{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:19:35Z","timestamp":1740169175537,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000654","name":"European Union\u2019s Horizon 2020 Research and Innovation Programme through the Marie Sklodowska-Curie","doi-asserted-by":"publisher","award":["MF-2018-0058","713654"],"id":[{"id":"10.13039\/501100000654","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["SFI 16\/RC\/3918"],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3016211","type":"journal-article","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T20:32:15Z","timestamp":1597350735000},"page":"153413-153424","source":"Crossref","is-referenced-by-count":11,"title":["Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9732-3126","authenticated-orcid":false,"given":"Nadia","family":"Kanwal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7460-266X","authenticated-orcid":false,"given":"Mamoona Naveed","family":"Asghar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4368-0478","authenticated-orcid":false,"given":"Mohammad Samar","family":"Ansari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7039-9879","authenticated-orcid":false,"given":"Martin","family":"Fleury","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Herbst","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1543-1589","authenticated-orcid":false,"given":"Yuansong","family":"Qiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2019.104654"},{"journal-title":"Method and System of Securing Wearable Equipment","year":"2019","author":"marroquin","key":"ref38"},{"journal-title":"Dual Street Cam","year":"2020","key":"ref33"},{"journal-title":"Visor1","year":"2020","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT.2014.6781374"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2007.375518"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-018-0589-x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4107"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2014.6974678"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958299"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9351-x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v15i4.5883"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1049\/cp:20080166","article-title":"image based steganography using lsb insertion technique","author":"sutaone","year":"2008","journal-title":"2008 IET International Conference on Wireless Mobile and Multimedia Networks"},{"key":"ref13","first-page":"286","article-title":"A new approach for LSB based image steganography using secret key","author":"karim","year":"2011","journal-title":"Proc 14th Int Conf Comput Inf Technol (ICCIT)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2013.5310"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2014.6850714"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2671-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NTICT.2017.7976154"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815037"},{"key":"ref19","first-page":"593","article-title":"Chaotic map based random image steganography using LSB technique","volume":"19","author":"rajendran","year":"2017","journal-title":"Int J Netw Secur"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.44"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2485163"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.06.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.11610\/isij.4316"},{"article-title":"Merged video streaming, authorization, and metadata requests","year":"2018","author":"tseng","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934226"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/698492"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2927431"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-017-0538-9"},{"journal-title":"Digital Watermarking and Steganography","year":"2007","author":"cox","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.01.092"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ETCT.2016.7882955"},{"journal-title":"Intelligent Camera Sony Europe B V","year":"2020","key":"ref45"},{"key":"ref22","first-page":"57","article-title":"A secure cyclic steganographic technique for color images using randomization","volume":"19","author":"muhammad","year":"2014","journal-title":"Technical Journal (Taxila)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2016.7550955"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5308-3"},{"year":"2001","key":"ref24","first-page":"3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"journal-title":"Understanding Cryptography A Textbook for Students and Practitioners","year":"2009","author":"paar","key":"ref23"},{"journal-title":"Smart Video Analytics Camera","year":"2020","key":"ref44"},{"key":"ref26","first-page":"175","article-title":"Security analysis of SHA-256 and sisters","author":"gilbert","year":"2003","journal-title":"Proc ACM Symp Appl Comput"},{"journal-title":"Smart Camera","year":"2020","key":"ref43"},{"key":"ref25","first-page":"846","article-title":"AES algorithm using advance key implementation in MATLAB","volume":"3","author":"saifurrab","year":"2016","journal-title":"Int Res J Eng Technol"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09166491.pdf?arnumber=9166491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:09Z","timestamp":1639770909000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9166491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3016211","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}