{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:41:19Z","timestamp":1773740479605,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319319599","type":"print"},{"value":"9783319319605","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_11","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"119-133","source":"Crossref","is-referenced-by-count":18,"title":["Video Steganalysis Based on Intra Prediction Mode Calibration"],"prefix":"10.1007","author":[{"given":"Yanbin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Peipei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"11_CR1","unstructured":"Jordan, F., Kutter, M., Ebrahimi, T.: Proposal of a watermarking technique for hiding\/retrieving data in compressed and decompressed video. ISO\/IEC Doc. JTC1\/SC 29\/QWG 11 MPEG 97\/M 2281 (1997)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Liu, Z., Liang, H., Niu, X.: A robust video watermarking in motion vectors. In: Proceedings of the 2004 7th International Conference on Signal Processing, ICSP 2004, vol. 3, pp. 2358\u20132361. IEEE, Beijing, China, 31 August\u20134 September 2004","DOI":"10.1109\/ICOSP.2004.1442254"},{"issue":"10","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1109\/TCSVT.2010.2070950","volume":"20","author":"X Ma","year":"2010","unstructured":"Ma, X., Li, Z., Tu, H.: A data hiding algorithm for H.264\/AVC video stream without intra-frame distortion drift. IEEE Trans. Circuits Syst. Video Technol. 20(10), 1320\u20131330 (2010)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Neufeld, A., Ker, A.: A study of embedding operation and locations for steganography in H.264 video. In: Proceedings of IS&T\/SPIE Electronic Imaging, vol. 8665, pp. 86650J:1\u201314. International Society for Optics and Photonics (2013)","DOI":"10.1117\/12.2003680"},{"issue":"7","key":"11_CR5","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1016\/j.image.2005.03.012","volume":"20","author":"C Lu","year":"2005","unstructured":"Lu, C., Chen, J., Fan, K.: Real-time frame-dependent video watermarking in VLC domain. Sig. Process. Image Commun. 20(7), 624\u2013642 (2005)","journal-title":"Sig. Process. Image Commun."},{"issue":"8","key":"11_CR6","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1093\/ietfec\/e91-a.8.2130","volume":"91","author":"Y Seo","year":"2008","unstructured":"Seo, Y., Choi, H., Lee, C.: Low-complexity watermarking based on entropy coding in H.264\/AVC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91(8), 2130\u20132137 (2008)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Y., Zhang, C., Su, Y.: Information hiding based on intra prediction modes for H.264\/AVC. In: Proceedings of 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, pp. 1231\u20131234. IEEE, Beijing China, 2\u20135 July 2007","DOI":"10.1109\/ICME.2007.4284879"},{"issue":"4","key":"11_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s11554-010-0175-4","volume":"7","author":"D Xu","year":"2012","unstructured":"Xu, D., Wang, R., Wang, J.: Prediction mode modulated data-hiding algorithm for H.264\/AVC. J. Real-Time Image Proc. 7(4), 205\u2013214 (2012)","journal-title":"J. Real-Time Image Proc."},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.aeue.2010.03.011","volume":"65","author":"G Yang","year":"2011","unstructured":"Yang, G., Li, J., He, Y.: An information hiding algorithm based on intra-prediction modes and matrix coding for H.264\/AVC Video stream. Int. J. Electron. Commun. 65(4), 331\u2013337 (2011)","journal-title":"Int. J. Electron. Commun."},{"key":"11_CR10","unstructured":"Bouchama, S., Hamami, L., Aliane, H.: H.264\/AVC data hiding based on intra prediction modes for real-time application. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 1, pp. 655\u2013658 (2012)"},{"issue":"7\u20138","key":"11_CR11","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s12243-013-0381-8","volume":"69","author":"S Li","year":"2014","unstructured":"Li, S., Deng, H., Tian, H.: Steganalytic of prediction mode modulated data-hiding algorithms in H.264\/AVC video stream. Ann. Telecommun. (annales des t\u00e9l\u00e9communications) 69(7\u20138), 461\u2013473 (2014)","journal-title":"Ann. Telecommun. (annales des t\u00e9l\u00e9communications)"},{"issue":"7","key":"11_CR12","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T Wiegand","year":"2003","unstructured":"Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the H.264\/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13(7), 560\u2013576 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Kim, J., Jeong, J.: Fast intra mode decision algorithm using the sum of absolute transformed differences. In: Proceedings of 2011 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2011, pp. 655\u2013659. IEEE (2011)","DOI":"10.1109\/DICTA.2011.116"},{"issue":"3","key":"11_CR14","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2011","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalytic of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/LSP.2011.2176116","volume":"19","author":"Y Cao","year":"2012","unstructured":"Cao, Y., Zhao, X., Feng, D.: Video Steganalysis exploiting motion vector reversion-based features. Sig. Process. Lett. 19(1), 35\u201338 (2012). IEEE","journal-title":"Sig. Process. Lett."},{"issue":"2","key":"11_CR16","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"T Pevny","year":"2008","unstructured":"Pevny, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3(2), 247\u2013258 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"11_CR17","first-page":"27","volume":"2","author":"C Chang","year":"2011","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:48Z","timestamp":1748827128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}