{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:54:06Z","timestamp":1725468846446},"reference-count":32,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387342238"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34224-9_78","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T14:54:56Z","timestamp":1156517696000},"page":"665-672","source":"Crossref","is-referenced-by-count":1,"title":["A Review of Video Watermarking and a Benchmarking Framework"],"prefix":"10.1007","author":[{"given":"V.","family":"Moutselakis","sequence":"first","affiliation":[]},{"given":"S.","family":"Tsekeridou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"78_CR1","doi-asserted-by":"crossref","unstructured":"B. Kahng et al., Watermarking Techniques for Intellectual Property Protection, 35th IEEE Design Automation Conf., San Francisco, USA, 1998, pp. 776\u2013781","DOI":"10.1145\/277044.277240"},{"key":"78_CR2","first-page":"II-145","volume":"2","author":"Y. Zhao","year":"2002","unstructured":"Yao Zhao, Reginald L. Lagendijk, Video Watermarking Scheme Resistant to Geometric Attacks, IEEE Int. Conf. on Image Processing ICIP 2002, 2002, pp. II-145\u2013II-148 vol.2","journal-title":"IEEE Int. Conf. on Image Processing ICIP 2002"},{"issue":"4","key":"78_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MP.2003.1238692","volume":"22","author":"A. Kejariwal","year":"2003","unstructured":"A. Kejariwal, Watermarking, Potentials IEEE Volume 22, Issue 4, Oct-Nov 2003, pp. 37\u201340","journal-title":"Potentials IEEE"},{"key":"78_CR4","doi-asserted-by":"crossref","unstructured":"S.N. Merchant et al., Watermarking of Video Data Using Integer-to-integer Discrete Wavelet Transform, Conf. on Convergent Technologies for Asia-Pacific Region TENCON 2003, pp. 939\u2013943","DOI":"10.1109\/TENCON.2003.1273385"},{"key":"78_CR5","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy et al., Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks, IEEE Communications Magazine, August 2001, pp. 119\u2013126","DOI":"10.1109\/35.940053"},{"key":"78_CR6","volume-title":"Digital Image Watermarking: Hiding Information in Images","author":"M. Kutter","year":"1999","unstructured":"M. Kutter, Digital Image Watermarking: Hiding Information in Images, PhD thesis, EFPL, Lausanne, Switzerland, 1999"},{"key":"78_CR7","doi-asserted-by":"crossref","unstructured":"C. I. Podilchuk, E. J. Delp, Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, July 2001, pp. 33\u201346","DOI":"10.1109\/79.939835"},{"key":"78_CR8","doi-asserted-by":"crossref","unstructured":"B. G. Mobasseri, D. Cinalli, Lossless watermarking of compressed media using reversibly decodable packets, Elsevier Signal Processing, Article In Press, Corrected Proof, Sept. 2005","DOI":"10.1016\/j.sigpro.2005.07.033"},{"issue":"I","key":"78_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TMM.2004.840617","volume":"7","author":"K. Su","year":"2005","unstructured":"K. Su; D. Kundur, D. Hatzinakos, Statistical invisibility for collusion-resistant digital video watermarking, IEEE Trans, on Multimedia, Vol. 7, Issue I, Feb. 2005, pp. 43\u201351","journal-title":"IEEE Trans, on Multimedia"},{"issue":"10","key":"78_CR10","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.1109\/TSP.2004.833866","volume":"52","author":"E.T. Lin","year":"2004","unstructured":"E.T. Lin, E.J. Delp, Temporal synchronization in video watermarking, IEEE Trans, on Signal Processing, Vol. 52, Issue 10, Part 2, Oct. 2004, pp. 3007\u20133022","journal-title":"IEEE Trans, on Signal Processing"},{"key":"78_CR11","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1117\/12.384989","volume":"3971","author":"F. Deguillaume","year":"2000","unstructured":"F. Deguillaume, G. Csurka, and T. Pun, Countermeasures for unintentional and intentional video watermarking attacks, in Proc. SPIE, vol. 3971, Jan. 2000, pp. 346\u2013357","journal-title":"Proc. SPIE"},{"issue":"4","key":"78_CR12","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/49.668976","volume":"16","author":"M. D. Swanson","year":"1998","unstructured":"M. D. Swanson, B. Zhu, and A. T. Tewfik, Multiresolution scene-based video watermarking using perceptual models, IEEE J. Select. Areas Commun., vol. 16, no. 4, May 1998, pp. 540\u2013550","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"7","key":"78_CR13","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1016\/j.image.2005.03.012","volume":"20","author":"C.-S. Lu","year":"2005","unstructured":"C.-S. Lu, J.-R. Chen and K.-C. Fan, Real-time frame-dependent video watermarking in VLC domain, Elsevier Signal Processing: Image Communication, Vol. 20, Issue 7, Aug. 2005, pp. 624\u2013642","journal-title":"Elsevier Signal Processing: Image Communication"},{"issue":"I","key":"78_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S0167-9236(03)00075-7","volume":"38","author":"S. H. Kwok","year":"2004","unstructured":"S. H. Kwok, C. C. Yang, K. Y. Tarn and Jason S. W. Wong, SDMI-based rights management systems, Elsevier Decision Support Systems, Vol. 38, Issue I, Oct. 2004, pp. 33\u201346","journal-title":"Elsevier Decision Support Systems"},{"issue":"8","key":"78_CR15","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.imavis.2003.09.016","volume":"22","author":"X. Kong","year":"2004","unstructured":"X. Kong, Y. Liu, H. Liu and D. Yang, Object watermarks for digital images and video, Elsevier Image and Vision Computing, Vol. 22, Issue 8, Aug. 2004, pp. 583\u2013595","journal-title":"Elsevier Image and Vision Computing"},{"issue":"4","key":"78_CR16","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0923-5965(02)00144-3","volume":"18","author":"G. Do\u00ebrr","year":"2003","unstructured":"G. Do\u00ebrr and J.-L. Dugelay, A guide tour of video watermarking, Elsevier Signal Processing; Image Communication, Vol. 18, Issue 4, Apr. 2003, pp. 263\u2013282","journal-title":"Elsevier Signal Processing; Image Communication"},{"issue":"6","key":"78_CR17","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/S1389-1286(02)00227-X","volume":"39","author":"P. Judge","year":"2002","unstructured":"P. Judge and M. Ammar, WHIM: watermarking multicast video with a hierarchy of intermediaries, Elsevier Computer Networks, Vol. 39, Issue 6, 21 Aug. 2002, pp. 699\u2013712","journal-title":"Elsevier Computer Networks"},{"issue":"5","key":"78_CR18","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/S0923-5965(00)00010-2","volume":"16","author":"M.P. Queluz","year":"2001","unstructured":"M.P. Queluz, Authentication of digital images and video: Generic models and a new contribution, Elsevier Signal Processing: Image Communication, Vol. 16, Issue 5, Jan. 2001, pp. 461\u2013475","journal-title":"Elsevier Signal Processing: Image Communication"},{"key":"78_CR19","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F. Hartung","year":"1998","unstructured":"F. Hartung and B. Girod, Watermarking of uncompressed and compressed video, Elsevier Signal Processing, Vol. 66, Issue 3, 28 May 1998, pp. 283\u2013301","journal-title":"Elsevier Signal Processing"},{"key":"78_CR20","doi-asserted-by":"crossref","unstructured":"B.G. Mobasseri, M.P. Marcinak, Watermarking of MPEG-2 video in compressed domain using VLC mapping, 7th ACM Wor. on Multimedia and Security MM&Sec \u203205, Aug. 2005","DOI":"10.1145\/1073170.1073187"},{"key":"78_CR21","doi-asserted-by":"crossref","unstructured":"X. Zhang, S. Wang, A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size, 3 rd Int. ACM Conf. on Information Security InfoSecu \u203204, Nov. 2004","DOI":"10.1007\/b100936"},{"key":"78_CR22","unstructured":"M. Kutter and F. A. P. Petitcolas, A fair benchmark for image watermarking systems, Security and Watermarking of Multimedia Contents, http:\/\/citeseer.ist.psu.edu\/kutter99fair. html, pp. 1\u201314"},{"issue":"8","key":"78_CR23","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/4234.781009","volume":"3","author":"B. Girod","year":"1999","unstructured":"B. Girod, \u201cBidirectionally decodable streams of prefix ode-words\u201d, IEEE Comm. Lett. Vol. 3, Issue 8, Aug. 1999, pp. 245\u2013247","journal-title":"IEEE Comm. Lett."},{"key":"78_CR24","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1117\/12.344662","volume":"3657","author":"F. Deguillaume","year":"1999","unstructured":"F. Deguillaume et al., \u201cRobust 3D DFT video watermarking,\u201d, SPIE Conf. on Security and Watermarking of Multimedia Contents I, vol. 3657, San Jose, USA, Jan. 25\u201327, 1999, pp. 113\u2013124","journal-title":"SPIE Conf. on Security and Watermarking of Multimedia Contents I"},{"key":"78_CR25","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/5.771077","volume":"87","author":"J. A. Bloom","year":"1999","unstructured":"J. A. Bloom et al., \u201cCopy protection for DVD video\u201d, Proc. of IEEE, vol. 87, Jul. 1999, pp. 1267\u20131276","journal-title":"Proc. of IEEE"},{"key":"78_CR26","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"S. Graver","year":"1998","unstructured":"S. Graver et al., \u201cResolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications,\u201d IEEE J. Select. Areas Commun., vol. 16, May 1998, pp. 573\u2013586","journal-title":"IEEE J. Select. Areas Commun."},{"key":"78_CR27","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1117\/12.384991","volume":"3971","author":"M. Kutter","year":"2000","unstructured":"M. Kutter, S. Voloshynovskiy, and A. Herrigel, The watermark copy attack, SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, Jan. 24\u201326, 2000, pp. 371\u2013380","journal-title":"SPIE Security and Watermarking of Multimedia Contents II"},{"issue":"10","key":"78_CR28","doi-asserted-by":"publisher","first-page":"2955","DOI":"10.1109\/TSP.2004.833867","volume":"52","author":"G. Do\u00ebrr","year":"2004","unstructured":"G. Do\u00ebrr and J.-L. Dugelay, Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Trans. on Signal Processing, vol. 52, no. 10, Oct. 2004 pp. 2955\u20132964","journal-title":"IEEE Trans. on Signal Processing"},{"key":"78_CR29","doi-asserted-by":"crossref","unstructured":"S. Pereira et al., Second generation benchmarking and application oriented evaluation, Information Hiding Workshop III, Pittsburgh, USA, April 2001","DOI":"10.1007\/3-540-45496-9_25"},{"key":"78_CR30","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiye et al., Attack modeling: Towards a second generation benchmark, Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking, May, 2001","DOI":"10.1016\/S0165-1684(01)00039-1"},{"key":"78_CR31","unstructured":"F. Petitcolas, R. Anderson, M. Kuhn, Attacks on copyright marking systems, 2 nd Int. Wor. On Information Hiding, IH\u203298, Portland, U.S.A., April 15\u201317, 1998"},{"key":"78_CR32","first-page":"1023","volume-title":"IEEE Int. Conf. on Image Processing","author":"V. Solachidis","year":"2001","unstructured":"V. Solachidis, A. Tefas, N. Nikolaidis, S. Tsekeridou, A. Nikolaidis, I. Pitas, A benchmarking protocol for watermarking methods, IEEE Int. Conf. on Image Processing, Thessaloniki, Greece, 7\u201310 Oct., 2001, pp. 1023\u20131026"}],"container-title":["IFIP International Federation for Information Processing","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34224-9_78.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:34Z","timestamp":1605644314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34224-9_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387342238"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/0-387-34224-9_78","relation":{},"subject":[]}}