ma\u00eetre \"Estimation of geometric distortions in digital watermarking \" In IEEE- ICIP 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25096-4_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/319463.319629"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2007.07.012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2005.11.015"},{"volume-title":"Symposium on Communication Systems, Networks and Digital Signal Processing","year":"2002","author":"Serdean C.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"F. Deguillaume S. Voloshynovskiy and T. Pun \"A method for the estimation and recovering from general affine transforms in digital watermarking applications \" in SPIE Electronic Imaging 2002 Security and Watermarking of Multimedia Contents IV (San Jose) February 2002.  F. Deguillaume S. Voloshynovskiy and T. Pun \"A method for the estimation and recovering from general affine transforms in digital watermarking applications \" in SPIE Electronic Imaging 2002 Security and Watermarking of Multimedia Contents IV (San Jose) February 2002.","DOI":"10.1117\/12.465289"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24624-4_28"},{"key":"e_1_3_2_1_17_1","unstructured":"C.-Y. Lin \"Public watermarking surviving general scaling and cropping: An application for print-and-scan process \" Multimedia and Security Workshop at ACM Multimedia 99 (Orlando FL USA) Oct. 1999.  C.-Y. Lin \"Public watermarking surviving general scaling and cropping: An application for print-and-scan process \" Multimedia and Security Workshop at ACM Multimedia 99 (Orlando FL USA) Oct. 1999."},{"volume-title":"Portugal","year":"2007","author":"Liu H.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/492942"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-007-9043-6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.918569"},{"volume-title":"Proc. 19th Annual Computer Security Applications Conference","year":"2003","author":"Viega J.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.1273924"},{"key":"e_1_3_2_1_24_1","unstructured":"R.L.Ogniewicz \"Discrete Voronoi Skeletons\" 1992 Swiss Federal Institute of Technology Zurich  R.L.Ogniewicz \"Discrete Voronoi Skeletons\" 1992 Swiss Federal Institute of Technology Zurich"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.1262177"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"M.Kass A. Witkin and D. Terzopoulos \"Snakes: Active contour models\" International journal of computer vision vol.1 n.4 321--331 1988 Springer  M.Kass A. Witkin and D. Terzopoulos \"Snakes: Active contour models\" International journal of computer vision vol.1 n.4 321--331 1988 Springer","DOI":"10.1007\/BF00133570"}],"event":{"name":"MM '10: ACM Multimedia Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Firenze Italy","acronym":"MM '10"},"container-title":["Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1877972.1877979","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1877972.1877979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:09:07Z","timestamp":1750248547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1877972.1877979"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,29]]},"references-count":26,"alternative-id":["10.1145\/1877972.1877979","10.1145\/1877972"],"URL":"https:\/\/doi.org\/10.1145\/1877972.1877979","relation":{},"subject":[],"published":{"date-parts":[[2010,10,29]]},"assertion":[{"value":"2010-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}