{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T06:29:50Z","timestamp":1751524190512,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030113889"},{"type":"electronic","value":"9783030113896"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11389-6_25","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:51:03Z","timestamp":1548348663000},"page":"337-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Surveillance Video Authentication Using Universal Image Quality Index of Temporal Average"],"prefix":"10.1007","author":[{"given":"Sondos","family":"Fadl","sequence":"first","affiliation":[]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Baudry, S.: Frame-accurate temporal registration for non-blind video watermarking. In: Proceedings of the on Multimedia and Security, MM&Sec 2012, pp. 19\u201326. ACM, New York (2012). https:\/\/doi.org\/10.1145\/2361407.2361411","DOI":"10.1145\/2361407.2361411"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Baudry, S., Chupeau, B., Lef\u00e8bvre, F.: A framework for video forensics based on local and temporal fingerprints. In: Proceedings of the 16th IEEE International Conference on Image Processing, ICIP\u201909, pp. 2853\u20132856. IEEE Press, Piscataway (2009)","DOI":"10.1109\/ICIP.2009.5413438"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.cviu.2016.08.005","volume":"152","author":"Carlos Cuevas","year":"2016","unstructured":"Cuevas, C., Yanez, E.M., Garcia, N.: Labeled dataset for integral evaluation of moving object detection algorithms: lasiesta. Comput. Vis. Image Underst. 152(Supplement C), 103\u2013117 (2016). https:\/\/doi.org\/10.1016\/j.cviu.2016.08.005. http:\/\/www.gti.ssr.upm.es\/data\/lasiesta_database.html","journal-title":"Computer Vision and Image Understanding"},{"issue":"4","key":"25_CR4","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1111\/1556-4029.13658","volume":"63","author":"SM Fadl","year":"2018","unstructured":"Fadl, S.M., Han, Q., Li, Q.: Authentication of surveillance videos: detecting frame duplication based on residual frame. J. Forensic Sci. 63(4), 1099\u20131109 (2018). https:\/\/doi.org\/10.1111\/1556-4029.13658","journal-title":"J. Forensic Sci."},{"issue":"2","key":"25_CR5","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s00530-015-0478-1","volume":"23","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Huang, T.: Exposing video inter-frame forgery by zernike opponentchromaticity moments and coarseness analysis. Multimedia Syst. 23(2), 223\u2013238 (2017). https:\/\/doi.org\/10.1007\/s00530-015-0478-1","journal-title":"Multimedia Syst."},{"issue":"Part 3","key":"25_CR6","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1016\/j.neucom.2015.09.001","volume":"173","author":"J Mao","year":"2016","unstructured":"Mao, J., Xiao, G., Sheng, W., Hu, Y., Qu, Z.: A method for video authenticity based on the fingerprint of scene frame. Neurocomputing 173(Part 3), 2022\u20132032 (2016). https:\/\/doi.org\/10.1016\/j.neucom.2015.09.001","journal-title":"Neurocomputing"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/B978-0-12-396549-3.00009-4","volume-title":"Feature Extraction & Image Processing for Computer Vision","author":"Mark S. Nixon","year":"2012","unstructured":"Nixon, M.S., Aguado, A.S.: Chapter 9-moving object detection and description. In: Nixon, M.S., Aguado, A.S. (eds.) Feature Extraction & Image Processing for Computer Vision, 3rd edn., pp. 435\u2013487. Academic Press, Oxford (2012). https:\/\/doi.org\/10.1016\/B978-0-12-396549-3.00009-4"},{"issue":"2","key":"25_CR8","first-page":"422","volume":"3","author":"A Pathak","year":"2014","unstructured":"Pathak, A., Patil, D.: Review of techniques for detecting video forgeries. Int. J. Comput. Sci. Mobile Comput. 3(2), 422\u2013438 (2014)","journal-title":"Int. J. Comput. Sci. Mobile Comput."},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"Qadir, G., Yahaya, S., Ho, A.T.S.: Surrey university library for forensic analysis (SULFA) of video content. In: IET Conference on Image Processing (IPR), pp. 1\u20136 (2012). https:\/\/doi.org\/10.1049\/cp.2012.0422,. http:\/\/sulfa.cs.surrey.ac.uk\/index.php","DOI":"10.1049\/cp.2012.0422,"},{"issue":"19","key":"25_CR10","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.1016\/j.ijleo.2012.11.078","volume":"124","author":"Y Shi","year":"2013","unstructured":"Shi, Y., Qi, M., Yi, Y., Zhang, M., Kong, J.: Object based dual watermarking for video authentication. Optik - Int. J. Light Electron Opt. 124(19), 3827\u20133834 (2013). https:\/\/doi.org\/10.1016\/j.ijleo.2012.11.078","journal-title":"Optik - Int. J. Light Electron Opt."},{"issue":"2","key":"25_CR11","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s00530-017-0538-9","volume":"24","author":"RD Singh","year":"2018","unstructured":"Singh, R.D., Aggarwal, N.: Video content authentication techniques: a comprehensive survey. Multimedia Syst. 24(2), 211\u2013240 (2018). https:\/\/doi.org\/10.1007\/s00530-017-0538-9","journal-title":"Multimedia Syst."},{"issue":"Supplement C","key":"25_CR12","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.diin.2016.06.003","volume":"18","author":"K Sitara","year":"2016","unstructured":"Sitara, K., Mehtre, B.: Digital video tampering detection: an overview ofpassive techniques. Digital Investig. 18(Supplement C), 8\u201322 (2016). https:\/\/doi.org\/10.1016\/j.diin.2016.06.003","journal-title":"Digital Investig."},{"issue":"2","key":"25_CR13","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TCSVT.2011.2106250","volume":"21","author":"H Sohn","year":"2011","unstructured":"Sohn, H., Neve, W.D., Ro, Y.M.: Privacy protection in video surveillancesystems: analysis of subband-adaptive scrambling in JPEG XR. IEEE Trans. Circuits Syst. Video Technol. 21(2), 170\u2013177 (2011). https:\/\/doi.org\/10.1109\/TCSVT.2011.2106250. http:\/\/ivylab.kaist.ac.kr\/demo\/vs\/dataset.htm","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"25_CR14","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1049\/iet-ipr.2016.0321","volume":"11","author":"G Ulutas","year":"2017","unstructured":"Ulutas, G., Ustubioglu, B., Ulutas, M., Nabiyev, V.: Frameduplication\/mirroring detection method with binary features. IET Image Process. 11(5), 333\u2013342 (2017). https:\/\/doi.org\/10.1049\/iet-ipr.2016.0321","journal-title":"IET Image Process."},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s00530-017-0581-6","volume":"24","author":"G Ulutas","year":"2018","unstructured":"Ulutas, G., Ustubioglu, B., Ulutas, M., Nabiyev, V.V.: Frame duplication detection based on bow model. Multimedia Syst. 24(5), 549\u2013567 (2018). https:\/\/doi.org\/10.1007\/s00530-017-0581-6","journal-title":"Multimedia Syst."},{"key":"25_CR16","doi-asserted-by":"publisher","unstructured":"Wahab, A.W.A., Bagiwa, M.A., Idris, M.Y.I., Khan, S., Razak, Z., Ariffin, M.R.K.: Passive video forgery detection techniques: a survey. In: 10th International Conference on Information Assurance and Security, pp. 29\u201334. IEEE (2014). https:\/\/doi.org\/10.1109\/ISIAS.2014.7064616","DOI":"10.1109\/ISIAS.2014.7064616"},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-662-43886-2_18","volume-title":"Digital-Forensics and Watermarking","author":"W Wang","year":"2014","unstructured":"Wang, W., Jiang, X., Wang, S., Wan, M., Sun, T.: Identifying video forgery process using optical flow. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 244\u2013257. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43886-2_18"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on Multimedia and Security, pp. 35\u201342. ACM, Dallas, Texas (2007)","DOI":"10.1145\/1288869.1288876"},{"issue":"3","key":"25_CR19","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang, Z., Bovik, A.C.: A universal image quality index. IEEE Signal Process. Lett. 9(3), 81\u201384 (2002). https:\/\/doi.org\/10.1109\/97.995823","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"25_CR20","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004). https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans. Image Process."},{"key":"25_CR21","doi-asserted-by":"publisher","unstructured":"Zahir, S.A., Kashanchi, F.: A new image quality measure. In: 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1\u20135 (2013). https:\/\/doi.org\/10.1109\/CCECE.2013.6567730","DOI":"10.1109\/CCECE.2013.6567730"},{"issue":"19","key":"25_CR22","doi-asserted-by":"publisher","first-page":"25389","DOI":"10.1007\/s11042-018-5791-1","volume":"77","author":"Dong-Ning Zhao","year":"2018","unstructured":"Zhao, D.N., Wang, R.K., Lu, Z.M.: Inter-frame passive-blind forgery detection for video shot based on similarity analysis. Multimedia Tools and Applications (2018). https:\/\/doi.org\/10.1007\/s11042-018-5791-1","journal-title":"Multimedia Tools and Applications"},{"key":"25_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-19321-2_2","volume-title":"Digital-Forensics and Watermarking","author":"L Zheng","year":"2015","unstructured":"Zheng, L., Sun, T., Shi, Y.-Q.: Inter-frame video forgery detection based on block-wise brightness variance descriptor. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 18\u201330. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19321-2_2"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11389-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:55:19Z","timestamp":1709823319000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11389-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030113889","9783030113896"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11389-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}