{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:25:22Z","timestamp":1742966722285,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623769"},{"type":"electronic","value":"9789811623776"}],"license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2377-6_31","type":"book-chapter","created":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T01:44:09Z","timestamp":1632447849000},"page":"325-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Implementation-Free Forensic Watermarking for Adaptive Streaming with A\/B Watermarking"],"prefix":"10.1007","author":[{"given":"Hannes","family":"Mareen","sequence":"first","affiliation":[]},{"given":"Glenn","family":"Van Wallendael","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Lambert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Jarnikov D, Hietbrink E, Arana M, Doumene JM (2014) A watermarking system for adaptive streaming. In: Proceedings of the IEEE international conference on consumer electronics (ICCE), pp 375\u2013377, Jan 2014","key":"31_CR1","DOI":"10.1109\/ICCE.2014.6776048"},{"unstructured":"Mathew R, Cushing C (2020) Netflix to slash traffic across Europe to relieve virus strain on internet providers. https:\/\/www.reuters.com\/article\/idUSKBN21906P. Posted 22 Mar 2020, Accessed 17 Aug 2020","key":"31_CR2"},{"doi-asserted-by":"crossref","unstructured":"Kim KS, Lee HY, Im DH, Lee HK (2008) Practical, real-time, and robust watermarking on the spatial domain for high-definition video contents. IEICE Trans Inf Syst E91-D(5):1359\u20131368","key":"31_CR3","DOI":"10.1093\/ietisy\/e91-d.5.1359"},{"issue":"1","key":"31_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/TIFS.2009.2038761","volume":"5","author":"A Piva","year":"2010","unstructured":"Piva A, Bianchi T, Rosa AD (2010) Secure client-side ST-DM watermark embedding. IEEE Trans Inf Forensics Secur 5(1):13\u201326","journal-title":"IEEE Trans Inf Forensics Secur"},{"unstructured":"Fautier T (2020) Ultra HD Forum guidelines, v2.2. Technical report, Ultra HD Forum","key":"31_CR5"},{"unstructured":"Liu J, He X (2005) A review study on digital watermarking. In: Proceedings of the international conference on information communication technologies, ICICT 2005, pp 337\u2013341","key":"31_CR6"},{"issue":"9","key":"31_CR7","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"M Asikuzzaman","year":"2018","unstructured":"Asikuzzaman M, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 28(9):2131\u20132153","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"12","key":"31_CR8","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"31_CR9","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M Barni","year":"1998","unstructured":"Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking. Signal Process 66(3):357\u2013372","journal-title":"Signal Process"},{"doi-asserted-by":"crossref","unstructured":"Islam SMM, Debnath R, Hossain SKA (2007) DWT based digital watermarking technique and its robustness on image rotation, scaling, JPEG compression, cropping and multiple watermarking. Proceedings of the international conference on information communication technologies, ICICT 2007, pp 246\u2013249","key":"31_CR10","DOI":"10.1109\/ICICT.2007.375386"},{"issue":"9","key":"31_CR11","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/TIFS.2014.2338274","volume":"9","author":"M Asikuzzaman","year":"2014","unstructured":"Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Trans Inf Forensics Secur 9(9):1502\u20131517","journal-title":"IEEE Trans Inf Forensics Secur"},{"doi-asserted-by":"crossref","unstructured":"Meerwald P, Uhl A (2011) Robust watermarking of H.264\/SVC-encoded video: quality and resolution scalability. In: Proceedings of the international conference on digital watermarking, IWDW\u201910. Springer, Berlin, Heidelberg, pp 159\u2013169","key":"31_CR12","DOI":"10.1007\/978-3-642-18405-5_13"},{"doi-asserted-by":"crossref","unstructured":"Aparna J, Ayyappan S(2015) Image watermarking using Diffie Hellman key exchange algorithm. Procedia Comput Sci 46:1684\u20131691. Proceedings of the international conference on information communication technologies, ICICT 2014","key":"31_CR13","DOI":"10.1016\/j.procs.2015.02.109"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.image.2016.06.003","volume":"47","author":"AM Buhari","year":"2016","unstructured":"Buhari AM, Ling HC, Baskaran VM, Wong K (2016) Fast watermarking scheme for real-time spatial scalable video coding. Signal Process Image Commun 47:86\u201395","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"31_CR15","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/TIFS.2008.927421","volume":"3","author":"LE Coria","year":"2008","unstructured":"Coria LE, Pickering MR, Nasiopoulos P, Ward RK (2008) A video watermarking scheme based on the dual-tree complex wavelet transform. IEEE Trans Inf Forensics Secur 3(3):466\u2013474","journal-title":"IEEE Trans Inf Forensics Secur"},{"doi-asserted-by":"crossref","unstructured":"Chen W, Shahid Z, St\u00fctz T, Autrusseau F, Le\u00a0Callet P (2014) Robust drift-free bit-rate preserving H.264 watermarking. Multimed Syst 20(2):179\u2013193","key":"31_CR16","DOI":"10.1007\/s00530-013-0329-x"},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"63700","DOI":"10.1109\/ACCESS.2020.2984354","volume":"8","author":"H Mareen","year":"2020","unstructured":"Mareen H, Courteaux M, De Praeter J, Asikuzzaman M, Van Wallendael G, Lambert P (2020) Rate-distortion-preserving forensic watermarking using quantization parameter variation. IEEE Access 8:63700\u201363709","journal-title":"IEEE Access"},{"issue":"9","key":"31_CR18","doi-asserted-by":"publisher","first-page":"3841","DOI":"10.1109\/TIP.2014.2336550","volume":"23","author":"B Li","year":"2014","unstructured":"Li B, Li H, Li L, Zhang J (2014) $$\\lambda $$ domain rate control algorithm for high efficiency video coding. IEEE Trans Image Process 23(9):3841\u20133854","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"31_CR19","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/JSTSP.2016.2634458","volume":"11","author":"I Zupancic","year":"2017","unstructured":"Zupancic I, Naccari M, Mrak M, Izquierdo E (2017) Two-pass rate control for improved quality of experience in UHDTV delivery. IEEE J Sel Top Signal Process 11(1):167\u2013179","journal-title":"IEEE J Sel Top Signal Process"},{"key":"31_CR20","volume-title":"Digital watermarking and steganography","author":"I Cox","year":"2008","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA","edition":"2"},{"key":"31_CR21","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-030-11389-6_9","volume-title":"Digital forensics and watermarking, IWDW\u201918","author":"H Mareen","year":"2019","unstructured":"Mareen H, De Praeter J, Van Wallendael G, Lambert P (2019) Traitor tracing after visible watermark removal. In: Yoo CD, Shi YQ, Kim HJ, Piva A, Kim G (eds) Digital forensics and watermarking, IWDW\u201918. Springer International Publishing, Cham, pp 110\u2013123"},{"doi-asserted-by":"crossref","unstructured":"Urvoy M, Autrusseau F (2014) Application of Grubbs\u2019 test for outliers to the detection of watermarks. In: Proceedings of the ACM workshop on information hiding multimedia security (IH&MMSec). Association for Computing Machinery, New York, NY, USA, pp 49\u201360","key":"31_CR22","DOI":"10.1145\/2600918.2600931"},{"issue":"3","key":"31_CR23","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCE.2018.2852258","volume":"64","author":"H Mareen","year":"2018","unstructured":"Mareen H, De Praeter J, Van Wallendael G, Lambert P (2018) A novel video watermarking approach based on implicit distortions. IEEE Trans Consum Electron 64(3):250\u2013258","journal-title":"IEEE Trans Consum Electron"},{"unstructured":"Kalker T, Linnartz J, Depovere G, Maes M (1998) On the reliability of detecting electronic watermarks in digital images. In: Proceedings of the European Signal Processing Conference (EUSIPCO), pp 1\u20134, Sept 1998","key":"31_CR24"},{"doi-asserted-by":"crossref","unstructured":"Miller ML, Bloom JA (1999) Computing the probability of false watermark detection. In: Proceedings of the international workshop on information hiding, pp 146\u2013158","key":"31_CR25","DOI":"10.1007\/10719724_11"},{"unstructured":"Bossen F (2013) Common test conditions and software reference configurations. Technical report, JCTVC-L1100, ITU-T Joint Collaborative Team on Video Coding (JCT-VC), Jan 2013","key":"31_CR26"},{"unstructured":"Bj\u00f8ntegaard G (2001) Calculation of average PSNR differences between RD-curves. Technical report, VCEG-M33, ITU-T Video Coding Experts Group (VCEG), Apr 2001","key":"31_CR27"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2377-6_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T18:12:19Z","timestamp":1644430339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2377-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"ISBN":["9789811623769","9789811623776"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2377-6_31","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"24 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}