{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:12:22Z","timestamp":1761988342539,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176968"},{"type":"electronic","value":"9783642176975"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17697-5_14","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T07:22:58Z","timestamp":1291706578000},"page":"270-292","source":"Crossref","is-referenced-by-count":6,"title":["NPT Based Video Watermarking with Non-overlapping Block Matching"],"prefix":"10.1007","author":[{"given":"S. S.","family":"Bedi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shekhar","family":"Verma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Geetam S.","family":"Tomar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"7","key":"14_CR1","doi-asserted-by":"publisher","first-page":"1785","DOI":"10.1109\/TIP.2010.2045024","volume":"19","author":"A. Koz","year":"2010","unstructured":"Koz, A., Cigla, C., Alatan, A.A.: Watermarking of Free-view Video. IEEE Transactions on Image Processing\u00a019(7), 1785\u20131797 (2010)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"10","key":"14_CR2","doi-asserted-by":"publisher","first-page":"2955","DOI":"10.1109\/TSP.2004.833867","volume":"52","author":"G. Doerr","year":"2004","unstructured":"Doerr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, part 2\u00a052(10), 2955\u20132964 (2004)","journal-title":"IEEE Transactions on Signal Processing, part 2"},{"key":"14_CR3","unstructured":"Barni, M., Bartolini, F., Caldelli, R., De Rosa, A., Piva, A.: A robust watermarking approach for raw video. In: Proceedings of the 10th International Packet Video Workshop (2000)"},{"issue":"3","key":"14_CR4","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F. Hartung","year":"1998","unstructured":"Hartung, F., Girod, B.: Watermarking of Uncompressed and Compressed Video. Signal Processing\u00a066(3), 283\u2013301 (1998)","journal-title":"Signal Processing"},{"issue":"1","key":"14_CR5","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/83.892451","volume":"10","author":"G. Langelaar","year":"2001","unstructured":"Langelaar, G., Lagendijk, R.: Optimal differential energy watermarking of DCT encoded images and video. IEEE Transactions on Image Processing\u00a010(1), 148\u2013158 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Lu, C.-S., Chen, J.-R., Liao, H.-Y.M., Fan, K.-C.: Realtime MPEG-2 video watermarking in the VLC domain. In: Proceedings 16th International Conference on Pattern Recognition, vol.\u00a02, pp. 552\u2013555 (2002)","DOI":"10.1109\/ICPR.2002.1048363"},{"issue":"4","key":"14_CR7","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1006\/jvci.1998.0397","volume":"9","author":"C. Langelaar Gerrit","year":"1998","unstructured":"Langelaar Gerrit, C., Lagendijk Reginald, L.: Real-time Labeling of MPEG-2 Compressed Video. J. Visual Communications and Image Representation\u00a09(4), 256\u2013270 (1998)","journal-title":"J. Visual Communications and Image Representation"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A video watermarking system for broadcast monitoring. In: Proceeding of SPIE- Security Watermarking Multimedia Contents, vol.\u00a03657, pp. 103\u2013112 (1999)","DOI":"10.1117\/12.344661"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Fridich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceeding Conference Information Technology: Coding and Computing, pp. 178\u2013183 (2000)","DOI":"10.1109\/ITCC.2000.844203"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Petitcolas, F., Anderson, R.: Evaluation of Copyright Marking Systems. In: Proceedings IEEE multimedia Systems (ICMCS 1999), Florence, Italy, June 7-11 (1999)","DOI":"10.1109\/MMCS.1999.779264"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/83.967401","volume":"10","author":"V. Solachidis","year":"2001","unstructured":"Solachidis, V., Pitas, I.: Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Transaction Image Processing\u00a010, 1741\u20131753 (2001)","journal-title":"IEEE Transaction Image Processing"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Duan, F., King, I., Xu, L., Chan, L.: Intra-block algorithm for digital watermarking. In: Proceedings IEEE 14th International Conference on Pattern Recognition (ICPR 1998), vol.\u00a02, pp. 1589\u20131591 (1998)","DOI":"10.1109\/ICPR.1998.712016"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/TLA.2010.5538406","volume":"8","author":"R. Reyes","year":"2010","unstructured":"Reyes, R., Cruz, C., Nakano-Miyatake, M., P\u00e9rez-Meana, H.: Digital Video Watermarking in DWT Domain Using Chaotic Mixtures. IEEE Latin America Transactions\u00a08, 304\u2013310 (2010)","journal-title":"IEEE Latin America Transactions"},{"issue":"6","key":"14_CR14","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/83.846253","volume":"9","author":"S. Pereira","year":"2000","unstructured":"Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Transactions on Image Processing\u00a09(6), 1123\u20131129 (2000)","journal-title":"IEEE Transactions on Image Processing"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Swanson, M., Zhu, B., Tewfik, A.: Multiresolution Video Watermarking using Perceptual Models and Scene Segmentation. In: Proceedings International Conference on Image Processing (ICIP 1997), Washington, DC, vol.\u00a02, pp. 551\u2013568 (1997)","DOI":"10.1109\/ICIP.1997.638832"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-540-39927-8_19","volume-title":"Information and Communications Security","author":"P.W. Chan","year":"2003","unstructured":"Chan, P.W., Lyu, M.: A DWT-based Digital Video Watermarking Scheme with Error Correcting Code. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 202\u2013213. Springer, Heidelberg (2003)"},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/35.940053","volume":"39","author":"S. Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Periera, S., Pun, T., Eggers, J., Su, J.: Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarking. IEEE Communication Magazine\u00a039, 118\u2013126 (2001)","journal-title":"IEEE Communication Magazine"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/83.846253","volume":"9","author":"S. Pireira","year":"2000","unstructured":"Pireira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Transaction on Image Processing\u00a09, 1123\u20131129 (2000)","journal-title":"IEEE Transaction on Image Processing"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Holliman, M., Macy, W., Yeung, M.: Robust frame-dependent video watermarking. In: Proceedings of the SPIE Security and Watermarking of Multimedia Contents, San Jose, January 24-26, vol.\u00a03971, pp. 186\u2013197 (2000)","DOI":"10.1117\/12.384972"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Verma, S., Chandra, R., Tomar, G.S., Kim, J.: Video watermark embedding in the compressed domain. In: IET International Conference on Visual Information Engineering, VIE 2006, pp. 53\u201357 (2006)","DOI":"10.1049\/cp:20060501"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A video watermarking system for broadcast monitoring. In: Proceeding of SPIE, vol.\u00a03657, pp. 103\u2013112 (1999)","DOI":"10.1117\/12.344661"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Mobasseri, B.G.: Exploring CDMA for watermarking of digital video. In: Proceeding of SPIE, vol.\u00a03657, pp. 96\u2013102 (1999)","DOI":"10.1117\/12.344660"},{"issue":"4","key":"14_CR23","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/49.668976","volume":"16","author":"M.D. Swanson","year":"1998","unstructured":"Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution Scene-Based Video Watermarking Using Perceptual Models. IEEE Journal on Selected Areas in Communications\u00a016(4), 540\u2013550 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Darmstaedtev, V., Delaigle, J.F., Nicholson, D., Macq, B.: A block based watermarking technique for MPEG-2 Signals: Optimization and validation on real TV distribution links. In: Proceeding of European Guf Multimedia Applications, Services and Techniques EC MAST, Berlm, Germany (1998)","DOI":"10.1007\/3-540-64594-2_95"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Robust bit extraction from images. In: Proceeding of IEEE International Conference on Multimedia Computing and Systems, vol.\u00a02, pp. 536\u2013540 (1999)","DOI":"10.1109\/MMCS.1999.778542"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Visual hash for oblivious watermarking. In: Proceeding of SPIE, Security and Watermarking of Multimedia Contents III, vol.\u00a04314, pp. 286\u2013294 (2000)","DOI":"10.1117\/12.384982"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Kundur, D., Hatzinakos, D.: Attack characterization for effective watermarking. In: Proceeding IEEE International Conference on Image Processing, vol.\u00a04, pp. 240\u2013244 (1999)","DOI":"10.1109\/ICIP.1999.822892"},{"issue":"1","key":"14_CR28","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TIFS.2005.863505","volume":"1","author":"C. Fei","year":"2006","unstructured":"Fei, C., Kundur, D., Kwong, R.: Analysis and Design of Secure Watermark-based Authentication Systems. IEEE Transactions on Information Forensics and Security\u00a01(1), 43\u201355 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"14_CR29","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TMM.2004.840614","volume":"7","author":"K. Su","year":"2005","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: Spatially Localized Image-Dependent Watermarking for Statistical Invisibility and Collusion Resistance. IEEE Transaction on Multimedia\u00a07(1), 52\u201366 (2005)","journal-title":"IEEE Transaction on Multimedia"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, J., Li, J., Zhang, L.: Video watermark technique in Motion Vector. In: Proceeding of IEEE 14th Brazilian Symposium on Computer Graphics and Image Processing, Brazil, pp. 535\u2013540 (2001)","DOI":"10.1109\/SIBGRAPI.2001.963053"},{"issue":"5","key":"14_CR31","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1109\/TIM.2005.855084","volume":"54","author":"S. Biswas","year":"2005","unstructured":"Biswas, S., Das, S.R., Petriu, E.M.: An adaptive compressed. MPEG-2 video watermarking scheme. IEEE Transactions on. Instrumentation and Measurement\u00a054(5), 1853\u20131861 (2005)","journal-title":"IEEE Transactions on. Instrumentation and Measurement"},{"issue":"5","key":"14_CR32","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/LSP.2005.845606","volume":"12","author":"B.G. Mobasseri","year":"2005","unstructured":"Mobasseri, B.G., Berger, R.J.: A foundation for watermarking in compressed domain. IEEE Signal Processing Letters\u00a012(5), 399\u2013402 (2005)","journal-title":"IEEE Signal Processing Letters"},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.dsp.2004.08.002","volume":"14","author":"A.M. Ahmed","year":"2004","unstructured":"Ahmed, A.M., Day, D.D.: Applications of the naturalness preserving transform to image watermarking and data hiding. Digital Signal Processing\u00a014, 531\u2013549 (2004)","journal-title":"Digital Signal Processing"},{"issue":"2","key":"14_CR34","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TIP.2004.823830","volume":"13","author":"D. Kundur Fei","year":"2004","unstructured":"Kundur Fei, D., Kwong, R.: Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression. IEEE Transactions on Image Processing\u00a013(2), 126\u2013144 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"key":"14_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/3-540-61996-8_42","volume-title":"Information Hiding","author":"J.R. Smith","year":"1996","unstructured":"Smith, J.R., Camiskey, B.O.: Modulation and information hiding in images. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 207\u2013226. Springer, Heidelberg (1996)"},{"issue":"1","key":"14_CR36","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TMM.2004.840614","volume":"7","author":"K. Su","year":"2005","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: Statistical invisibility for collusion-resistant digital video watermarking. IEEE Transaction on Multimedia\u00a07(1), 52\u201360 (2005)","journal-title":"IEEE Transaction on Multimedia"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Ji-Hua, G., Shang, Y., Bei-jing, H.: An NPT Watermarking Algorithm Using Wavelet Image Combination. In: Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI), pp. 378\u2013438 (2010)","DOI":"10.1109\/IITSI.2010.116"},{"issue":"3","key":"14_CR38","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1109\/18.256521","volume":"39","author":"K.H. Biyari","year":"1993","unstructured":"Biyari, K.H., Lindsey, W.C.: Statistical distribution of hermitian quadratic forms in complex Gaussian variables. IEEE Trans. Inform. Theory\u00a039(3), 1076\u20131082 (1993)","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science XI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17697-5_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T14:07:15Z","timestamp":1740751635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17697-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176968","9783642176975"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17697-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}