{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:40:09Z","timestamp":1748652009504,"version":"3.41.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319241739"},{"type":"electronic","value":"9783319241746"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24174-6_19","type":"book-chapter","created":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T11:36:32Z","timestamp":1444390592000},"page":"366-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On Security of Content-Based Video Stream Authentication"],"prefix":"10.1007","author":[{"given":"Swee-Won","family":"Lo","sequence":"first","affiliation":[]},{"given":"Zhuo","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Xuhua","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,13]]},"reference":[{"key":"19_CR1","unstructured":"Arizona State University: Video trace library. http:\/\/trace.eas.asu.edu\/index.html"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bianchi, T., Rosa, A.D., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2011), pp. 2444\u20132447 (2011)","DOI":"10.1109\/ICASSP.2011.5946978"},{"issue":"2","key":"19_CR3","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.patcog.2007.06.003","volume":"41","author":"C Chang","year":"2008","unstructured":"Chang, C., Fan, Y., Tai, W.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 41(2), 654\u2013661 (2008)","journal-title":"Pattern Recogn."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Dai, Y., Thiemert, S., Steinebach, M.: Feature-based watermarking scheme for MPEG-I\/II video authentication. In: SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 325\u2013335 (2004)","DOI":"10.1117\/12.526686"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Du, R., Fridrich, J.: Lossless authentication of MPEG-2 video. In: 2002 International Conference on Image Processing (ICIP), vol. 2, pp. II-893\u2013II-896 (2002)","DOI":"10.1109\/ICIP.2002.1040095"},{"issue":"4\u20135","key":"19_CR6","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/S0923-5965(99)00054-5","volume":"15","author":"T Ebrahimi","year":"2000","unstructured":"Ebrahimi, T., Horne, C.: MPEG-4 natural video coding - an overview. Signal Process. Image Commun. 15(4\u20135), 365\u2013385 (2000)","journal-title":"Signal Process. Image Commun."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Security of fragile authentication watermarks with localization. In: SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 691\u2013700 (2002)","DOI":"10.1117\/12.465330"},{"issue":"1","key":"19_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1671954.1671960","volume":"6","author":"M Hefeeda","year":"2010","unstructured":"Hefeeda, M., Mokhtarian, K.: Authentication schemes for multimedia streams: quantitative analysis and comparison. ACM Trans. Multimedia Comput. Commun. Appl. 6(1), 1\u201324 (2010)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"issue":"3","key":"19_CR9","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"M Holliman","year":"2000","unstructured":"Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9(3), 432\u2013442 (2000)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"19_CR10","doi-asserted-by":"publisher","first-page":"2469","DOI":"10.1007\/s11042-013-1561-2","volume":"72","author":"SJ Horng","year":"2014","unstructured":"Horng, S.J., Farfoura, M.E., Fan, P., Wang, X., Li, T., Guo, J.M.: A low cost fragile watermarking scheme in H.264\/AVC compressed domain. Multimedia Tools Appl. 72(3), 2469\u20132495 (2014)","journal-title":"Multimedia Tools Appl."},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.compeleceng.2014.08.001","volume":"41","author":"HT Hu","year":"2015","unstructured":"Hu, H.T., Hsu, L.Y.: Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression. Comput. Electr. Eng. 41, 52\u201363 (2015)","journal-title":"Comput. Electr. Eng."},{"key":"19_CR12","unstructured":"Joint Video Team (JVT) of ISO\/IEC MPEG & ITU-T VCEG (ISO\/IEC JTC1\/SC29\/WG11 and ITU-T SG16 Q.6).: JM Reference Software Manual (2009)"},{"issue":"8","key":"19_CR13","doi-asserted-by":"publisher","first-page":"1220","DOI":"10.1016\/j.imavis.2009.12.006","volume":"28","author":"D Kim","year":"2010","unstructured":"Kim, D., Choi, Y., Kim, H., Yoo, J., Choi, H., Seo, Y.: The problems in digital watermarking into intra-frames of H.264\/AVC. Image Vis. Comput. 28(8), 1220\u20131228 (2010)","journal-title":"Image Vis. Comput."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Kuo, T.Y., Lo, Y.C., Lin, C.I.: Fragile video watermarking technique by motion field embedding with rate-distortion minimization. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp. 853\u2013856 (2008)","DOI":"10.1109\/IIH-MSP.2008.230"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Lin, C.Y., Chang, S.F.: Issues and solutions for authenticating MPEG video. In: SPIE International Conference on Security and Watermarking of Multimedia Contents, vol. 3657, pp. 54\u201356 (1999)","DOI":"10.1117\/12.344703"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: SPIE Security and Watermarking of Multimedia Contents, pp. 140\u2013151 (2000)","DOI":"10.1117\/12.384968"},{"issue":"2","key":"19_CR17","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"CY Lin","year":"2001","unstructured":"Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2), 153\u2013168 (2001)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"19_CR18","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1016\/j.patcog.2005.02.007","volume":"38","author":"P Lin","year":"2005","unstructured":"Lin, P., Hsieh, C., Huang, P.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519\u20132529 (2005)","journal-title":"Pattern Recogn."},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Lo, S.W., Wei, Z., Deng, R.H., Ding, X.: Generic attacks on content-based video stream authentication. In: IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp. 1\u20136 (2014)","DOI":"10.1109\/ICMEW.2014.6890692"},{"issue":"6","key":"19_CR20","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1109\/TCSVT.2013.2240919","volume":"23","author":"Z Luo","year":"2013","unstructured":"Luo, Z., Song, L., Zheng, S., Ling, N.: H.264 advanced video control perceptual optimization coding based on JND-directed coefficient suppression. IEEE Trans. Circuits Syst. Video Technol. 23(6), 935\u2013948 (2013)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Ma, S., Gao, W., Zhao, D., Lu, Y.: A study on the quantization scheme in H.264\/AVC and its application to rate control. In: Advances in Multimedia Information Processing, PCM, pp. 192\u2013199 (2004)","DOI":"10.1007\/978-3-540-30543-9_25"},{"issue":"4","key":"19_CR22","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TIFS.2010.2076280","volume":"5","author":"A Mansouri","year":"2010","unstructured":"Mansouri, A., Aznaveh, A.M., Torkamani-Azar, F., Kurugollu, F.: A low complexity video watermarking in H.264 compressed domain. IEEE Trans. Inf. Forensics Secur. 5(4), 649\u2013657 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"19_CR23","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1109\/TCSVT.2011.2130430","volume":"21","author":"M Naccari","year":"2011","unstructured":"Naccari, M., Pereira, F.: Advanced H.264\/AVC-based perceptual video coding: architecture, tools and assessment. IEEE Trans. Circuits Syst. Video Technol. 21(6), 806\u2013819 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR24","first-page":"51","volume":"13","author":"JS Park","year":"2006","unstructured":"Park, J.S., Song, H.J.: Selective intra prediction mode decision for H.264\/AVC encoders. World Acad. Sci. Eng. Technol. 13, 51\u201355 (2006)","journal-title":"World Acad. Sci. Eng. Technol."},{"issue":"1","key":"19_CR25","first-page":"129","volume":"27","author":"SW Park","year":"2011","unstructured":"Park, S.W., Shin, S.: Authentication and copyright protection scheme for H.264\/AVC and SVC. J. Inf. Sci. Eng. 27(1), 129\u2013142 (2011)","journal-title":"J. Inf. Sci. Eng."},{"issue":"4","key":"19_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/79.939835","volume":"18","author":"CI Podilchuk","year":"2001","unstructured":"Podilchuk, C.I., Delp, E.J.: Digital watermarking: algorithms and applications. IEEE Signal Process. Mag. 18(4), 33\u201346 (2001)","journal-title":"IEEE Signal Process. Mag."},{"key":"19_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/9780470989418","volume-title":"The H.264 Advanced Video Compression Standard","author":"IE Richardson","year":"2010","unstructured":"Richardson, I.E.: The H.264 Advanced Video Compression Standard, 2nd edn. Wiley, Chichester (2010)","edition":"2"},{"key":"19_CR28","unstructured":"Saadi, K.A., Bouridane, A., Guessoum, A.: Combined fragile watermark and digital signature for H.264\/AVC video authentication. In: 17th European Signal Processing Conference, pp. 1799\u20131803 (2009)"},{"issue":"9","key":"19_CR29","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1109\/TCSVT.2007.905532","volume":"17","author":"H Schwarz","year":"2007","unstructured":"Schwarz, H., Merpe, D., Wiegand, T.: Overview of the scalable video coding extension of the H.264\/AVC standard. IEEE Trans. Circuits Syst. Video Technol. 17(9), 1103\u20131120 (2007)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Shahabuddin, S., Iqbal, R., Shirmohammadi, S., Zhao, J.: Compressed-domain temporal adaptation-resilient watermarking for H.264 video authentication. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1752\u20131755 (2009)","DOI":"10.1109\/ICME.2009.5202860"},{"issue":"5","key":"19_CR31","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/79.952804","volume":"18","author":"A Skodras","year":"2001","unstructured":"Skodras, A., Christopoulos, C., Ebrahimi, T.: The JPEG 2000 still image compression standard. IEEE Signal Process. Mag. 18(5), 36\u201358 (2001)","journal-title":"IEEE Signal Process. Mag."},{"issue":"10","key":"19_CR32","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.1109\/TCSVT.2006.882540","volume":"16","author":"Q Sun","year":"2006","unstructured":"Sun, Q., He, D., Tian, Q.: A secure and robust authentication scheme for video transcoding. IEEE Trans. Circuits Syst. Video Technol. 16(10), 1232\u20131244 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR33","unstructured":"The CAVIAR team: EC funded CAVIAR project\/IST 2001 37540. http:\/\/homepages.inf.ed.ac.uk\/rbf\/CAVIAR\/"},{"key":"19_CR34","doi-asserted-by":"publisher","first-page":"552","DOI":"10.4028\/www.scientific.net\/AMM.145.552","volume":"145","author":"GC Ting","year":"2011","unstructured":"Ting, G.C., Goi, B.M., Lee, S.W.: Cryptanalysis of a fragile watermark based H.264\/AVC video authentication scheme. Appl. Mech. Mater. 145, 552\u2013556 (2011)","journal-title":"Appl. Mech. Mater."},{"issue":"6","key":"19_CR35","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1109\/TIP.2006.873476","volume":"15","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Pearmain, A.: Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. IEEE Trans. Image Process. 15(6), 1536\u20131543 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"19_CR36","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TIFS.2014.2301916","volume":"9","author":"Z Wei","year":"2014","unstructured":"Wei, Z., Wu, Y., Deng, R., Ding, X.: A hybrid scheme for authenticating scalable video codestreams. IEEE Trans. Inf. Forensics Secur. 9(4), 543\u2013553 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR37","unstructured":"Wong, P.: A watermark for image integrity and ownership verification. In: IS and TS PICS Conference, pp. 374\u2013379 (1998)"},{"key":"19_CR38","doi-asserted-by":"crossref","unstructured":"Wu, Y., Xu, C.: A fault-induced attack to semi-fragile image authentiation schemes. In: SPIE on Visual Communications and Image Processing, vol. 5150, pp. 1875\u20131883 (2003)","DOI":"10.1117\/12.501824"},{"issue":"6","key":"19_CR39","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TCSVT.2005.848313","volume":"15","author":"X Yang","year":"2005","unstructured":"Yang, X., Lin, W., Lu, Z., Ong, E., Yao, S.: Motion-compensated residue preprocessing in video coding based on just-noticeable-distortion profile. IEEE Trans. Circuits Syst. Video Technol. 15(6), 742\u2013752 (2005)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: International Conference on Image Processsing (ICIP), pp. 680\u2013683 (1997)","DOI":"10.1109\/ICIP.1997.638587"},{"key":"19_CR41","doi-asserted-by":"crossref","unstructured":"Yin, P., Yu, H.H.: A semi-fragile watermarking system for MPEG video authentication. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 4, pp. IV-3461\u2013IV-3464 (2002)","DOI":"10.1109\/ICASSP.2002.5745399"},{"issue":"8","key":"19_CR42","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.4304\/jnw.7.8.1150-1154","volume":"7","author":"W Zhang","year":"2012","unstructured":"Zhang, W., Zhang, R., Liu, X., Wu, C., Niu, X.: A video watermarking algorithm of H.264\/AVC for content authentication. J. Networks 7(8), 1150\u20131154 (2012)","journal-title":"J. Networks"},{"key":"19_CR43","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Lo, S.W., Deng, R.H., Ding, X.: An improved authentication scheme for H.264\/SVC and its performance evaluation over non-stationary wireless mobile networks. In: 6th International Conference on Network and System Security (NSS), pp. 192\u2013206 (2012)","DOI":"10.1007\/978-3-642-34601-9_15"},{"issue":"1","key":"19_CR44","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/TCSVT.2011.2105592","volume":"21","author":"Z Zhao","year":"2011","unstructured":"Zhao, Z., Liang, P.: A statistical analysis of H.264\/AVC FME mode reduction. IEEE Trans. Circuits Syst. Video Technol. 21(1), 53\u201361 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."}],"container-title":["Lecture Notes in Computer Science","Computer Security -- ESORICS 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24174-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:01:15Z","timestamp":1748649675000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-24174-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319241739","9783319241746"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24174-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}