{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T02:27:40Z","timestamp":1725157660417},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2005,12]]},"DOI":"10.1109\/tcsvt.2005.856932","type":"journal-article","created":{"date-parts":[[2005,12,10]],"date-time":"2005-12-10T15:28:23Z","timestamp":1134228503000},"page":"1638-1649","source":"Crossref","is-referenced-by-count":62,"title":["A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation"],"prefix":"10.1109","volume":"15","author":[{"family":"Pik Wah Chan","sequence":"first","affiliation":[]},{"given":"M.R.","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"R.T.","family":"Chin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"818","article-title":"a content-dependent spatially localized video watermarked for resistance to collusion and interpolation attacks","author":"su","year":"2001","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"ref32","first-page":"12","article-title":"a novel approach to collusion-resistant video watermarking","volume":"4675","author":"su","year":"2002","journal-title":"Proc SPIE Security Watermarking Multimedia Contents I"},{"key":"ref31","first-page":"241","article-title":"a new wavelet-based digital watermarking for video","author":"niu","year":"2000","journal-title":"Proc 4th IEEE Digital Signal Processing Workshop"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/ICDSP.1997.628022","article-title":"digital watermarking for video","volume":"1","author":"hzu","year":"1997","journal-title":"Proc 1997 13th Int Conf Digital Signal Processing DSP 97"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723519"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/83.982816"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/79.879337"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723399"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/83.846253"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2001.932010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1998.712016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.1999.807181"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.638832"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.779264"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1117\/12.344672","article-title":"a fair benchmark for image watermarking systems","volume":"3657","author":"kutter","year":"1999","journal-title":"Proc Electronic Imaging 99 Security and Watermarking of Multimedia Contents"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2004.1301222"},{"key":"ref4","first-page":"272","article-title":"a survey of watermarking techniques applied to multimedia","volume":"1","author":"lee","year":"2001","journal-title":"Proc 2001 IEEE Int Symp Industrial Electronics (ISIE)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1999.756248"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/6046.890056"},{"key":"ref6","author":"petitcolas","year":"1999","journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking Stefan Katzenbeisser"},{"key":"ref29","first-page":"627","article-title":"a blind audio watermarking algorithm with self-synchronization","volume":"3","author":"huang","year":"2002","journal-title":"IEEE Int Symp Circuits and Systems"},{"key":"ref5","article-title":"a robust watermarking approach for raw video","author":"barni","year":"2000","journal-title":"10th Int Workshop Packet Video"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/978-3-540-39927-8_19","article-title":"a dwt-based digital video watermarking scheme with error correcting code","volume":"2836","author":"chan","year":"2003","journal-title":"Proc 5th Int Conf Information and Communications Security (ICICS2003)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(00)00050-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/83.951542"},{"key":"ref9","first-page":"1019","article-title":"analysis of lsb based image steganography techniques chandramouli","volume":"3","author":"memon","year":"2001","journal-title":"Proc 2001 Int Conf Image Processing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1003126"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904862"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/30.883383"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2000.886291"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20010109"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/BFb0016503","article-title":"intra-block max-min algorithm for embedding robust digital watermark into images","volume":"1464","author":"duan","year":"1998","journal-title":"Proc IAPR Int Workshop Multimedia Information Analysis and Retrieval"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1987.1169405"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-45496-9_26","article-title":"robust covert communication over a public audio channel using spread spectrum","author":"kirovski","year":"2001","journal-title":"Proc 1st Information Hiding Workshop"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/76\/32993\/01546010.pdf?arnumber=1546010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T15:42:25Z","timestamp":1638200545000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1546010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12]]},"references-count":35,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2005.856932","relation":{},"ISSN":["1051-8215"],"issn-type":[{"value":"1051-8215","type":"print"}],"subject":[],"published":{"date-parts":[[2005,12]]}}}