{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T03:40:16Z","timestamp":1742701216420,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642284892"},{"type":"electronic","value":"9783642284908"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28490-8_10","type":"book-chapter","created":{"date-parts":[[2012,3,14]],"date-time":"2012-03-14T06:05:53Z","timestamp":1331705153000},"page":"91-98","source":"Crossref","is-referenced-by-count":6,"title":["Motion Vector Based Information Hiding Algorithm for H.264\/AVC against Motion Vector Steganalysis"],"prefix":"10.1007","author":[{"given":"Huiyun","family":"Jing","sequence":"first","affiliation":[]},{"given":"Xin","family":"He","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"10_CR1","first-page":"337","volume":"1","author":"M.O. Medeni","year":"2010","unstructured":"Medeni, M.O., Souidi, E.M.: A novel steganographic protocol from error-correcting codes. Journal of Information Hiding and Multimedia Signal Processing\u00a01(4), 337\u2013343 (2010)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"3","key":"10_CR2","first-page":"247","volume":"2","author":"K.L. Kermanidis","year":"2011","unstructured":"Kermanidis, K.L.: Capacity-rich knowledge-poor linguistic steganography. Journal of Information Hiding and Multimedia Signal Processing\u00a02(3), 247\u2013258 (2011)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"2","key":"10_CR3","first-page":"72","volume":"1","author":"X. Huang","year":"2010","unstructured":"Huang, X., Abe, Y., Echizen, I.: Capacity adaptive synchronized acoustic steganography scheme. Journal of Information Hiding and Multimedia Signal Processing\u00a01(2), 72\u201390 (2010)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/30.663749","volume":"44","author":"C. Hsu","year":"1998","unstructured":"Hsu, C., Wu, J.: Dct-based watermarking for video. IEEE Transactions on Consumer Electronics\u00a044(1), 206\u2013216 (1998)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"6","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1109\/TIP.2006.873476","volume":"15","author":"Y. Wang","year":"2006","unstructured":"Wang, Y., Pearmain, A.: Blind mpeg-2 video watermarking robust against geometric attacks: a set of approaches in dct domain. IEEE Transactions on Image Processing\u00a015(6), 1536\u20131543 (2006)","journal-title":"IEEE Transactions on Image Processing"},{"key":"10_CR6","first-page":"27","volume":"2281","author":"F. Jordan","year":"1997","unstructured":"Jordan, F., Kutter, M., Ebrahimi, T.: Proposal of a watermarking technique for hiding\/retrieving data in compressed and decompressed video. ISO\/IEC document, JTC1\/SC29\/WG11 MPEG97\/ M\u00a02281, 27\u201331 (1997)","journal-title":"ISO\/IEC document, JTC1\/SC29\/WG11 MPEG97\/ M"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Yu, N., Li, X.: A novel video watermarking scheme in compression domain based on fast motion estimation. In: International Conference on Communication Technology, vol.\u00a02, pp. 1878\u20131882 (2003)","DOI":"10.1109\/ICCT.2003.1209894"},{"key":"10_CR8","unstructured":"Kung, C., Jeng, J., Lee, Y., Hsiao, H., Cheng, W.: Video watermarking using motion vector. In: International Conference on Computer Vision, Graphics and Image, pp. 547\u2013551 (2003)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Song, J., Liu, K.: A data embedding scheme for h. 263 compatible video coding. In: IEEE International Symposium on Circuits and Systems, vol.\u00a04, pp. 390\u2013393 (1999)","DOI":"10.1109\/ISCAS.1999.780024"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Qiu, G., Marziliano, P., Ho, A., He, D., Sun, Q.: A hybrid watermarking scheme for h. 264\/avc video. In: International Conference on Pattern Recognition, vol.\u00a04, pp. 865\u2013868 (2004)","DOI":"10.1109\/ICPR.2004.1333909"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Su, Y., Zhang, C., Zhang, C.: A video steganalytic algorithm against motion-vector-based steganography. Signal Processing (2011)","DOI":"10.1016\/j.sigpro.2011.02.012"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28490-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T03:16:04Z","timestamp":1742699764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28490-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642284892","9783642284908"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28490-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}