{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:20:18Z","timestamp":1739424018030,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_3","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"31-44","source":"Crossref","is-referenced-by-count":0,"title":["A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking"],"prefix":"10.1007","author":[{"given":"Sam","family":"Behseta","sequence":"first","affiliation":[]},{"given":"Charles","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Joseph E.","family":"Sutton","sequence":"additional","affiliation":[]},{"given":"Robert L.","family":"Webb","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-88625-9_24","volume-title":"Information and Communications Security","author":"S. Behseta","year":"2008","unstructured":"Behseta, S., Lam, C., Webb, R.L.: A Bootstrap Attack on Digital Watermarks in the Frequency Domain. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 361\u2013375. Springer, Heidelberg (2008)"},{"issue":"10","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1393","DOI":"10.1109\/TIP.2004.834660","volume":"13","author":"J. Cannons","year":"2004","unstructured":"Cannons, J., Moulin, P.: Design and Statistical Analysis of a Hash-Aided Image Watermarking System. IEEE Trans. Image Processing\u00a013(10), 1393\u20131408 (2004)","journal-title":"IEEE Trans. Image Processing"},{"key":"3_CR3","unstructured":"Chemak, C., Bouhlel, M.-S., Lapayre, J.-C.: New Watermarking Scheme for Security and Transmission of Medical Images for PocketNeuro Project. In: Spolecnost Pro Radioelektronicke Inzenyrstvi, pp. 58\u201363 (2007)"},{"issue":"4","key":"3_CR4","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provable Good Methods for DigitalWatermarking and Information Embedding. IEEE Trans. Info. Theory\u00a047(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Info. Theory"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/11551492_20","volume-title":"Digital Watermarking","author":"P. Comesa\u00f1a","year":"2005","unstructured":"Comesa\u00f1a, P., P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F.: The Return of the Sensitivity Attack. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 260\u2013274. Springer, Heidelberg (2005)"},{"issue":"12","key":"3_CR6","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Processing"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Deguillaume, F., Csurka, G., O\u2019Ruanaidh, J., Pun, T.: Robust 3D DFT Digital Video Watermarking. In: Proceedings SPIE, vol.\u00a03657, pp. 113\u2013124 (1999)","DOI":"10.1117\/12.344662"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/S0165-1684(98)00013-9","volume":"66","author":"J.F. Delaigle","year":"1998","unstructured":"Delaigle, J.F., De Vleeschouwer, C., Macq, B.: Watermarking algorithm based on a human visual model. Signal Processing\u00a066, 319\u2013335 (1998)","journal-title":"Signal Processing"},{"issue":"12","key":"3_CR9","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TIP.2005.857263","volume":"14","author":"P. Dong","year":"2005","unstructured":"Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital Watermarks Robust to Geometric Distortions. IEEE Trans. Image Processing\u00a014(12), 2140\u20132150 (2005)","journal-title":"IEEE Trans. Image Processing"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11551492_17","volume-title":"Digital Watermarking","author":"G. Do\u00ebrr","year":"2005","unstructured":"Do\u00ebrr, G., Dugelay, J.: Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 216\u2013230. Springer, Heidelberg (2005)"},{"issue":"10","key":"3_CR11","doi-asserted-by":"publisher","first-page":"2955","DOI":"10.1109\/TSP.2004.833867","volume":"52","author":"G. Do\u00ebrr","year":"2004","unstructured":"Do\u00ebrr, G., Dugelay, J.: Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking. IEEE Trans. Signal Processing\u00a052(10), 2955\u20132964 (2004)","journal-title":"IEEE Trans. Signal Processing"},{"key":"3_CR12","first-page":"263","volume":"18","author":"G. Do\u00ebrr","year":"2003","unstructured":"Do\u00ebrr, G., Dugelay, J.: A Guide Tour of Video Watermarking. Signal Processing: Image Communication\u00a018, 263\u2013282 (2003)","journal-title":"Signal Processing: Image Communication"},{"key":"3_CR13","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970319","volume-title":"The Jackknife, the Bootstrap and other Resampling Plans","author":"B. Efron","year":"1982","unstructured":"Efron, B.: The Jackknife, the Bootstrap and other Resampling Plans. Society for Industrial and Applied Mathematics, Philadelphia (1982)"},{"key":"3_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4541-9","volume-title":"An Introduction to the Bootstrap","author":"B. Efron","year":"1993","unstructured":"Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. Chapman & Hall, New York (1993)"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/3-540-48910-X_10","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"F. Ergun","year":"1999","unstructured":"Ergun, F., Kilian, J., Kumar, R.: A Note on the Limits of Collusion-Resistant Watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 140\u2013149. Springer, Heidelberg (1999)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/11551492_16","volume-title":"Digital Watermarking","author":"T. Furon","year":"2005","unstructured":"Furon, T.: A Survey of Watermarking Security. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 201\u2013215. Springer, Heidelberg (2005)"},{"key":"3_CR17","unstructured":"Khayam, S.A.: The Discrete Cosine Transform (DCT): Theory and Application. Michigan State University (2003)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Kuttera, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Proc. of SPIE Security and Watermarking of Multimedia Contents, pp. 226\u2013239 (1999)","DOI":"10.1117\/12.344672"},{"key":"3_CR19","unstructured":"Li, Y., Gao, X., Ji, H.: A 3D Wavelet based Spatial-temporal Approach for Video Watermarking. In: ICCIMA 2003. Fifth International Conference on Computational Intelligence and Multimedia Applications, pp. 260\u2013265 (2003)"},{"issue":"4","key":"3_CR20","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/79.939835","volume":"18","author":"C.I. Podilchuk","year":"2001","unstructured":"Podilchuk, C.I., Delp, E.J.: Digital Watermarking: Algorithms and Applications. Signal Processing Magazine\u00a018(4), 33\u201346 (2001)","journal-title":"Signal Processing Magazine"},{"key":"3_CR21","volume-title":"The Jackknife and Bootstrap","author":"J. Shao","year":"2005","unstructured":"Shao, J., Tu, D.: The Jackknife and Bootstrap. Springer, New York (2005)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Simpson, W.: Video Over IP. Focal Press (2005)","DOI":"10.4324\/9780080492421"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/11551492_18","volume-title":"Digital Watermarking","author":"M. Soriano","year":"2005","unstructured":"Soriano, M., Fernandez, M., Cotrina, J.: Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 231\u2013243. Springer, Heidelberg (2005)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: A Novel Approach to Collusion-resistant Video Watermarking. In: Proceedings SPIE, vol.\u00a04675, pp. 491\u2013502 (2002)","DOI":"10.1117\/12.465307"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks. In: Proceedings. 2001 International Conference on Image Processing, vol.\u00a01, pp. 818\u2013821 (2001)","DOI":"10.1109\/ICIP.2001.959171"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/11551492_19","volume-title":"Digital Watermarking","author":"J.E. Vila-Forc\u00e9n","year":"2005","unstructured":"Vila-Forc\u00e9n, J.E., Voloshynovskiy, S., Koval, O., P\u00e9rez-Gonz\u00e1lez, F., Pun, T.: Practical Data-Hiding: Additive Attacks Performance Analysis. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 244\u2013259. Springer, Heidelberg (2005)"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11551492_12","volume-title":"Digital Watermarking","author":"P. Vinod","year":"2005","unstructured":"Vinod, P., Bora, P.K.: A New Inter-Frame Collusion Attack and a Countermeasure. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 147\u2013157. Springer, Heidelberg (2005)"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Vinod, P., Bora, P.K.: Motion-compensated Inter-Frame collusion attack on video watermarking and a countermeasure. IEEE Proceedings on Information Security\u00a0153(2), 61\u201373","DOI":"10.1049\/ip-ifs:20055088"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Wang, J., Gao, X., Shong, J.: A Video Watermarking based on 3-D Complex Wavelet. In: ICIP 2007, IEEE International Conference on Image Processing, vol.\u00a05, pp. 493\u2013496 (2007)","DOI":"10.1109\/ICIP.2007.4379873"},{"issue":"7","key":"3_CR30","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/5.771067","volume":"87","author":"R.B. Wolfgang","year":"1999","unstructured":"Wolfgang, R.B., Podilchuk, C.I., Delp, E.J.: Perceptual Watermarks for Digital Images and Video. Proceedings of IEEE\u00a087(7), 1108\u20131126 (1999)","journal-title":"Proceedings of IEEE"},{"issue":"4","key":"3_CR31","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/76.767121","volume":"9","author":"W. Zhu","year":"1999","unstructured":"Zhu, W., Xiong, Z., Zhang, Y.: Multiresolution Watermarking for Images and Video. IEEE Transactions on Circuits and Systems for Video Technology\u00a09(4), 545\u2013550 (1999)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T12:12:58Z","timestamp":1739362378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}