{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T08:54:24Z","timestamp":1706691264953},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s11042-018-6721-y","type":"journal-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T07:29:33Z","timestamp":1540452573000},"page":"13877-13903","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Crypto-watermarking system for safe transmission of 3D multiresolution meshes"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0743-339X","authenticated-orcid":false,"given":"Ikbel","family":"Sayahi","sequence":"first","affiliation":[]},{"given":"Akram","family":"Elkefi","sequence":"additional","affiliation":[]},{"given":"Chokri Ben","family":"Amar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"6721_CR1","unstructured":"Benyamin N, Sattar M, Seyed MS, Mohammad RM (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469\u20131497"},{"key":"6721_CR2","doi-asserted-by":"publisher","unstructured":"Charfeddine M, El\u2019arbi M, Ben Amar C (2012) A new DCT audio watermarking scheme based on preliminary MP3 study. Multimed Tools Appl 70(3). \n https:\/\/doi.org\/10.1007\/s11042-012-1167-0","DOI":"10.1007\/s11042-012-1167-0"},{"issue":"3","key":"6721_CR3","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1109\/83.826776","volume":"9","author":"C Chrysafis","year":"2000","unstructured":"Chrysafis C, Ortega A (2000) Line-based, reduced memory, wavelet image compression. IEEE Trans Image Process 9(3):378\u2013389","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"6721_CR4","doi-asserted-by":"publisher","first-page":"305","DOI":"10.14257\/ijsia.2015.9.1.29","volume":"9","author":"DJ Cho","year":"2015","unstructured":"Cho DJ (2015) Watermarking scheme of mpeg-4 laser object for mobile device. Int J Secur Its Appl 9(1):305\u2013312. \n https:\/\/doi.org\/10.14257\/ijsia.2015.9.1.29","journal-title":"Int J Secur Its Appl"},{"key":"6721_CR5","unstructured":"Dang QH (2002) Secure hash standard. Federal Information Processing Standards Publication, pp 180\u2013184"},{"issue":"23","key":"6721_CR6","first-page":"58","volume":"252","author":"W Dong","year":"2017","unstructured":"Dong W, Bin W, Sicheng Z, Hongxun Y, Hong L (2017) View-based 3d object retrieval with discriminative views. Neurocomputing 252(23):58\u201366","journal-title":"Neurocomputing"},{"key":"6721_CR7","unstructured":"Elkefi A (2011) Compression des maillages 3d multiresolutions de grandes pr\u00e9cisions"},{"key":"6721_CR8","unstructured":"Geri B (2015) A robust digital watermarking algorithm for three dimensional meshes. In: International conference on information engineering for mechanics and materials, pp 1105\u20131110"},{"key":"6721_CR9","doi-asserted-by":"publisher","unstructured":"Guedri B, Zaied M, Ben Amar C (2011) Indexing and images retrieval by content. In: 2011 international conference on high performance computing and simulation (HPCS). \n https:\/\/doi.org\/10.1109\/HPCSim.2011.5999848","DOI":"10.1109\/HPCSim.2011.5999848"},{"issue":"11","key":"6721_CR10","doi-asserted-by":"publisher","first-page":"5427","DOI":"10.1109\/TIP.2016.2607421","volume":"25","author":"D Guiguang","year":"2016","unstructured":"Guiguang D, Yuchen G, Jile Z, Yue G (2016) Large-scale cross-modality search via collective matrix factorization hashing. IEEE Trans Image Process 25(11):5427\u20135440","journal-title":"IEEE Trans Image Process"},{"key":"6721_CR11","unstructured":"Hitendra G, Krishna K, Manish G, Suneeta A (2014) Uniform selection of vertices for watermark embedding in 3-d polygon mesh using ieee754 floating point representation. In: International conference on communication systems and network technologies, pp 788\u2013792"},{"issue":"3","key":"6721_CR12","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1145\/882262.882366","volume":"22","author":"M Isenburg","year":"2003","unstructured":"Isenburg M, Gumholh S (2003) Out-of-core compression for gigantic polygon meshes. ACM Trans Graph 22(3):935\u2013942. \n https:\/\/doi.org\/10.1145\/882262.882366","journal-title":"ACM Trans Graph"},{"key":"6721_CR13","unstructured":"Jen-Tse W, Yi-Ching C, Shyr-Shen Y, Chun-Yuan Y (2014) Hamming code based watermarking scheme for 3d model verification. In: International symposium on computer, consumer and control, pp 1095\u20131098"},{"key":"6721_CR14","unstructured":"Karthigaikumar P, Soumiya R (2011) Simulation of image encryption using aes algorithm. IJCA Special Issue on Computational Science - New Dimensions and Perspectives (4), 166\u2013172"},{"issue":"2","key":"6721_CR15","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11042-010-0626-8","volume":"56","author":"M Koubaa","year":"2012","unstructured":"Koubaa M, El\u2019arbi M, Ben Amar C, Nicolas H (2012) Collusion, MPEG4 compression and frame dropping resistant video watermarking. Multimed Tools Appl 56(2):281\u2013301. \n https:\/\/doi.org\/10.1007\/s11042-010-0626-8","journal-title":"Multimed Tools Appl"},{"key":"6721_CR16","unstructured":"Lamiaa B, Saleh HI, Abdelhalim MB (2015) Enhanced watermarking scheme for 3d mesh models. In: International conference on information technology, pp 612\u2013619"},{"issue":"23","key":"6721_CR17","doi-asserted-by":"publisher","first-page":"4553","DOI":"10.1109\/TIP.2014.2343460","volume":"10","author":"K Lu","year":"2014","unstructured":"Lu K, Rongrong J, Jinhui T, Yue G (2014) Learning-based bipartite graph matching for view-based 3d model retrieval. IEEE Trans Image Process 10(23):4553\u20134563","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"6721_CR18","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"Mallat SG (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11(7):674\u2013693. \n https:\/\/doi.org\/10.1109\/34.192463","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"15","key":"6721_CR19","doi-asserted-by":"publisher","first-page":"5897","DOI":"10.1007\/s11042-014-1896-3","volume":"74","author":"A Ouled Zaid","year":"2015","unstructured":"Ouled Zaid A, Hachani M, Puech W (2015) Wavelet-based high-capacity watermarking of 3-d irregular meshes. Multimed Tools Appl 74 (15):5897\u20135915. \n https:\/\/doi.org\/10.1007\/s11042-014-1896-3","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"6721_CR20","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1142\/S0219691310003353","volume":"8","author":"M Othmani","year":"2010","unstructured":"Othmani M, Bellil W, Ben Amar C, Alimi AM (2010) A new structure and training procedure for multi-mother wavelet networks. Int J Wavelets Multiresolution Inf Process 8(1):149\u2013175. \n https:\/\/doi.org\/10.1142\/S0219691310003353","journal-title":"Int J Wavelets Multiresolution Inf Process"},{"issue":"9","key":"6721_CR21","first-page":"18","volume":"2","author":"VR Pancholi","year":"2016","unstructured":"Pancholi VR, Patel BP (2016) Enhancement of cloud computing security with secure data storage using aes. Int J Innov Res Sci Technol 2(9):18\u201321","journal-title":"Int J Innov Res Sci Technol"},{"key":"6721_CR22","unstructured":"Parisot C, Antonini M (2001) Barlaud, m.: 3d scan based wavelet transform for video coding. In: IEEE 4th workshop on multimedia signal processing, pp 403\u2013408"},{"key":"6721_CR23","unstructured":"Prerna M, Abhishek S (2013) A study of encryption algorithms aes, des and rsa for security. Global J Comput Sci Technol Netw Web Secur 13(15):15\u201322"},{"issue":"2014","key":"6721_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1155\/2014\/305960","volume":"2014","author":"H Roland","year":"2014","unstructured":"Roland H, Li X, Huimin Y, Baocang D (2014) Applying 3d polygonal mesh watermarking for transmission security protection through sensor networks. Math Probl Eng 2014(2014):27\u201340. \n https:\/\/doi.org\/10.1155\/2014\/305960","journal-title":"Math Probl Eng"},{"key":"6721_CR25","unstructured":"Rolland-Neviere X (2014) Robust 3d watermarking"},{"key":"6721_CR26","unstructured":"Sayahi I, Elkefi A, Ben Amar C (2006) A multi-resolution approach for blind watermarking of 3d meshes using scanning spiral method. In: International conference on computational intelligence in security for information systems, pp 526\u2013537"},{"key":"6721_CR27","doi-asserted-by":"crossref","unstructured":"Sayahi I, Elkefi A, Koubaa M, Ben Amar C (2015) Robust watermarking algorithm for 3d multiresolution meshes. In: International conference on computer vision theory and applications, pp 150\u2013157","DOI":"10.5220\/0005316401500157"},{"key":"6721_CR28","unstructured":"Sayahi I, Elkefi A, Ben Amar C (2016) Blind watermarking algorithm based on spiral scanning method and error correcting codes. Int J Multimed Tools Appl 76:1\u201324"},{"issue":"6","key":"6721_CR29","first-page":"331","volume":"14","author":"I Sayahi","year":"2016","unstructured":"Sayahi I, Elkefi A, Ben Amar C (2016) Blind watermarking algorithm for 3d multiresolution meshes based on spiral scanning method. Int J Comput Sci Inf Secur 14(6):331\u2013342","journal-title":"Int J Comput Sci Inf Secur"},{"issue":"3","key":"6721_CR30","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1109\/TMM.2016.2617741","volume":"19","author":"Z Sicheng","year":"2017","unstructured":"Sicheng Z, Hongxun Y, Yue G, Rongrong J, Guiguang D (2017) Continuous probability distribution prediction of image emotions via multitask shared sparse regression. IEEE Trans Multimed 19(3):632\u2013645","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"6721_CR31","first-page":"533","volume":"151","author":"Z Sicheng","year":"2015","unstructured":"Sicheng Z, Lujun C, Hongxun Y, Yanhao Z, Xiaoshuai S (2015) Strategy for dynamic 3d depth data matching towards robust action retrieval. Neurocomputing 151(2):533\u2013543","journal-title":"Neurocomputing"},{"issue":"2","key":"6721_CR32","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1137\/S0036141095289051","volume":"29","author":"W Sweldens","year":"1989","unstructured":"Sweldens W (1989) The lifting scheme: a construction of second generation wavelets. SIAM J Math Anal 29(2):511\u2013546. \n https:\/\/doi.org\/10.1137\/S0036141095289051","journal-title":"SIAM J Math Anal"},{"issue":"1","key":"6721_CR33","first-page":"117","volume":"4","author":"SC Tamane","year":"2012","unstructured":"Tamane SC, Deshmukh RR (2012) Blind 3d model watermarking based on multi-resolution representation and fuzzy logic. Int J Computer Sci Inf Technol 4(1):117\u2013136. arXiv:\n 1203.2485v1","journal-title":"Int J Computer Sci Inf Technol"},{"issue":"4","key":"6721_CR34","first-page":"440","volume":"14","author":"S Tariq","year":"2016","unstructured":"Tariq S, Ayesha Q (2016) Encrypting grayscale images using s8 sboxes chosen by logistic map. Int J Comput Sci Inf Secur 14(4):440\u2013444","journal-title":"Int J Comput Sci Inf Secur"},{"issue":"34","key":"6721_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-015-2707-1","volume":"74","author":"YY Tsai","year":"2015","unstructured":"Tsai YY (2015) An efficient 3d information hiding algorithm based on sampling concepts. Multimed Tools Appl 74(34):1\u201317. \n https:\/\/doi.org\/10.1007\/s11042-015-2707-1","journal-title":"Multimed Tools Appl"},{"key":"6721_CR36","doi-asserted-by":"publisher","unstructured":"Tsai YY (2016) A secret 3d model sharing scheme with reversible data hiding based on space subdivision. 3D Res 7(1):1\u201314. \n https:\/\/doi.org\/10.1007\/s13319-015-0078-z","DOI":"10.1007\/s13319-015-0078-z"},{"issue":"22","key":"6721_CR37","first-page":"12,163","volume":"9","author":"A Umamageswari","year":"2014","unstructured":"Umamageswari A, Suresh G (2014) Novel algorithm for secure medical image communication using roi based digital lossless watermarking and ds. Int J Appl Eng Res 9(22):12,163\u201312,176","journal-title":"Int J Appl Eng Res"},{"issue":"5","key":"6721_CR38","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1109\/TCOM.1971.1090700","volume":"19","author":"A Viterbi","year":"1971","unstructured":"Viterbi A (1971) Convolutional codes and their performance in communication systems. IEEE Transactions on Communication Technology 19(5):751\u2013772","journal-title":"IEEE Transactions on Communication Technology"},{"issue":"2","key":"6721_CR39","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s11277-014-1888-7","volume":"79","author":"SM Wadi","year":"2014","unstructured":"Wadi SM, Nasharuddin Z (2014) High definition image encryption algorithm based on aes modification. Wirel Pers Commun 79(2):811\u2013829","journal-title":"Wirel Pers Commun"},{"key":"6721_CR40","doi-asserted-by":"publisher","unstructured":"Wali A, Ben Aoun N, Karray H, Ben Amar C, Alimi AM (2010) A new system for event detection from video surveillance sequences. Proceedings of the 12th international conference on advanced concepts for intelligent vision systems, ACIVS 2010. Part I. Sydney, Australia, December 13\u201316, 2010. \n https:\/\/doi.org\/10.1007\/978-3-642-17691-3_11","DOI":"10.1007\/978-3-642-17691-3_11"},{"issue":"2","key":"6721_CR41","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1080\/17445760.2011.574631","volume":"27","author":"C Xiangjiu","year":"2012","unstructured":"Xiangjiu C, Zhanheng G (2012) Watermarking algorithm for 3d mesh based on multi-scale radial basis functions. Int J Parallel Emerg Distrib Syst 27(2):133\u2013141. \n https:\/\/doi.org\/10.1080\/17445760.2011.574631","journal-title":"Int J Parallel Emerg Distrib Syst"},{"key":"6721_CR42","unstructured":"Xiao Z, Qing Z (2012) A dct-based dual watermarking algorithm for three-dimensional mesh models. In: International conference on consumer electronics, communications and networks, pp 1509\u20131513"},{"key":"6721_CR43","doi-asserted-by":"crossref","unstructured":"Ying Y, Ruggero P, Holly R, Ioannis I (2016) A 3d steganalytic algorithm and steganalysis-resistant watermarking. In: IEEE transactions on visualization and computer graphics","DOI":"10.1109\/TVCG.2016.2525771"},{"issue":"C","key":"6721_CR44","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.sigpro.2014.09.038","volume":"112","author":"S Zhao","year":"2015","unstructured":"Zhao S, Yao H, Zhang Y, Wang Y, Liu S (2015) View-based 3d object retrieval via multi-modal graph learning. Signal Process 112(C):110\u2013118","journal-title":"Signal Process"},{"issue":"7","key":"6721_CR45","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1016\/j.cad.2013.04.001","volume":"45","author":"S Zhiyong","year":"2013","unstructured":"Zhiyong S, Weiqing L, Jianshou K, Yuewei D, Weiqing T (2013) Watermarking 3d capd models for topology verification. Computer-Aided Design 45(7):1042\u20131052. \n https:\/\/doi.org\/10.1016\/j.cad.2013.04.001","journal-title":"Computer-Aided Design"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6721-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6721-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6721-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T21:02:26Z","timestamp":1572037346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6721-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":45,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["6721"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6721-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"15 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}