{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T11:40:01Z","timestamp":1749987601804,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319534640"},{"type":"electronic","value":"9783319534657"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53465-7_44","type":"book-chapter","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T09:53:19Z","timestamp":1487152399000},"page":"588-600","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Hiding in H.264\/AVC Video Files Using the Coded Block Pattern"],"prefix":"10.1007","author":[{"given":"Hong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yun","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Changjun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"issue":"5","key":"44_CR1","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285\u2013287 (2006)","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"44_CR2","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F Hartung","year":"1998","unstructured":"Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283\u2013301 (1998)","journal-title":"Signal Process."},{"issue":"12","key":"44_CR3","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"44_CR4","unstructured":"Jordan, F., Kutter, M., Ebrahimi, T.: Proposal of a watermarking technique for hiding\/retrieving data in compressed and decompressed video. Tech. rep. M2281, ISO\/IEC Document, JTC1\/SC29\/WG11, Stockholm, Sweden, July 1997"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: Proceedings of 1st International Conference on Innovative Computing, Information and Control, pp. 269\u2013272. Beijing, China, September 2006","DOI":"10.1109\/ICICIC.2006.158"},{"issue":"1","key":"44_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TIFS.2010.2090520","volume":"6","author":"HA Aly","year":"2011","unstructured":"Aly, H.A.: Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans. Inf. Forensics Secur. 6(1), 14\u201318 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Cao, Y., Zhang, H., Zhao, X., Yu, H.: Video steganography based on optimized motion estimation perturbation. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 25\u201331. Portland (June 2015)","DOI":"10.1145\/2756601.2756609"},{"key":"44_CR8","doi-asserted-by":"crossref","first-page":"13503","DOI":"10.1007\/s11042-015-2743-x","volume":"75","author":"H Zhang","year":"2015","unstructured":"Zhang, H., Cao, Y., Zhao, X.: Motion vector-based video steganography with preserved local optimality. Multimed. Tools Appl. 75, 13503\u201313519 (2015)","journal-title":"Multimed. Tools Appl."},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Hu, Y., Zhang, C.: Yuting: information hiding based on intra prediction modes for H.264\/AVC. In: Proceedings of 2007 IEEE International Conference on Multimedia and Expo, pp. 1231\u20131234. Beijing, China, July 2007","DOI":"10.1109\/ICME.2007.4284879"},{"issue":"4","key":"44_CR10","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.aeue.2010.03.011","volume":"65","author":"G Yang","year":"2011","unstructured":"Yang, G., Li, J., He, Y.: Zhiwei: an information hiding algorithm based on intra-prediction modes and matrix coding for H.264\/AVC video stream. AEU Int. J. Electron. Commun. 65(4), 331\u2013337 (2011)","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"4","key":"44_CR11","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s11554-010-0175-4","volume":"7","author":"D Xu","year":"2012","unstructured":"Xu, D., Wang, R., Wang, J.: Prediction mode modulated data-hiding algorithm for H.264\/AVC. J. Real Time Image Process. 7(4), 205\u2013214 (2012)","journal-title":"J. Real Time Image Process."},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Kapotas, S.K., Skodras, A.N.: A new data hiding scheme for scene change detection in H. 264 encoded video sequences. In: Proceedings of 2008 IEEE International Conference on Multimedia Expo, pp. 277\u2013280. Hannover, Germany (2008)","DOI":"10.1109\/ICME.2008.4607425"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, H., Cao, Y., Zhao, X., Zhang, W., Yu, N.: Video steganography with perturbed macroblock partition. In: Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp. 115\u2013122. Salzburg, Austria, June 2014","DOI":"10.1145\/2600918.2600936"},{"issue":"10","key":"44_CR14","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1109\/TCSVT.2010.2070950","volume":"20","author":"X Ma","year":"2010","unstructured":"Ma, X., Li, Z., Tu, H., Zhang, B.: A data hiding algorithm for H.264\/AVC video streams without intra-frame distortion drift. IEEE Trans. Circ. Syst. Video Technol. 20(10), 1320\u20131330 (2010)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"3","key":"44_CR15","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.jss.2012.10.922","volume":"86","author":"T Lin","year":"2013","unstructured":"Lin, T., Chung, K., Chang, P., Huang, Y., Liao, H.M., Fang, C.: An improved DCT-based perturbation scheme for high capacity data hiding in H.264\/AVC intra frames. J. Syst. Softw. 86(3), 604\u2013614 (2013)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"44_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.jvcir.2013.10.007","volume":"25","author":"P Chang","year":"2014","unstructured":"Chang, P., Chung, K., Chen, J., Lin, C., Lin, T.: A DCT\/DST-based error propagation-free data hiding algorithm for hevc intra-coded frames. J. Vis. Commun. Image Representation 25(2), 239\u2013253 (2014)","journal-title":"J. Vis. Commun. Image Representation"},{"issue":"10","key":"44_CR17","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/TCSVT.2009.2022781","volume":"19","author":"K Wong","year":"2009","unstructured":"Wong, K., Tanaka, K., Takagi, K., Nakajima, Y.: Complete video quality-preserving data hiding. IEEE Trans. Circ. Syst. Video Technol. 19(10), 1499\u20131512 (2009)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"2","key":"44_CR18","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/TIFS.2011.2177087","volume":"7","author":"T Shanableh","year":"2012","unstructured":"Shanableh, T.: Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans. Inf. Forensics Secur. 7(2), 455\u2013464 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Li, J., Liu, H., Huang, J., Zhang, Y.: A robust watermarking scheme for H.264. Digital Watermarking, January 2009. http:\/\/dx.doi.org\/10.1007\/978-3-642-04438-0_1","DOI":"10.1007\/978-3-642-04438-0_1"},{"key":"44_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1007\/978-3-540-74260-9_62","volume-title":"Image Analysis and Recognition","author":"SM Kim","year":"2007","unstructured":"Kim, S.M., Kim, S.B., Hong, Y., Won, C.S.: Data hiding on H.264\/AVC compressed video. In: Kamel, M., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 698\u2013707. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-74260-9_62"},{"issue":"2","key":"44_CR21","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11235-010-9372-5","volume":"49","author":"K Liao","year":"2012","unstructured":"Liao, K., Lian, S., Guo, Z., Wang, J.: Efficient information hiding in H.264\/AVC video coding. Telecommun. Syst. 49(2), 261\u2013269 (2012)","journal-title":"Telecommun. Syst."},{"issue":"7","key":"44_CR22","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T Wiegand","year":"2003","unstructured":"Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the H.264\/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13(7), 560\u2013576 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"44_CR23","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR24","unstructured":"VideoLAN-x264, The Best H.264\/AVC Encoder. http:\/\/www.videolan.org\/developers\/x264.html"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53465-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T11:14:23Z","timestamp":1749986063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-53465-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319534640","9783319534657"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53465-7_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iwdw.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}