{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:27:23Z","timestamp":1742912843606,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275517"},{"type":"electronic","value":"9783642275524"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27552-4_113","type":"book-chapter","created":{"date-parts":[[2012,2,27]],"date-time":"2012-02-27T13:51:36Z","timestamp":1330350696000},"page":"859-866","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Watermarking Algorithm for Video Security Protection Based on H.264\/AVC"],"prefix":"10.1007","author":[{"given":"Peiming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"113_CR1","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/JPROC.2004.839623","volume":"93","author":"T.L. Eugene","year":"2005","unstructured":"Eugene, T.L., Reginald, L.L.: Advances in digital video content protection. Proceedings of the IEEE\u00a093(1), 171\u2013183 (2005)","journal-title":"Proceedings of the IEEE"},{"doi-asserted-by":"crossref","unstructured":"Lookabaugh, T., et al.: Selective Encryption for consumer applications. IEEE Communications Magazine, 124\u2013129 (May 2004)","key":"113_CR2","DOI":"10.1109\/MCOM.2004.1299355"},{"issue":"5","key":"113_CR3","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TMM.2005.854469","volume":"7","author":"C.P. Wu","year":"2005","unstructured":"Wu, C.P., Jay Kuo, C.C.: Design of intergrated multimedia compression and encryption systems. IEEE Trans. on Multimedia\u00a07(5), 828\u2013839 (2005)","journal-title":"IEEE Trans. on Multimedia"},{"doi-asserted-by":"crossref","unstructured":"Zhu, B.B., Swanson, M.D., Li, S.: Encryption and authentication for scalable multimedia: current state of the art and chanllenges. In: Proceddings of SPIE, vol.\u00a05601, pp. 157\u2013170 (2004)","key":"113_CR4","DOI":"10.1117\/12.571869"},{"doi-asserted-by":"crossref","unstructured":"Kejariwal, A.: Watermarking. IEEE Potentials (October\/November 2003)","key":"113_CR5","DOI":"10.1109\/MP.2003.1238692"},{"unstructured":"Wiegand, T., Sullivan, G.: Draft text of final draft international standard (FDIS) of joint video specification. ITU-T Rec. H.264|ISO\/IEC 14496-10 AVC, 1\u2013197 (2003)","key":"113_CR6"},{"unstructured":"ISO\/IEC 14496-10 and ITU-T Rec. H.264, Advanced video coding (2003)","key":"113_CR7"},{"doi-asserted-by":"crossref","unstructured":"Noorkami, M., Mersereau, R.M.: Compressed-domain video watermarking for H.264. In: IEEE International Conference on Image Processing ICIP 2005, September 11-14, vol.\u00a02, pp. 890\u2013893 (2005)","key":"113_CR8","DOI":"10.1109\/ICIP.2005.1530199"},{"doi-asserted-by":"crossref","unstructured":"Richardson, I.E.: H.264 and MPEG-4 Video Compression. Wiley (2004)","key":"113_CR9","DOI":"10.1002\/0470869615"},{"doi-asserted-by":"crossref","unstructured":"Imaizumi, S., et al.: Generalized hierarchical encryption of JPEG2000 code streams for access control. In: Proceedings of ICIP 2005, pp. 1094\u20131109 (2005)","key":"113_CR10","DOI":"10.1109\/ICIP.2005.1530250"}],"container-title":["Advances in Intelligent and Soft Computing","Frontiers in Computer Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27552-4_113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T15:29:05Z","timestamp":1674487745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-27552-4_113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275517","9783642275524"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27552-4_113","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2012]]}}}