{"id":"https://openalex.org/W4200177541","doi":"https://doi.org/10.1109/wifs53200.2021.9648386","title":"Self-embedding watermarking method for G-code used in 3D printing","display_name":"Self-embedding watermarking method for G-code used in 3D printing","publication_year":2021,"publication_date":"2021-12-07","ids":{"openalex":"https://openalex.org/W4200177541","doi":"https://doi.org/10.1109/wifs53200.2021.9648386"},"language":"en","primary_location":{"id":"doi:10.1109/wifs53200.2021.9648386","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs53200.2021.9648386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100330760","display_name":"Zhenyu Li","orcid":"https://orcid.org/0000-0002-4852-5055"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhenyu Li","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087837624","display_name":"Daofu Gong","orcid":"https://orcid.org/0000-0002-7810-2950"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daofu Gong","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113068342","display_name":"Lei Tan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lei Tan","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090509213","display_name":"Xiangyang Luo","orcid":"https://orcid.org/0000-0003-3225-4649"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiangyang Luo","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034700690","display_name":"Fenlin Liu","orcid":"https://orcid.org/0000-0001-8019-1713"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fenlin Liu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002932489","display_name":"Adrian G. Bor\u015f","orcid":"https://orcid.org/0000-0001-7838-0021"},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Adrian G. Bors","raw_affiliation_strings":["University of York, York, UK"],"affiliations":[{"raw_affiliation_string":"University of York, York, UK","institution_ids":["https://openalex.org/I52099693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100330760"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3884,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.62554134,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8149192333221436},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.773306131362915},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7334730625152588},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.6095284819602966},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6012622714042664},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.571709156036377},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.49470826983451843},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.4691399931907654},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4495297372341156},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.4238636791706085},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34364497661590576},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32927146553993225},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2524956464767456},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.24276986718177795},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.23197337985038757},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20544466376304626},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15673419833183289},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.153238445520401},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.135026752948761},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11365401744842529}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8149192333221436},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.773306131362915},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7334730625152588},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.6095284819602966},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6012622714042664},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.571709156036377},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.49470826983451843},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4691399931907654},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4495297372341156},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.4238636791706085},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34364497661590576},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32927146553993225},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2524956464767456},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.24276986718177795},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.23197337985038757},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20544466376304626},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15673419833183289},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.153238445520401},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.135026752948761},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11365401744842529},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wifs53200.2021.9648386","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs53200.2021.9648386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.whiterose.ac.uk:186854","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[{"id":"https://openalex.org/G5205692128","display_name":null,"funder_award_id":"62002387,U1736214,61872448,62182435,61772549","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1971221370","https://openalex.org/W2039427951","https://openalex.org/W2116167573","https://openalex.org/W2129223290","https://openalex.org/W2136106897","https://openalex.org/W2343888462","https://openalex.org/W2594683627","https://openalex.org/W2619263430","https://openalex.org/W2749768754","https://openalex.org/W2755229365","https://openalex.org/W2783181623","https://openalex.org/W2891297337","https://openalex.org/W2892168389","https://openalex.org/W2901423368","https://openalex.org/W2904653265","https://openalex.org/W2916108582","https://openalex.org/W3003177380","https://openalex.org/W3008669042","https://openalex.org/W3135132438","https://openalex.org/W3151425564","https://openalex.org/W6756699429"],"related_works":["https://openalex.org/W3127945325","https://openalex.org/W2205085860","https://openalex.org/W2885826910","https://openalex.org/W2134958869","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2977151837","https://openalex.org/W2074995973","https://openalex.org/W2119597975","https://openalex.org/W2383287948"],"abstract_inverted_index":{"3D":[0,31,140],"printing":[1,32],"is":[2,65],"faced":[3],"with":[4],"a":[5,36,54,130],"lot":[6],"of":[7,106],"security":[8],"issues,":[9],"such":[10],"as":[11],"malicious":[12],"tampering,":[13],"intellectual":[14],"property":[15],"theft":[16],"and":[17,52,73,102,124],"so":[18],"on.":[19],"This":[20,43],"work":[21],"aims":[22],"to":[23,129,138],"protect":[24],"the":[25,30,46,71,84,92,99,103,107,115,121,126,135,139,144],"G-code":[26,41,47,93,127],"file":[27,128],"which":[28],"controls":[29],"process":[33],"by":[34,82,143],"proposing":[35],"self-embedding":[37],"watermarking":[38],"method":[39,44,117],"for":[40,58],"file.":[42],"groups":[45],"lines":[48],"into":[49,67],"code":[50,60,63,89,109],"blocks":[51],"achieves":[53],"random":[55],"mapping":[56],"relationship":[57],"each":[59,88],"block.":[61,90],"Each":[62],"block":[64],"divided":[66],"two":[68],"parts,":[69],"carrying":[70],"authentication":[72,85],"recovery":[74,100],"bits,":[75],"respectively.":[76],"The":[77],"tampered":[78,122],"regions":[79],"are":[80,95],"detected":[81],"leveraging":[83],"bits":[86,101],"in":[87],"Meanwhile,":[91],"files":[94],"restored":[96],"based":[97],"on":[98],"geometric":[104],"information":[105],"neighboring":[108],"blocks.":[110],"Experimental":[111],"results":[112],"indicate":[113],"that":[114],"proposed":[116],"can":[118],"effectively":[119],"detect":[120],"region":[123],"restore":[125],"large":[131],"extent,":[132],"while":[133],"limiting":[134],"distortion":[136],"caused":[137],"printed":[141],"object":[142],"watermarking.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
