{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:10:54Z","timestamp":1750824654337,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319641843"},{"type":"electronic","value":"9783319641850"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64185-0_15","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:08:07Z","timestamp":1500970087000},"page":"187-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Information Hiding Using CAVLC: Misconceptions and a Detection Strategy"],"prefix":"10.1007","author":[{"given":"Weike","family":"You","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yun","family":"Cao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"issue":"2","key":"15_CR1","first-page":"45","volume":"129","author":"M Abd","year":"2015","unstructured":"Abd, M., Zekry, A.: Implementing entropy codec for H.264 video compression standard. Int. J. Comput. Appl. 129(2), 45\u201353 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/LSP.2011.2176116","volume":"19","author":"Y Cao","year":"2012","unstructured":"Cao, Y., Zhao, X., Feng, D.: Video steganalysis exploiting motion vector reversion-based features. IEEE Sig. Process. Lett. 19(1), 35\u201338 (2012)","journal-title":"IEEE Sig. Process. Lett."},{"key":"15_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Jafari, M., Kasaei, S.: Fast intra- and inter-prediction mode decision in H.264 advanced video coding. In: IEEE Singapore International Conference on Communication Systems, pp. 1\u20136 (2006)","DOI":"10.1109\/ICCS.2006.301516"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Kim, S., Kim, S., Hong, Y., Won, C.: Data hiding on H.264\/AVC compressed video. In: Image Analysis and Recognition, pp. 698\u2013707 (2007)","DOI":"10.1007\/978-3-540-74260-9_62"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Li, X., Chen, H., Wang, D., Liu, T., Hou, G.: Data hiding in encoded video sequences based on H.264. In: IEEE International Conference on Computer Science and Information Technology. vol. 6, pp. 121\u2013125. IEEE (2010)","DOI":"10.1109\/ICCSIT.2010.5563733"},{"issue":"2","key":"15_CR7","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11235-010-9372-5","volume":"49","author":"K Liao","year":"2012","unstructured":"Liao, K., Lian, S., Guo, Z., Wang, J.: Efficient information hiding in H.264\/AVC video coding. Telecommun. Syst. 49(2), 261\u2013269 (2012)","journal-title":"Telecommun. Syst."},{"issue":"11","key":"15_CR8","first-page":"6359","volume":"7","author":"SD Lin","year":"2011","unstructured":"Lin, S.D., Chuang, C.Y., Chen, M.J.: A cavlc-based video watermarking scheme for H.264\/AVC codec. Int. J. Innov. Comput. Inf. Control 7(11), 6359\u20136367 (2011)","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Lin, Y.C., Hsu, I.F.: Cavlc codewords substitution for H.264\/AVC video data hiding. In: IEEE International Conference on Consumer Electronics, pp. 492\u2013493. IEEE (2014)","DOI":"10.1109\/ICCE.2014.6776100"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1016\/j.neucom.2014.03.088","volume":"151","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Ju, L., Hu, M., Ma, X., Zhao, H.: A robust reversible data hiding scheme for H.264 without distortion drift. Neurocomputing 151, 1053\u20131062 (2015)","journal-title":"Neurocomputing"},{"issue":"7","key":"15_CR11","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1016\/j.image.2005.03.012","volume":"20","author":"CS Lu","year":"2005","unstructured":"Lu, C.S., Chen, J.R., Fan, K.C.: Real-time frame-dependent video watermarking in VLC domain. Sig. Process. Image Commun. 20(7), 624\u2013642 (2005)","journal-title":"Sig. Process. Image Commun."},{"issue":"10","key":"15_CR12","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1109\/TCSVT.2010.2070950","volume":"20","author":"X Ma","year":"2010","unstructured":"Ma, X., Li, Z., Tu, H., Zhang, B.: A data hiding algorithm for H.264\/AVC video streams without intra-frame distortion drift. IEEE Trans. Circ. Syst. Video Technol. 20(10), 1320\u20131330 (2010)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Mobasseri, B.G., Marcinak, M.P.: Watermarking of MPEG-2 video in compressed domain using VLC mapping. In: ACM Workshop on Multimedia and Security, pp. 91\u201394. ACM (2005)","DOI":"10.1145\/1073170.1073187"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Niu, K., Zhong, W.: A video steganography scheme based on H.264 bitstreams replaced. In: IEEE International Conference on Software Engineering and Service Science, pp. 447\u2013450. IEEE (2013)","DOI":"10.1109\/ICSESS.2013.6615345"},{"key":"15_CR15","unstructured":"Ozer, J.: Encoding for Multiple Screen Delivery. Udemy (2016)"},{"key":"15_CR16","unstructured":"Richardson, I.E.: H.264\/Mpeg-4 part 10 white paper (2003)"},{"issue":"8","key":"15_CR17","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1093\/ietfec\/e91-a.8.2130","volume":"91","author":"YH Seo","year":"2008","unstructured":"Seo, Y.H., Lee, C.Y., Kim, D.W.: Low-complexity watermarking based on entropy coding in H.264\/AVC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91(8), 2130\u20132137 (2008)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"15_CR18","first-page":"540","volume":"5","author":"G Shobitha","year":"2016","unstructured":"Shobitha, G.: Implementation of cavld architecture using binary tree structures and data hiding for H.264\/AVC using cavlc & exp-golomb codeword substitution. Int. J. Comput. Sci. Mob. Comput. 5, 540\u2013549 (2016)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"issue":"2","key":"15_CR19","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/TCSVT.2013.2276710","volume":"24","author":"Y Tew","year":"2014","unstructured":"Tew, Y., Wong, K.: An overview of information hiding in H.264\/AVC compressed video. IEEE Trans. Circ. Syst. Video Technol. 24(2), 305\u2013319 (2014)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Tian, X., Le, T.M., Lian, Y.: Entropy Coders of the H.264\/AVC Standard: Algorithms and VLSI Architectures. Springer, New York (2010)","DOI":"10.1007\/978-3-642-14703-6"},{"issue":"6","key":"15_CR21","first-page":"2132","volume":"7","author":"R Wang","year":"2011","unstructured":"Wang, R., Hu, L., Xu, D.: A watermarking algorithm based on the CABAC entropy coding for H.264\/AVC. J. Comput. Inf. Syst. 7(6), 2132\u20132141 (2011)","journal-title":"J. Comput. Inf. Syst."},{"issue":"9","key":"15_CR22","doi-asserted-by":"publisher","first-page":"097402","DOI":"10.1117\/1.3622759","volume":"50","author":"D Xu","year":"2011","unstructured":"Xu, D., Wang, R.: Watermarking in H.264\/AVC compressed domain using exp-golomb code words mapping. Opt. Eng. 50(9), 097402 (2011)","journal-title":"Opt. Eng."},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.sigpro.2016.05.004","volume":"128","author":"Y Yao","year":"2016","unstructured":"Yao, Y., Zhang, W., Yu, N.: Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264\/AVC video bitstreams. Sig. Process. 128, 531\u2013545 (2016)","journal-title":"Sig. Process."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64185-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:44:43Z","timestamp":1750787083000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-64185-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319641843","9783319641850"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64185-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"26 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Magdeburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2017.cs.ovgu.de\/cms\/front_content.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}