{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T03:06:46Z","timestamp":1763867206247},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,5,6]],"date-time":"2017-05-06T00:00:00Z","timestamp":1494028800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s11042-017-4754-2","type":"journal-article","created":{"date-parts":[[2017,5,6]],"date-time":"2017-05-06T14:06:48Z","timestamp":1494079608000},"page":"8603-8627","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["A robust and secure key-frames based video watermarking system using chaotic encryption"],"prefix":"10.1007","volume":"77","author":[{"given":"Yassine","family":"Himeur","sequence":"first","affiliation":[]},{"given":"Abdelkrim","family":"Boukabou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,6]]},"reference":[{"issue":"6","key":"4754_CR1","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1016\/j.ipm.2014.07.001","volume":"50","author":"HA Abdallah","year":"2014","unstructured":"Abdallah HA, Ghazy RA, Kasban H, Faragallah OS, Shaalan AA, Hadhoud MM, Dessouky MI, El-Fishawy NA, Alshebeili SA, Abd El-samie FE (2014) Homomorphic image watermarking with a singular value decomposition algorithm. Inf Process Manag 50(6):909\u2013923","journal-title":"Inf Process Manag"},{"issue":"14","key":"4754_CR2","doi-asserted-by":"crossref","first-page":"8745","DOI":"10.1007\/s11042-015-2789-9","volume":"75","author":"L Agilandeeswari","year":"2016","unstructured":"Agilandeeswari L, Ganesan K (2016) A robust color video watermarking scheme based on hybrid embedding techniques. Multimed Tools Appl 75(14):8745\u20138780","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"4754_CR3","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.patrec.2010.08.004","volume":"32","author":"SEF Avila","year":"2011","unstructured":"Avila SEF, Lopes APB (2011) VSUMM: a mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recogn Lett 32(1):56\u201368","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"4754_CR4","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1007\/s11042-012-1238-2","volume":"71","author":"H Chen","year":"2014","unstructured":"Chen H, Zhu Y (2014) A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique. Multimed Tools Appl 71(3):991\u20131012","journal-title":"Multimed Tools Appl"},{"key":"4754_CR5","unstructured":"Cisco visual networking index (2012) Forecast and methodology, 2011\u20132016, Cisco Systems Inc."},{"key":"4754_CR6","doi-asserted-by":"crossref","unstructured":"Cox IJ, Miller ML, Bloom JA, Kalker T, Fridrich J (2008) Digital watermarking and steganography. Morgan Kaufmann","DOI":"10.1016\/B978-012372585-1.50015-2"},{"issue":"11","key":"4754_CR7","doi-asserted-by":"crossref","first-page":"3742","DOI":"10.1109\/TIP.2015.2445572","volume":"24","author":"C Dang","year":"2015","unstructured":"Dang C, Radha H (2015) RPCA-KFE: key frame extraction for video using robust principal component analysis. IEEE Trans Image Proc 24(11):3742\u201353","journal-title":"IEEE Trans Image Proc"},{"issue":"4","key":"4754_CR8","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1109\/TIFS.2014.2302899","volume":"9","author":"X Dawen","year":"2014","unstructured":"Dawen X, Rangding W, Shi YQ (2014) Data hiding in encrypted h.264\/AVC video streams by codeword substitution. IEEE Trans Inf Forensics Security 9(4):596\u2013606","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"4754_CR9","doi-asserted-by":"crossref","unstructured":"Dutta T, Sur A, Nandi S (2013) Mcrd: motion coherent region detection in h.264 compressed video. In: Proceedings international conference on multimedia and expo (ICME). San Jose, CA, USA, pp 1\u20136","DOI":"10.1109\/ICME.2013.6607430"},{"key":"4754_CR10","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1016\/j.compeleceng.2013.10.005","volume":"40","author":"N Ejaz","year":"2014","unstructured":"Ejaz N, Mehmood I, Baik SW (2014) Feature aggregation based visual attention model for video summarization. Comput Electr Eng 40:993\u20131005","journal-title":"Comput Electr Eng"},{"issue":"3","key":"4754_CR11","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1007\/s11042-010-0580-5","volume":"55","author":"M El\u2019Arbi","year":"2011","unstructured":"El\u2019Arbi M, Koubaa M, Charfeddine M, Ben Amar C (2011) A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multimed Tools Appl 55(3):579\u2013600","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"4754_CR12","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.aeue.2012.07.010","volume":"67","author":"OS Faragallah","year":"2013","unstructured":"Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. Int J Electron Commun (AE\u00dc) 67(3):189\u2013196","journal-title":"Int J Electron Commun (AE\u00dc)"},{"key":"4754_CR13","unstructured":"FIPS PUB 197 (2001) Advanced encryption standard. New York"},{"key":"4754_CR14","unstructured":"FIPS PUB 46 (1977) Data encryption standard"},{"issue":"3","key":"4754_CR15","doi-asserted-by":"crossref","first-page":"2363","DOI":"10.1364\/OE.20.002363","volume":"20","author":"C Fu","year":"2012","unstructured":"Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363\u20132378","journal-title":"Opt Express"},{"issue":"1","key":"4754_CR16","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s11042-009-0307-7","volume":"46","author":"M Furini","year":"2010","unstructured":"Furini M, Geraci F, Montangero M, Pellegrini M (2010) STIMO: STILl and MOving video storyboard for the web scenario. Multimed Tools Appl 46(1):47\u201369","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"4754_CR17","doi-asserted-by":"crossref","first-page":"3053","DOI":"10.1007\/s11042-014-2422-3","volume":"75","author":"S Gaj","year":"2016","unstructured":"Gaj S, Patel AS, Sur A (2016) Object based watermarking for h.264\/AVC video resistant to rst attacks. Multimed Tools Appl 75(6):3053\u20133080","journal-title":"Multimed Tools Appl"},{"key":"4754_CR18","doi-asserted-by":"crossref","unstructured":"Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings the workshop on multimedia and security (MM&Sec). Magdeburg, Germany, pp 166\u2013174","DOI":"10.1145\/1022431.1022461"},{"key":"4754_CR19","doi-asserted-by":"crossref","unstructured":"Himeur Y, Ait-Sadi K (2015) Joint color and texture descriptor using ring decomposition for robust video copy detection in large databases. In: Proceedings the 15th IEEE international symposium on signal processing and information technology (ISSPIT). Abu Dhabi, UAE, pp 495\u2013500","DOI":"10.1109\/ISSPIT.2015.7394386"},{"key":"4754_CR20","doi-asserted-by":"crossref","unstructured":"Himeur Y, Ait-Sadi K, Ouamane A (2014) A fast and robust key-frames based video copy detection using BSIF-RMI. In: Proceedings the 11th international conference on signal proceedings and multimedia application (SIGMAP). Vienna, Austria, pp 40\u201347","DOI":"10.5220\/0005060000400047"},{"key":"4754_CR21","doi-asserted-by":"crossref","unstructured":"Himeur Y, Boudraa B (2012) Secure and robust audio watermarking system for copyright protection. In: Proceedings the 24th international conference on microelectronics (ICM). Algiers, Algeria, pp 1\u20134","DOI":"10.1109\/ICM.2012.6471449"},{"issue":"1","key":"4754_CR22","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.compeleceng.2014.08.001","volume":"41","author":"HT Hu","year":"2015","unstructured":"Hu HT, Hsu LY (2015) Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression. Comput Electr Eng 41(1):52\u201363","journal-title":"Comput Electr Eng"},{"key":"4754_CR23","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjustedSine map. Inf Sci 339:237\u201353","journal-title":"Inf Sci"},{"key":"4754_CR24","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"issue":"11","key":"4754_CR25","doi-asserted-by":"crossref","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"CC Lai","year":"2010","unstructured":"Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060\u20133063","journal-title":"IEEE Trans Instrum Meas"},{"issue":"5","key":"4754_CR26","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"G Langelaar","year":"2000","unstructured":"Langelaar G, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Proc Mag 17(5):20\u201343","journal-title":"IEEE Signal Proc Mag"},{"issue":"8","key":"4754_CR27","doi-asserted-by":"crossref","first-page":"2781","DOI":"10.1007\/s11042-013-1678-3","volume":"74","author":"Z Li","year":"2015","unstructured":"Li Z, Chen XW, Ma J (2015) Adaptively imperceptible video watermarking based on the local motion entropy. Multimed Tools Appl 74(8):2781\u20132802","journal-title":"Multimed Tools Appl"},{"key":"4754_CR28","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714\u20132722","journal-title":"Signal Process"},{"issue":"1","key":"4754_CR29","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TBC.2011.2170611","volume":"58","author":"W Lin","year":"2012","unstructured":"Lin W, Sun MT, Li H, Chen Z, Li W, Zhou B (2012) Macroblock classification method for video applications involving motions. IEEE Trans Broadcast 58(1):34\u201346","journal-title":"IEEE Trans Broadcast"},{"issue":"17","key":"4754_CR30","doi-asserted-by":"crossref","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"A Mishra","year":"2014","unstructured":"Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT\u2013SVD and firefly algorithm. Expert Syst Appl 41(17):7858\u20137867","journal-title":"Expert Syst Appl"},{"key":"4754_CR31","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s10916-016-0473-x","volume":"40","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40:114","journal-title":"J Med Syst"},{"issue":"22","key":"4754_CR32","doi-asserted-by":"crossref","first-page":"14867","DOI":"10.1007\/s11042-015-2671-9","volume":"75","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (m-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867\u2013893","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"4754_CR33","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1049\/iet-ipr.2014.0395","volume":"9","author":"N Muhammad","year":"2015","unstructured":"Muhammad N, Bibi N (2015) Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Proc 9(9):795\u2013803","journal-title":"IET Image Proc"},{"issue":"2","key":"4754_CR34","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s00799-005-0129-9","volume":"6","author":"P Mundur","year":"2006","unstructured":"Mundur P, Rao Y, Yesha Y (2006) Keyframe-based video summarization using Delaunay clustering. Int J Digit Libr 6(2):219\u2013232","journal-title":"Int J Digit Libr"},{"issue":"1","key":"4754_CR35","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1117\/1.3558734","volume":"20","author":"RO Preda","year":"2011","unstructured":"Preda RO, Vizireanu DN (2011) Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J Electron Imaging 20(1):13\u201322","journal-title":"J Electron Imaging"},{"issue":"8","key":"4754_CR36","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TCSVT.2009.2022707","volume":"19","author":"J Ren","year":"2009","unstructured":"Ren J, Jiang J, Chen J (2009) Shot boundary detection in MPEG videos using local and global indicators. IEEE Trans Circuits Syst Video Techn 19(8):1234\u20131238","journal-title":"IEEE Trans Circuits Syst Video Techn"},{"issue":"6","key":"4754_CR37","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/TCSVT.2010.2046056","volume":"20","author":"A Sarkar","year":"2010","unstructured":"Sarkar A, Singh V, Ghosh P, Manjunath B, Singh A (2010) Efficient and robust detection of duplicate videos in a large database. IEEE Trans Circuits Syst Video Techn 20(6):870\u2013885","journal-title":"IEEE Trans Circuits Syst Video Techn"},{"issue":"5","key":"4754_CR38","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202\u20131215","journal-title":"Signal Process"},{"issue":"4","key":"4754_CR39","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1007\/s11760-013-0483-9","volume":"7","author":"Z Shahid","year":"2013","unstructured":"Shahid Z, Chaumont M, Puech W (2013) H.264\/AVC video watermarking for active fingerprinting based on Tardos code. Signal Image Video Proc 7(4):679\u2013694","journal-title":"Signal Image Video Proc"},{"issue":"4","key":"4754_CR40","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"issue":"8","key":"4754_CR41","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/j.aeue.2013.01.008","volume":"67","author":"RT Singh","year":"2013","unstructured":"Singh RT, Manglem Singh K, Roy S (2013) Video watermarking scheme based on visual cryptography and scene change detection. Int J Electron Commun (AE\u00dc) 67(8):645\u2013651","journal-title":"Int J Electron Commun (AE\u00dc)"},{"key":"4754_CR42","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198508397.001.0001","volume-title":"Chaos and time-series analysis","author":"JC Sprott","year":"2003","unstructured":"Sprott JC (2003) Chaos and time-series analysis. Oxford University Press, London"},{"key":"4754_CR43","volume-title":"Cryptography: theory and practice","author":"DR Stinson","year":"2006","unstructured":"Stinson DR (2006) Cryptography: theory and practice. Chapman and Hall CRC, Boca Raton"},{"key":"4754_CR44","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou Y, Noonan JP, Agaianc S (2014) Design of image cipher using latin squares. Inf Sci 264:317\u2013339","journal-title":"Inf Sci"},{"key":"4754_CR45","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.compeleceng.2015.04.001","volume":"46","author":"W Xiang-yang","year":"2015","unstructured":"Xiang-yang W, Yu-nan L, Shuo L, Hong-ying Y, Pan-pan N, Yan Z (2015) A new robust digital watermarking using local polar harmonic transform. Comput Electr Eng 46:403\u2013418","journal-title":"Comput Electr Eng"},{"issue":"2","key":"4754_CR46","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TIP.2013.2293423","volume":"23","author":"W Xue","year":"2014","unstructured":"Xue W, Zhang L, Mou X, Bovik A (2014) Gradient magnitude similarity deviation: a highly efficient perceptual image quality index. IEEE Trans Image Proc 23(2):684\u2013695","journal-title":"IEEE Trans Image Proc"},{"issue":"3","key":"4754_CR47","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1007\/s11042-011-0857-3","volume":"62","author":"J Xuemei","year":"2013","unstructured":"Xuemei J, Quan L, Qiaoyan W (2013) A new video watermarking algorithm based on shot segmentation and block classification. Multimed Tools Appl 62(3):545\u2013560","journal-title":"Multimed Tools Appl"},{"key":"4754_CR48","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.compeleceng.2015.11.008","volume":"54","author":"E Yavuz","year":"2015","unstructured":"Yavuz E, Yaz\u0131c\u0131 R, Kasapba\u015f\u0131 MC, Yama\u00e7 E (2015) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471\u2013483","journal-title":"Comput Electr Eng"},{"issue":"3","key":"4754_CR49","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1007\/s11042-013-1515-8","volume":"73","author":"SM Youssef","year":"2014","unstructured":"Youssef SM, Abou ElFarag A, Ghatwary NM (2014) Adaptive video watermarking integrating a fuzzy wavelet-based human visual system perceptual model. Multimed Tools Appl 73(3):1545\u20131573","journal-title":"Multimed Tools Appl"},{"key":"4754_CR50","unstructured":"Youtube: Statistics, [online]. Available: http:\/\/www.youtube.com\/yt\/press\/statistics.html"},{"key":"4754_CR51","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.jss.2014.08.066","volume":"98","author":"M Zhang","year":"2014","unstructured":"Zhang M, Tong X (2014) A new chaotic map based image encryption schemes for several image formats Original. J Syst Softw 98:140\u2013154","journal-title":"J Syst Softw"},{"key":"4754_CR52","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.neucom.2014.11.095","volume":"169","author":"G Zhou","year":"2015","unstructured":"Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and line map. Neurocomputing 169:150\u2013157","journal-title":"Neurocomputing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4754-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4754-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4754-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T23:52:06Z","timestamp":1719186726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4754-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,6]]},"references-count":52,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["4754"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4754-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,6]]}}}