{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:40:07Z","timestamp":1748828407769,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_24","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"285-298","source":"Crossref","is-referenced-by-count":1,"title":["Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking"],"prefix":"10.1007","author":[{"given":"Sang-Keun","family":"Ji","sequence":"first","affiliation":[]},{"given":"Wook-Hyung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Han-Ul","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Seung-Min","family":"Mun","sequence":"additional","affiliation":[]},{"given":"Heung-Kyu","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann (2007)","DOI":"10.1016\/B978-012372585-1.50015-2"},{"issue":"4","key":"24_CR2","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0923-5965(02)00144-3","volume":"18","author":"G Do\u00ebrr","year":"2003","unstructured":"Do\u00ebrr, G., Dugelay, J.-L.: A guide tour of video watermarking. Sig. Process. Image Commun. 18(4), 263\u2013282 (2003)","journal-title":"Sig. Process. Image Commun."},{"key":"24_CR3","unstructured":"Diehl, E., Furon, T.: Watermark: closing the analog hole. In: 2003 IEEE International Conference on Consumer Electronics, pp. 52\u201353 (2003)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Lubin, J., Bloom, J.A., Cheng, H.: Robust content-dependent high-fidelity watermark for tracking in digital cinema. In: SPIE 2003, pp. 536\u2013545 (2003)","DOI":"10.1117\/12.477336"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Lee, M.J., Kim, K.S., Lee, H.Y., Oh, T.W., Suh, Y.H., Lee, H.K.: Robust watermark detection against D-A\/A-D conversion for digital cinema using local auto-correlation function. Proceedings of International Conference on Image Processing, pp. 425\u2013428 (2008)","DOI":"10.1109\/ICIP.2008.4711782"},{"issue":"11","key":"24_CR6","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/34.730558","volume":"20","author":"L Itti","year":"1998","unstructured":"Itti, L., Koch, C., Niebur, E.: A model of saliency-based visual attention for rapid scene analysis. IEEE Trans. Pattern Anal. Mach. Intell. 20(11), 1254\u20131259 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Harel, J., Koch, C., Perona, P.: Graph-based visual saliency. In: Advances in Neural Information Processing Systems, pp. 545\u2013552 (2006)","DOI":"10.7551\/mitpress\/7503.003.0073"},{"key":"24_CR8","unstructured":"Niu, Y., Kyan, M., Ma, L., Beghdadi, A., Krishnan, S.: A visual saliency modulated just noticeable distortion profile for image watermarking. In: European Signal Processing Conference, pp. 2039\u20132043 (2011)"},{"issue":"5","key":"24_CR9","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1093\/ietisy\/e91-d.5.1359","volume":"E91-D","author":"K.-S. KIM","year":"2008","unstructured":"Kim, K.S., Lee, H.Y., Im, D.H., Lee, H.K.: Practical, real-time, and robust watermarking on the spatial domain for high-definition video contents. In: IEICE Transactions on Information and Systems, vol. E91-D, no. 5, pp. 1359\u20131368 (2008)","journal-title":"IEICE Transactions on Information and Systems"},{"key":"24_CR10","first-page":"518","volume":"3022","author":"M Kutter","year":"1998","unstructured":"Kutter, M., Jordan, F., Bossen, F.: Digital watermarking of color images using amplitude modulation. J. Electron. Imaging 3022, 518\u2013526 (1998)","journal-title":"J. Electron. Imaging"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/10719724_16","volume-title":"Information Hiding","author":"S Voloshynovskiy","year":"2000","unstructured":"Voloshynovskiy, S., Herrigel, A., Baumgaertner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 211\u2013236. Springer, Heidelberg (2000)"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M Barni","year":"1998","unstructured":"Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Sig. Proc. 66, 357\u2013372 (1998)","journal-title":"Sig. Proc."},{"issue":"4","key":"24_CR13","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:50Z","timestamp":1748827130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}