{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:06:50Z","timestamp":1761664010113,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030377304"},{"type":"electronic","value":"9783030377311"}],"license":[{"start":{"date-parts":[[2019,12,24]],"date-time":"2019-12-24T00:00:00Z","timestamp":1577145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37731-1_65","type":"book-chapter","created":{"date-parts":[[2019,12,27]],"date-time":"2019-12-27T01:02:51Z","timestamp":1577408571000},"page":"802-812","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["High Accuracy Perceptual Video Hashing via Low-Rank Decomposition and DWT"],"prefix":"10.1007","author":[{"given":"Lv","family":"Chen","sequence":"first","affiliation":[]},{"given":"Dengpan","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Shunzhi","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,24]]},"reference":[{"issue":"5","key":"65_CR1","doi-asserted-by":"publisher","first-page":"777","DOI":"10.2991\/ijcis.2011.4.5.4","volume":"4","author":"D Ye","year":"2011","unstructured":"Ye, D., et al.: Improved ordinary measure and image entropy theory based intelligent copy detection method. Int. J. Comput. Intell. Syst. 4(5), 777\u2013787 (2011)","journal-title":"Int. J. Comput. Intell. Syst."},{"issue":"3","key":"65_CR2","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin, C., Chang, C., Chiu, Y.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969\u2013978 (2014)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"65_CR3","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1080\/18756891.2012.733228","volume":"5","author":"D Ye","year":"2012","unstructured":"Ye, D., et al.: Scalable content authentication in H.264\/SVC video using perceptual hashing based on Dempster-Shafer theory. Int. J. Comput. Intell. Syst. 5(5), 953\u2013963 (2012)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"65_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","volume":"153","author":"C Qin","year":"2018","unstructured":"Qin, C., et al.: Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Sig. Process. 153, 109\u2013122 (2018)","journal-title":"Sig. Process."},{"issue":"1","key":"65_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.cose.2011.11.004","volume":"31","author":"G Yang","year":"2012","unstructured":"Yang, G., Chen, N., Jiang, Q.: A robust hashing algorithm based on SURF for video copy detection. Comput. Secur. 31(1), 33\u201339 (2012)","journal-title":"Comput. Secur."},{"issue":"10","key":"65_CR6","doi-asserted-by":"publisher","first-page":"4397","DOI":"10.1109\/TIP.2012.2206036","volume":"21","author":"M Li","year":"2012","unstructured":"Li, M., Monga, V.: Robust video hashing via multilinear subspace projections. IEEE Trans. Image Process. 21(10), 4397\u20134409 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"65_CR7","doi-asserted-by":"crossref","unstructured":"Saikia, N.: Perceptual hashing in the 3D-DWT domain. In: Proceedings of International Conference on Green Computing and Internet of Things, pp. 694\u2013698 (2015)","DOI":"10.1109\/ICGCIoT.2015.7380552"},{"key":"65_CR8","doi-asserted-by":"crossref","unstructured":"Setyawan, I., Timotius, I.K.: Spatio-temporal digital video hashing using edge orientation histogram and discrete cosine transform. In: Proceedings of International Conference on Information Technology Systems and Innovation (ICITSI), pp. 24\u201327 (2015)","DOI":"10.1109\/ICITSI.2014.7048247"},{"issue":"5","key":"65_CR9","doi-asserted-by":"publisher","first-page":"5303","DOI":"10.1007\/s11042-017-4434-2","volume":"77","author":"H Chen","year":"2017","unstructured":"Chen, H., Yan, W., Han, G.: Multi-granularity geometrically robust video hashing for tampering detection. Multimed. Tools Appl. 77(5), 5303\u20135321 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"65_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-016-5528-6","volume":"59","author":"X Nie","year":"2016","unstructured":"Nie, X., et al.: Spherical torus-based video hashing for near-duplicate video detection. Sci. China Inf. Sci. 59(5), 1\u20133 (2016)","journal-title":"Sci. China Inf. Sci."},{"key":"65_CR11","doi-asserted-by":"crossref","unstructured":"Sandeep, R., Saksham, S., Prabin, K.B.: Perceptual video hashing using 3D-radial projection technique. In: Proceedings of International Conference on Signal Processing, Communication and Networking, pp. 1\u20136 (2017)","DOI":"10.1109\/ICSCN.2017.8085727"},{"key":"65_CR12","doi-asserted-by":"publisher","unstructured":"Tang, Z., et al.: Video hashing with DCT and NMF. Comput. J., Oxford (2019). \nhttps:\/\/doi.org\/10.1093\/comjnl\/bxz060","DOI":"10.1093\/comjnl\/bxz060"},{"issue":"9","key":"65_CR13","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926\u2013934 (2006)","journal-title":"Image Vis. Comput."},{"key":"65_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Structure-constrained low-rank and partial sparse representation for image classification. In: Proceedings of International Conference on Image Processing, Communication and Networking, pp. 5222\u20135226 (2014)","DOI":"10.1109\/ICIP.2014.7026057"},{"key":"65_CR15","doi-asserted-by":"crossref","unstructured":"Xiong, F., Zhou, J., Qian, Y.: Hyperspectral imagery denoising via reweighed sparse low-rank nonnegative tensor factorization. In: Proceedings of International Conference on Image Processing, pp. 3219\u20133223 (2018)","DOI":"10.1109\/ICIP.2018.8451087"},{"key":"65_CR16","unstructured":"Lin, Z., et al.: The augmented Lagrange multiplier method for exact recovery of corrupted low-rank matrices. UIUC, UILUENG-09-2215 (2009)"},{"issue":"11","key":"65_CR17","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1093\/comjnl\/bxy047","volume":"61","author":"Z Tang","year":"2018","unstructured":"Tang, Z., et al.: Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment. Comput. J. 61(11), 1695\u20131709 (2018)","journal-title":"Comput. J."},{"issue":"3","key":"65_CR18","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TKDE.2018.2837745","volume":"31","author":"Z Tang","year":"2019","unstructured":"Tang, Z., et al.: Robust image hashing with tensor decomposition. IEEE Trans. Knowl. Data Eng. 31(3), 549\u2013560 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"65_CR19","unstructured":"The open video project. \nhttp:\/\/www.open-video.org\/\n\n. Accessed 12 May 2018"},{"key":"65_CR20","unstructured":"ReefVid: Free Reef Video Clip Database. \nhttp:\/\/www.reefvid.org\/\n\n. Accessed 16 July 2018"}],"container-title":["Lecture Notes in Computer Science","MultiMedia Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37731-1_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T11:24:29Z","timestamp":1580988269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37731-1_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,24]]},"ISBN":["9783030377304","9783030377311"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37731-1_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019,12,24]]},"assertion":[{"value":"24 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Daejeon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mmm2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mmm2020.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"171","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Of the 171 submissions, 46 were accepted as poster papers; of the 49 special session paper submissions, 28 were accepted for oral presentation and 8 for poster presentation; 9 demo papers and 10 VBS papers were also accepted.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}