{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T00:44:36Z","timestamp":1649119476090},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,9,15]],"date-time":"2013-09-15T00:00:00Z","timestamp":1379203200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s10207-013-0211-z","type":"journal-article","created":{"date-parts":[[2013,9,14]],"date-time":"2013-09-14T03:13:50Z","timestamp":1379128430000},"page":"81-93","source":"Crossref","is-referenced-by-count":2,"title":["Perceptual hash function for scalable video"],"prefix":"10.1007","volume":"13","author":[{"given":"Navajit","family":"Saikia","sequence":"first","affiliation":[]},{"given":"Prabin K.","family":"Bora","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,15]]},"reference":[{"key":"211_CR1","doi-asserted-by":"crossref","unstructured":"Kalker, T., Haitsma, J., Oostveen, J.: Issues with digital watermarking and perceptual hashing. In: Proceedings of the SPIE Multimedia Systems Appl. IV, Denver, CO. 4518, 189\u2013197 (Aug 2001)","DOI":"10.1117\/12.448203"},{"issue":"1","key":"211_CR2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10207-009-0093-2","volume":"9","author":"S-H Han","year":"2010","unstructured":"Han, S.-H., Chu, C.-H.: Content-based image authentication: current status, issues and challenges. Springer Int. J. Inf. Secur. 9(1), 19\u201332 (2010)","journal-title":"Springer Int. J. Inf. Secur."},{"issue":"9","key":"211_CR3","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/TCSVT.2007.906828","volume":"17","author":"N Adami","year":"2007","unstructured":"Adami, N., Signoroni, A., Leonardi, R.: State-of-the-art and trends in scalable video compression with wavelet-based approaches. IEEE Trans. Circuits Syst. Video Tech. 17(9), 1238\u20131255 (2007)","journal-title":"IEEE Trans. Circuits Syst. Video Tech."},{"issue":"1","key":"211_CR4","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s11042-006-0074-7","volume":"34","author":"PK Atrey","year":"2007","unstructured":"Atrey, P.K., Yan, W.Q., Kankanhalli, M.S.: A scalable signature scheme for video authentication. Springer J. Multimed. Tools Appl. 34(1), 107\u2013135 (2007)","journal-title":"Springer J. Multimed. Tools Appl."},{"key":"211_CR5","doi-asserted-by":"crossref","first-page":"4020","DOI":"10.1109\/TSP.2005.855414","volume":"53","author":"CD Roover","year":"2005","unstructured":"Roover, C.D., Vleeschouwer, C.D., Lefebvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Trans. Signal Process. 53, 4020\u20134037 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"211_CR6","doi-asserted-by":"crossref","unstructured":"Oostveen, J., Kalker, T., Haitsma, J.: Visual hashing of digital video: applications and techniques. In: Proceedings of the SPIE Application of Digital Image Processing XXIV, San Diego, CA 4472, 121\u2013131 (July\/Aug 2001)","DOI":"10.1117\/12.449746"},{"key":"211_CR7","unstructured":"Uehara, T., Safavi-Naini, R., Ogunbona, P.: An MPEG tolerant authentication system for video data. In: Proceedings of the IEEE International Conference Multimedia Expo, Taipei, pp. 891\u2013894 (June 2004)"},{"issue":"10","key":"211_CR8","doi-asserted-by":"crossref","first-page":"1232","DOI":"10.1109\/TCSVT.2006.882540","volume":"16","author":"Q Sun","year":"2006","unstructured":"Sun, Q., He, D., Tian, Q.: A secure and robust authentication scheme for video transcoding. IEEE Trans. Circuits Syst. Video Tech. 16(10), 1232\u20131244 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Tech."},{"issue":"6","key":"211_CR9","doi-asserted-by":"crossref","first-page":"1190","DOI":"10.1109\/TMM.2006.884614","volume":"8","author":"B Coskun","year":"2006","unstructured":"Coskun, B., Sankur, B., Memon, N.: Spatio-temporal transform based video hashing. IEEE Trans. Multimed. 8(6), 1190\u20131208 (2006)","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"211_CR10","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/TMM.2005.846776","volume":"7","author":"Q Sun","year":"2005","unstructured":"Sun, Q., Chang, S.-F.: A secure and robust digital signature scheme for JPEG2000 image authentication system. IEEE Trans. Multimed. 7(3), 480\u2013494 (2005)","journal-title":"IEEE Trans. Multimed."},{"issue":"2","key":"211_CR11","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MSP.2003.1184336","volume":"20","author":"A Vetro","year":"2003","unstructured":"Vetro, A., Christopoulos, C., Sun, H.: Video transcoding architectures and techniques: an overview. IEEE Signal Process. Mag. 20(2), 18\u201329 (2003)","journal-title":"IEEE Signal Process. Mag."},{"issue":"8","key":"211_CR12","doi-asserted-by":"crossref","first-page":"1374","DOI":"10.1109\/76.889025","volume":"10","author":"B-J Kim","year":"2000","unstructured":"Kim, B.-J., Xiong, Z., Pearlman, W.A.: Low bit-rate scalable video coding with 3-D set partitioning in hierarchical trees (3-D SPIHT). IEEE Trans. Circuits Syst. Video Tech. 10(8), 1374\u20131387 (2000)","journal-title":"IEEE Trans. Circuits Syst. Video Tech."},{"key":"211_CR13","unstructured":"Danyali, H., Mertins, A.: A fully SNR, spatial and temporal scalable 3DSPIHT-based video coding algorithm for video streaming over heterogeneous networks. In: Proceedings of the IEEE International Conference Convergent Technologies Asia-Pacific Region, Bangalore 4, 1445\u20131449 (Oct 2003)"},{"key":"211_CR14","unstructured":"Bottreau, V., Benetiere, M., Felts, B., Pesquet-Popescu, B.: A fully scalable 3D subband video codec. In: Proceedings of the IEEE International Conference Image Processing, Thessaloniki, 2, 1017\u20131020 (July 2001)"},{"key":"211_CR15","volume-title":"Wavelets and Filter Banks","author":"G Strang","year":"1996","unstructured":"Strang, G., Nguyen, T.Q.: Wavelets and Filter Banks. Wellesley-Cambridge Press, MA (1996)"},{"key":"211_CR16","doi-asserted-by":"crossref","unstructured":"Coskun, B., Memon, N.: Confusion\/ diffusion capabilities of some robust hash functions. In: Proceedings of the IEEE 40th Annual Conference Information Sciences Systems. Princeton, NJ, pp. 1188\u20131193 (March 2006)","DOI":"10.1109\/CISS.2006.286645"},{"key":"211_CR17","volume-title":"Digital Signal Processing: Principles, Algorithms, and Applications","author":"JG Proakis","year":"1996","unstructured":"Proakis, J.G., Manolakis, D.G.: Digital Signal Processing: Principles, Algorithms, and Applications. Prentice-Hall, NJ (1996)"},{"key":"211_CR18","unstructured":"Tao, Y., Muthukkumarasamy, V., Verma, B., Blumenstein, M.: A texture feature extraction technique using 2D-DFT and hamming distance. In: Proceedings of the IEEE International Conference on Computational Intelligence Multimedia Applications, Xi\u2019an, pp. 120\u2013125 (Sept 2003)"},{"key":"211_CR19","volume-title":"Digital Image Processing and Analysis","author":"Mazumdar D Dutta","year":"2000","unstructured":"Dutta, Mazumdar D., Chanda, B.: Digital Image Processing and Analysis. Prentice-Hall of India, New Delhi (2000)"},{"key":"211_CR20","volume-title":"Fundamentals of Digital Image Processing","author":"AK Jain","year":"1989","unstructured":"Jain, A.K.: Fundamentals of Digital Image Processing. Englewood Cliffs, NJ (1989)"},{"key":"211_CR21","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/83.136597","volume":"1","author":"M Antonini","year":"1992","unstructured":"Antonini, M., Barlaud, M., Mathieu, P., Daubechies, I.: Image coding using wavelet transform. IEEE Trans. Image Process. 1, 205\u2013220 (1992)","journal-title":"IEEE Trans. Image Process."},{"key":"211_CR22","doi-asserted-by":"crossref","unstructured":"Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proceeding of the SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA 6072, pp. 607218 (Feb 2006)","DOI":"10.1117\/12.643053"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0211-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-013-0211-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0211-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T23:32:09Z","timestamp":1563924729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-013-0211-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,15]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["211"],"URL":"https:\/\/doi.org\/10.1007\/s10207-013-0211-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,15]]}}}