{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T06:04:17Z","timestamp":1750831457758,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590055"},{"type":"electronic","value":"9783030590062"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59006-2_18","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T10:01:47Z","timestamp":1599732107000},"page":"201-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A New Watermarking Method for Video Authentication with Tamper Localization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2134-4585","authenticated-orcid":false,"given":"Yuliya","family":"Vybornova","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Dabhade, V., Bhople, Y.J., Chandrasekaran, K., Bhattacharya, S.: Video tamper detection techniques based on DCT-SVD and multi-level SVD. In: TENCON IEEE, pp. 1\u20136 (2015)","DOI":"10.1109\/TENCON.2015.7372763"},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/TMM.2019.2925961","volume":"22","author":"S Ghimire","year":"2019","unstructured":"Ghimire, S., Choi, J., Lee, B.: Using blockchain for improved video integrity verification. IEEE Trans. Multimed. 22(1), 108\u2013121 (2019)","journal-title":"IEEE Trans. Multimed."},{"issue":"1","key":"18_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TCSVT.2017.2776159","volume":"29","author":"F Khelifi","year":"2019","unstructured":"Khelifi, F., Bouridane, A.: Perceptual video hashing for content identification and authentication. IEEE Trans. Circuits Syst. Video Technol. 29(1), 50\u201367 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.diin.2016.06.003","volume":"18","author":"K Sitara","year":"2016","unstructured":"Sitara, K., Babu, M.: Digital video tampering detection: an overview of passive techniques. Digit. Invest. 18, 8\u201322 (2016)","journal-title":"Digit. Invest."},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0219467819500153","volume":"19","author":"B Aditya","year":"2019","unstructured":"Aditya, B., Avaneesh, U., Adithya, K., Murthy, A., Sandeep, R., Kavyashree, B.: Invisible semi-fragile watermarking and steganography of digital videos for content authentication and data hiding. Int. J. Image Graph. 19(3), 1\u201319 (2019)","journal-title":"Int. J. Image Graph."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Shiddik, L., Novamizanti, L., Ramatryana, I., Hanifan, H.: Compressive sampling for robust video watermarking based on BCH code in SWT-SVD domain. In: International Conference on Sustainable Engineering and Creative Computing (ICSECC), pp. 223\u2013227 (2019)","DOI":"10.1109\/ICSECC.2019.8907022"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Sharma, C., Bagga, A.: Video watermarking scheme based on DWT, SVD, Rail fence for quality loss of data. In: 4th International Conference on Computing Sciences (ICCS), pp. 84\u201387 (2018)","DOI":"10.1109\/ICCS.2018.00020"},{"issue":"11","key":"18_CR8","doi-asserted-by":"publisher","first-page":"14511","DOI":"10.1007\/s11042-018-6723-9","volume":"78","author":"F Alenizi","year":"2018","unstructured":"Alenizi, F., Kurdahi, F., Eltawil, A.M., Al-Asmari, A.K.: Hybrid pyramid-DWT-SVD dual data hiding technique for videos ownership protection. Multimed. Tools Appl. 78(11), 14511\u201314547 (2018). \n                  https:\/\/doi.org\/10.1007\/s11042-018-6723-9","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"18_CR9","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s11042-019-08225-5","volume":"79","author":"MJ Barani","year":"2020","unstructured":"Barani, M.J., Ayubi, P., Valandar, M.Y., Irani, B.Y.: A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed. Tools Appl. 79(3), 2127\u20132159 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Guangxi, C., Ze, C., Daoshun, W., Shundong, L., Yong, H., Baoying, Z.: Combined DTCWT-SVD-based video watermarking algorithm using finite state machine. In: Eleventh International Conference on Advanced Computational Intelligence, pp. 179\u2013183 (2019)","DOI":"10.1109\/ICACI.2019.8778517"},{"issue":"1","key":"18_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-019-0462-3","volume":"2019","author":"L Rakhmawati","year":"2019","unstructured":"Rakhmawati, L., Wirawan, W., Suwadi, S.: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019(1), 1\u201322 (2019). \n                  https:\/\/doi.org\/10.1186\/s13640-019-0462-3","journal-title":"EURASIP J. Image Video Process."},{"key":"18_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-981-13-2285-3_27","volume-title":"Emerging Trends in Expert Applications and Security","author":"N Solanki","year":"2019","unstructured":"Solanki, N., Khandelwal, S., Gaur, S., Gautam, D.: A comparative analysis of wavelet families for invisible image embedding. In: Rathore, V.S., Worring, M., Mishra, D.K., Joshi, A., Maheshwari, S. (eds.) Emerging Trends in Expert Applications and Security. AISC, vol. 841, pp. 219\u2013227. Springer, Singapore (2019). \n                  https:\/\/doi.org\/10.1007\/978-981-13-2285-3_27"},{"key":"18_CR13","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-981-13-1742-2_62","volume-title":"Information and Communication Technology for Intelligent Systems","author":"CN Sujatha","year":"2019","unstructured":"Sujatha, C.N., Sathyanarayana, P.: DWT-based blind video watermarking using image scrambling technique. In: Satapathy, S.C., Joshi, A. (eds.) Information and Communication Technology for Intelligent Systems. SIST, vol. 106, pp. 621\u2013628. Springer, Singapore (2019). \n                  https:\/\/doi.org\/10.1007\/978-981-13-1742-2_62"},{"key":"18_CR14","first-page":"1","volume":"49","author":"A Wagdarikar","year":"2019","unstructured":"Wagdarikar, A., Senapati, R.: Optimization based interesting region identification for video watermarking. J. Inf. Secur. Appl. 49, 1\u201317 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"18_CR15","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/978-981-13-1906-8_61","volume-title":"Microelectronics, Electromagnetics and Telecommunications","author":"AMU Wagdarikar","year":"2019","unstructured":"Wagdarikar, A.M.U., Senapati, R.K., Ekkeli, S.: A secure video watermarking approach using CRT theorem in DCT domain. In: Panda, G., Satapathy, S.C., Biswal, B., Bansal, R. (eds.) Microelectronics, Electromagnetics and Telecommunications. LNEE, vol. 521, pp. 597\u2013606. Springer, Singapore (2019). \n                  https:\/\/doi.org\/10.1007\/978-981-13-1906-8_61"},{"issue":"5","key":"18_CR16","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1007\/s11042-019-08256-y","volume":"79","author":"L Tian","year":"2020","unstructured":"Tian, L., Dai, H., Li, C.: A semi-fragile video watermarking algorithm based on chromatic residual DCT. Multimed. Tools Appl. 79(5), 1759\u20131779 (2020)","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1587\/transinf.2019MUI0001","volume":"E103.D","author":"K Wong","year":"2020","unstructured":"Wong, K., Chan, C., Maung, M.A.: Lightweight authentication for MP4 format container using subtitle track. IEICE Trans. Inf. Syst. E103.D(1), 2\u201310 (2020)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"4","key":"18_CR18","doi-asserted-by":"publisher","first-page":"304","DOI":"10.22452\/mjcs.vol32no4.4","volume":"32","author":"MAP Maung","year":"2019","unstructured":"Maung, M.A.P., Tew, Y., Wong, K.: Authentication of Mp4 file By perceptual hash and data hiding. Malaysian J. Comput. Sci. 32(4), 304\u2013314 (2019)","journal-title":"Malaysian J. Comput. Sci."},{"key":"18_CR19","unstructured":"Vega-Hernandez, P., Cedillo-Hernandez, M., Nakano, M., Cedillo-Hernandez, A., Perez-Meana, H.: Ownership identification of digital video via unseen-visible watermarking. In: 7th International Workshop on Biometrics and Forensics (IWBF), pp. 1\u20136 (2019)"},{"issue":"18","key":"18_CR20","doi-asserted-by":"publisher","first-page":"26089","DOI":"10.1007\/s11042-019-07809-5","volume":"78","author":"Z Cao","year":"2019","unstructured":"Cao, Z., Wang, L.: A secure video watermarking technique based on hyperchaotic Lorentz system. Multimed. Tools Appl. 78(18), 26089\u201326109 (2019). \n                  https:\/\/doi.org\/10.1007\/s11042-019-07809-5","journal-title":"Multimed. Tools Appl."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Munir, R., Harlili: A secure fragile video watermarking algorithm for content authentication based on arnold cat map. In: 4th International Conference on Information Technology, pp. 32\u201337 (2019)","DOI":"10.1109\/INCIT.2019.8912074"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Vybornova, Y., Sergeev, V.: Method for vector map protection based on using of a watermark image as a secondary carrier. In: ICETE 2019 - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, pp. 284\u2013293 (2019)","DOI":"10.5220\/0007932402840293"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jvcir.2015.02.012","volume":"30","author":"JY Lin","year":"2015","unstructured":"Lin, J.Y., Song, R., Wu, C.-H., Liu, T.-J., Wang, H., Kuo, C.-C.J.: MCL-V: a streaming video quality assessment database. J. Vis. Commun. Image Represent. 30, 1\u20139 (2015)","journal-title":"J. Vis. Commun. Image Represent."}],"container-title":["Lecture Notes in Computer Science","Computer Vision and Graphics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59006-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T19:55:45Z","timestamp":1599767745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-59006-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590055","9783030590062"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59006-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCVG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Vision and Graphics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccvg2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccvg.wzim.sggw.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"proprietary conference system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,35","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,25","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic ICCVG 2020 was held as a virtual event.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}