{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:10:00Z","timestamp":1742800200382,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_26","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"340-354","source":"Crossref","is-referenced-by-count":2,"title":["Secure Video Watermarking via Embedding Strength Modulation"],"prefix":"10.1007","author":[{"given":"Gwena\u00ebl","family":"Do\u00ebrr","sequence":"first","affiliation":[]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","volume-title":"Information Hiding: Techniques for Steganography and Digital Watermarking","author":"S. Katzenbeisser","year":"1999","unstructured":"Katzenbeisser, S., Petitcolas, F.: Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood (1999)"},{"key":"26_CR2","volume-title":"Digital Watermarking","author":"I. Cox","year":"2001","unstructured":"Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)"},{"issue":"4","key":"26_CR3","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0923-5965(02)00144-3","volume":"18","author":"G. Do\u00ebrr","year":"2003","unstructured":"Do\u00ebrr, G., Dugelay, J.-L.: A guide tour of video watermarking. Signal Processing: Image Communication\u00a018(4), 263\u2013282 (2003)","journal-title":"Signal Processing: Image Communication"},{"issue":"7","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/5.771077","volume":"87","author":"J. Bloom","year":"1999","unstructured":"Bloom, J., Cox, I., Kalker, T., Linnartz, J.-P., Miller, M., Traw, C.: Copy protection for DVD video. Proceedings of the IEEE\u00a087(7), 1267\u20131276 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Haitsma, J., Kalker, T.: A watermarking scheme for digital cinema. In: Proceedings of the IEEE International Conference on Image Processing, vol.\u00a02, pp. 487\u2013489 (2001)","DOI":"10.1109\/ICIP.2001.958534"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Bloom, J.: Security and rights management in digital cinema. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.\u00a0IV, pp. 712\u2013715 (2003)","DOI":"10.1109\/ICASSP.2003.1202742"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Griwodz, C., Merkel, O., Dittmann, J., Steinmetz, R.: Protecting VoD the easier way. In: Proceedings of the ACM Multimedia Conference, pp. 21\u201328 (1998)","DOI":"10.1145\/290747.290751"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A video watermarking system for broadcast monitoring. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 103\u2013112 (1999)","DOI":"10.1117\/12.344661"},{"key":"26_CR9","unstructured":"Jordan, F., Kutter, M., Ebrahimi, T.: Proposal of a watermarking technique for hiding\/retrieving data in compressed and decompressed video. In: JTC1\/SC29\/WG11 MPEG97\/M2281, ISO\/IEC (1997)"},{"issue":"4","key":"26_CR10","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1006\/jvci.1998.0397","volume":"9","author":"G. Langelaar","year":"1998","unstructured":"Langelaar, G., Lagendijk, R., Biemond, J.: Real-time labelling of MPEG-2 compressed video. Journal of Visual Communication and Image Representation\u00a09(4), 256\u2013270 (1998)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Deguillaume, F., Csurka, G., \u00d3 Ruanaidh, J., Pun, T.: Robust 3D DFT video watermarking. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 113\u2013124 (1999)","DOI":"10.1117\/12.344662"},{"issue":"4","key":"26_CR12","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/49.668976","volume":"16","author":"M. Swanson","year":"1998","unstructured":"Swanson, M., Zhu, B., Tewfik, A.: Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications\u00a016(4), 540\u2013550 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: A novel approach to collusion resistant video watermarking. In: Proceedings of SPIE 4675, Security and Watermarking of Multimedia Contents IV, pp. 491\u2013502 (2002)","DOI":"10.1117\/12.465307"},{"key":"26_CR14","unstructured":"Do\u00ebrr, G., Dugelay, J.-L.: Switching between orthogonal watermarks for enhanced security against collusion in video. Technical Report RR-03-080, Eur\u00e9com Institute (2003)"},{"issue":"3","key":"26_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F. Hartung","year":"1998","unstructured":"Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing\u00a066(3), 283\u2013301 (1998)","journal-title":"Signal Processing"},{"issue":"5","key":"26_CR16","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TCOM.1982.1095533","volume":"30","author":"R. Pickholtz","year":"1982","unstructured":"Pickholtz, R., Schilling, D., Millstein, L.: Theory of spread spectrum communications - a tutorial. IEEE Transactions on Communications\u00a030(5), 855\u2013884 (1982)","journal-title":"IEEE Transactions on Communications"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Mobasseri, B.: Exploring CDMA for watermarking of digital video. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 96\u2013102 (1999)","DOI":"10.1117\/12.344660"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/10719724_16","volume-title":"Information Hiding","author":"S. Voloshynovskiy","year":"2000","unstructured":"Voloshynovskiy, S., Herrigel, A., Baumg\u00e4rtner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 211\u2013236. Springer, Heidelberg (2000)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Voloshynovskiy, C., Pereira, S., Herrigel, A., Baumg\u00e4rtner, N., Pun, T.: Generalized watermarking attack based on watermark estimation and perceptual remodulation. In: Proceedings of SPIE 3971, Security and Watermarking of Multimedia Contents II, pp. 358\u2013370 (2000)","DOI":"10.1117\/12.384990"},{"key":"26_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-02945-9","volume-title":"A Course in Computational Algebraic Number Theory","author":"H. Cohen","year":"1993","unstructured":"Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, Heidelberg (1993)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M.: Preprocessing media to facilitate later insertion of a watermark. In: Proceedings of the International Conference on Digital Signal Processing, vol. 1, pp. 67\u201370 (2002)","DOI":"10.1109\/ICDSP.2002.1027817"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Kutter, M., Petitcolas, F.: A fair benchmark for image watermarking systems. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 226\u2013239 (1999)","DOI":"10.1117\/12.344672"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Zhao, H., Wu, M., Wang, Z., Liu, K.: Non-linear collusion attacks on independent fingerprints for multimedia. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. V, pp. 664\u2013667 (2003)","DOI":"10.1109\/ICASSP.2003.1200058"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Do\u00ebrr, G., Dugelay, J.-L.: New intra-video collusion attack using mosaicing. In: Proceedings of the IEEE International Conference on Multimedia and Expo., vol.\u00a0II, pp. 505\u2013508 (2003)","DOI":"10.1109\/ICME.2003.1221664"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Kutter, M.: Watermarking resisting to translation, rotation and scaling. In: Proceedings of SPIE 3528, Multimedia Systems and Applications, pp. 423\u2013431 (1998)","DOI":"10.1117\/12.337432"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Herrigel, A., Voloshynovskiy, S., Rytsar, Y.: The watermark template attack. In: Proceedings of SPIE 4314, Security and Watermarking of Multimedia Contents III, pp. 394\u2013405 (2001)","DOI":"10.1117\/12.435423"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:46:35Z","timestamp":1740836795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}