{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:19:54Z","timestamp":1739423994333,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_28","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"327-341","source":"Crossref","is-referenced-by-count":1,"title":["Video Watermarking Based on Spatio-temporal JND Profile"],"prefix":"10.1007","author":[{"given":"Dawen","family":"Xu","sequence":"first","affiliation":[]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jicheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"28_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"5","key":"28_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"G.C. Langelaar","year":"2000","unstructured":"Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data: A satate-of-the-art overview. IEEE Signal Processing Magazine\u00a017(5), 20\u201346 (2000)","journal-title":"IEEE Signal Processing Magazine"},{"issue":"6","key":"28_CR3","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1109\/76.867936","volume":"10","author":"J.W. Huang","year":"2000","unstructured":"Huang, J.W., Shi, Y.Q., Shi, Y.: Embedding image watermarks in DC components. IEEE Transactions on Circuits and Systems for Video Technology\u00a010(6), 974\u2013979 (2000)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"28_CR4","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F. Hartung","year":"1998","unstructured":"Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing\u00a066(3), 283\u2013301 (1998)","journal-title":"Signal Processing"},{"issue":"2","key":"28_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TIFS.2007.897266","volume":"2","author":"Q. Li","year":"2007","unstructured":"Li, Q., Cox, I.J.: Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Transactions on Information Forensics and Security\u00a02(2), 127\u2013139 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"28_CR6","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TIFS.2007.908226","volume":"2","author":"W. Liu","year":"2007","unstructured":"Liu, W., Dong, L.N., Zeng, W.J.: Optimum detection for spread-spectrum watermarking that employs self-masking. IEEE Transactions on Information Forensics and Security\u00a02(4), 645\u2013654 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"28_CR7","doi-asserted-by":"publisher","first-page":"37402","DOI":"10.1117\/1.2890470","volume":"47","author":"H.Y. Huang","year":"2008","unstructured":"Huang, H.Y., Lin, Y.R., Hsu, W.H.: Robust technique for watermark embedding in a video stream based on a block-matching algorithm. Optical Engineering\u00a047(3), 037402 (14 pages) (2008)","journal-title":"Optical Engineering"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Deguillarme, F., Csurka, G., Ruanaidh, J.O., Pun, T.: Robust 3D DFT video watermarking. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose, California, vol.\u00a03657, pp. 113\u2013124 (1999)","DOI":"10.1117\/12.344662"},{"issue":"1","key":"28_CR9","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/30.663749","volume":"44","author":"C.T. Hsu","year":"1998","unstructured":"Hsu, C.T., Wu, J.L.: DCT-based watermarking for video. IEEE Transactions on Consumer Electronic\u00a044(1), 206\u2013216 (1998)","journal-title":"IEEE Transactions on Consumer Electronic"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Xu, D.W.: A blind video watermarking algorithm based on 3D wavelet transform. In: 2007 International Conference on Computational Intelligence and Security, Harbin, China, December 2007, pp. 945\u2013949 (2007)","DOI":"10.1109\/CIS.2007.123"},{"issue":"5","key":"28_CR11","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1109\/TIM.2005.855084","volume":"54","author":"S. Biswas","year":"2005","unstructured":"Biswas, S., Das, S.R., Petriu, E.M.: An adaptive compressed MPEG-2 video watermarking scheme. IEEE Transactions on Instrumentation and Measurement\u00a054(5), 1853\u20131861 (2005)","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"8","key":"28_CR12","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1109\/TCSVT.2003.815958","volume":"13","author":"A.M. Alattar","year":"2003","unstructured":"Alattar, A.M., Lin, E.T., Celik, M.U.: Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(8), 787\u2013800 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"28_CR13","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TCSII.2006.886247","volume":"54","author":"J. Zhang","year":"2007","unstructured":"Zhang, J., Anthony, T.S.H., Qiu, G., Marziliano, P.: Robust video watermarking of H.264\/AVC. IEEE Transactions on Circuits and Systems II: Express Briefs\u00a054(2), 205\u2013209 (2007)","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Piva, A., Caldelli, R., Rosa, A.D.: A DWT-based object watermarking system for MPEG-4 video streams. In: International Conference on image processing, Vancouver, Canada, September 2000, vol.\u00a03, pp. 5\u20138 (2000)","DOI":"10.1109\/ICIP.2000.899264"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Bas, P., Macq, B.: A New Video-Object Watermarking Scheme Robust To Object Manipulation. In: International Conference on image processing, Thessaloniki, Greece, pp. 526\u2013529 (2001)","DOI":"10.1109\/ICIP.2001.958544"},{"issue":"1","key":"28_CR16","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TIFS.2006.890306","volume":"2","author":"M. Noorkami","year":"2007","unstructured":"Noorkami, M., Mersereau, R.M.: A framework for robust watermarking of h.264-encoded video with controllable detection performance. IEEE Transactions on Information Forensics and Security\u00a02(1), 14\u201323 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"28_CR17","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/49.668976","volume":"16","author":"M.D. Swanson","year":"1998","unstructured":"Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications\u00a016(4), 540\u2013550 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"28_CR18","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TMM.2004.840594","volume":"7","author":"M. Barni","year":"2005","unstructured":"Barni, M., Bartolini, F., Checcacci, N.: Watermarking of MPEG-4 video objects. IEEE Transactions on Multimedia\u00a07(1), 23\u201332 (2005)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3","key":"28_CR19","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/TCSVT.2008.918446","volume":"18","author":"A. Koz","year":"2008","unstructured":"Koz, A., Alatan, A.A.: Oblivious spatio-temporal watermarking of digital video by exploiting the human visual system. IEEE Transactions on Circuits and Systems for Video Technology\u00a018(3), 326\u2013337 (2008)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"6","key":"28_CR20","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TCSVT.2005.848313","volume":"15","author":"X.K. Yang","year":"2005","unstructured":"Yang, X.K., Lin, W.S., Lu, Z.K., Ong, E.P., Yao, S.S.: Motion-compensated residue preprocessing in video coding based on just-noticeable-distortion profile. IEEE Transactions on Circuits and Systems for Video Technology\u00a015(6), 742\u2013752 (2005)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"7","key":"28_CR21","first-page":"662","volume":"20","author":"X.K. Yang","year":"2005","unstructured":"Yang, X.K., Ling, W.S., Lu, Z.K., Ong, E.P., Yao, S.S.: Just noticeable distortion model and its applications in video coding. Signal Processing: Image Communication\u00a020(7), 662\u2013680 (2005)","journal-title":"Signal Processing: Image Communication"},{"issue":"6","key":"28_CR22","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/76.475889","volume":"5","author":"C.H. Chou","year":"1995","unstructured":"Chou, C.H., Li, Y.C.: A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. IEEE Transactions on Circuits and Systems for Video Technology\u00a05(6), 467\u2013476 (1995)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"28_CR23","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/76.488822","volume":"6","author":"C.H. Chou","year":"1996","unstructured":"Chou, C.H., Chen, C.W.: A perceptually optimized 3-D subband codec for video communication over wireless channels. IEEE Transactions on Circuits and Systems for Video Technology\u00a06(2), 143\u2013156 (1996)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"28_CR24","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/30.846673","volume":"46","author":"X.M. Niu","year":"2000","unstructured":"Niu, X.M., Sun, S.H., Xiang, W.J.: Multiresolution watermarking for video based on gray-level digital watermark. IEEE Transactions on Consumer Electronics\u00a046(2), 375\u2013384 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Wang, C.K., Wang, J.M., Zhou, M., Chen, G.S.: ATBaM: An Arnold transform based method on watermarking relational data. In: 2008 International Conference on Multimedia and Ubiquitous Engineering, Seoul, Korea, April 2008, pp. 263\u2013270 (2008)","DOI":"10.1109\/MUE.2008.45"},{"issue":"1","key":"28_CR26","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TMM.2004.840617","volume":"7","author":"K. Su","year":"2005","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: Statistical invisibility for collusion-resistant digital video watermarking. IEEE Transactions on Multimedia\u00a07(1), 43\u201351 (2005)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"1","key":"28_CR27","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TMM.2004.840614","volume":"7","author":"K. Su","year":"2005","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. IEEE Transactions on Multimedia\u00a07(1), 52\u201366 (2005)","journal-title":"IEEE Transactions on Multimedia"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T12:12:38Z","timestamp":1739362358000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}