{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:23:00Z","timestamp":1760955780166},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T00:00:00Z","timestamp":1518134400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11042-018-5611-7","type":"journal-article","created":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T06:49:59Z","timestamp":1518158999000},"page":"24165-24184","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Separable authentication in encrypted HEVC video"],"prefix":"10.1007","volume":"77","author":[{"given":"Yiqi","family":"Tew","sequence":"first","affiliation":[]},{"given":"KokSheik","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Raphael C.-W.","family":"Phan","sequence":"additional","affiliation":[]},{"given":"King Ngi","family":"Ngan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,9]]},"reference":[{"key":"5611_CR1","doi-asserted-by":"crossref","unstructured":"Alassaf N, Alkazemin B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in iot systems. Journal of Research in Engineering and Applied Sciences","DOI":"10.46565\/jreas.2017.v02i02.002"},{"key":"5611_CR2","unstructured":"Aljuaid N, Gutub A (2014a) 2-layer security system for hiding sensitive text data on personal computers. Lect Notes Inf Theory 2(2):151\u2013157"},{"key":"5611_CR3","unstructured":"Aljuaid N, Gutub A (2014b) Flexible stego-system for hiding text in images of personal computers based on user security priority. Proc 2014 Int Conf Adv Eng Technol 2(2):250\u2013256"},{"key":"5611_CR4","unstructured":"Aljuaid N, Gutub A, Khan E (2015) Stego-system for hiding text in images of personal computers. 12th Learning and Technology Conference: Wearable Tech \/ Wearable Learning"},{"key":"5611_CR5","volume-title":"Digital video authentication hershey: IGI Global","author":"PK Atrey","year":"2009","unstructured":"Atrey P K, Saddik A E, Kankanhalli M (2009) Digital video authentication hershey: IGI Global. United State of America, Hershey"},{"key":"5611_CR6","volume-title":"VCEG-M33: Calculation of average PSNR differences between RD curves. Technical report, Video Coding Experts Group (VCEG)","author":"G Bj\u00f8ntegaard","year":"2001","unstructured":"Bj\u00f8ntegaard G (2001) VCEG-M33: Calculation of average PSNR differences between RD curves. Technical report, Video Coding Experts Group (VCEG). United State of America, Austin"},{"issue":"1","key":"5611_CR7","first-page":"56","volume":"2","author":"AAA Gutub","year":"2010","unstructured":"Gutub A A A (2010) Pixel indicator technique for rgb image steganography. J Emerg Technol Web Intell 2(1):56\u201364","journal-title":"J Emerg Technol Web Intell"},{"key":"5611_CR8","doi-asserted-by":"crossref","unstructured":"Gutub AAA, Khan FAA (2012) Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. International Conference on Advanced Computer Science Applications and Technologies","DOI":"10.1109\/ACSAT.2012.44"},{"key":"5611_CR9","doi-asserted-by":"crossref","unstructured":"Hofbauer H, Uhl A, Unterweger A (2014) Transparent encryption for HEVC using bit-stream-based selective coefficient sign encryption. In: Proceeding of IEEE International Conference on Acoustic, Speech, Signal Processing, pp 1986\u20131990","DOI":"10.1109\/ICASSP.2014.6853946"},{"key":"5611_CR10","unstructured":"ISO (2013) Information technology \u2013 High efficiency coding and media delivery in heterogeneous environments \u2013 part 2: High efficiency video coding. ISO\/IEC 23008-2:2013 International Organization for Standardization, Geneva, Switzerland"},{"key":"5611_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.sigpro.2014.08.037","volume":"108","author":"MSA Karim","year":"2015","unstructured":"Karim M S A, Wong K (2015) Data embedding in random domain. Signal Process 108:56\u201368","journal-title":"Signal Process"},{"key":"5611_CR12","unstructured":"Khan F, Gutub A (2007) Message concealment techniques using image based steganography. 4th IEEE GCC Conference and Exhibition"},{"key":"5611_CR13","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","volume":"92","author":"D Kundur","year":"2004","unstructured":"Kundur D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92:918\u2013932","journal-title":"Proc IEEE"},{"issue":"3","key":"5611_CR14","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TIFS.2014.2378592","volume":"10","author":"S Ma","year":"2015","unstructured":"Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensic Secur 10 (3):458\u2013470","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"5611_CR15","unstructured":"NIST (2002) Secure Hash Standard. FIPS PUB 180-2, National Institute of Standards and Technology, Gaithersburg"},{"key":"5611_CR16","doi-asserted-by":"crossref","unstructured":"Ong S, Wong K, Qi X, Tanaka K (2015a) Beyond format-compliant encryption for {JPEG} image. Signal Process: Image Commun 31:47\u201360","DOI":"10.1016\/j.image.2014.11.008"},{"key":"5611_CR17","doi-asserted-by":"crossref","unstructured":"Ong S, Wong K, Tanaka K (2015b) Scrambling-embedding for JPEG compressed image. Signal Process 109:38\u201353","DOI":"10.1016\/j.sigpro.2014.10.028"},{"issue":"4","key":"5611_CR18","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","volume":"26","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhang X (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans Circ Syst Video Technol 26(4):636\u2013646","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"4","key":"5611_CR19","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1109\/TIP.2014.2302681","volume":"23","author":"RM Rad","year":"2014","unstructured":"Rad R M, Wong K, Guo J M (2014) A unified data embedding and scrambling method. IEEE Trans Image Process 23(4):1463\u20131475","journal-title":"IEEE Trans Image Process"},{"key":"5611_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/TMM.2013.2281029","volume":"16","author":"Z Shahid","year":"2014","unstructured":"Shahid Z, Puech W (2014) Visual protection of hevc video by selective encryption of cabac binstrings. IEEE Trans Multimed 16:24\u201336","journal-title":"IEEE Trans Multimed"},{"key":"5611_CR21","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"2010","unstructured":"Stallings W (2010) Cryptography and network security: principles and practice, 5th edn. Prentice Hall Press, Upper Saddle River","edition":"5th edn."},{"issue":"12","key":"5611_CR22","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","volume":"22","author":"GJ Sullivan","year":"2012","unstructured":"Sullivan G J, Ohm J R, Han W J, Wiegand T (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans Circ Syst Video Technol 22 (12):1649\u20131668","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"5611_CR23","doi-asserted-by":"publisher","first-page":"1778","DOI":"10.1109\/TCSVT.2012.2221526","volume":"22","author":"V Sze","year":"2012","unstructured":"Sze V, Budagavi M (2012) High throughput CABAC entropy coding in HEVC. IEEE Trans Circ Syst Video Technol 22:1778\u20131791","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"5611_CR24","doi-asserted-by":"crossref","unstructured":"Tew Y, Wong K (2014) Information hiding in HEVC standard using adaptive coding block size decision. In: IEEE International Conference on Image Processing (ICIP), pp 5502\u20135506","DOI":"10.1109\/ICIP.2014.7026113"},{"key":"5611_CR25","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1016\/j.jvcir.2016.07.017","volume":"40","author":"Y Tew","year":"2016","unstructured":"Tew Y, Wong K, Phan R C W, Ngan K N (2016) Multi-layer authentication scheme for hevc video based on embedded statistics. J Vis Commun Image Represent 40:502\u2013515","journal-title":"J Vis Commun Image Represent"},{"key":"5611_CR26","volume-title":"High efficieny video coding (HEVC): Algorithms and architectures","author":"GJS Vivienne Sze","year":"2014","unstructured":"Vivienne Sze GJS, Budagavi M (2014) High efficieny video coding (HEVC): Algorithms and architectures, 1st edn. Springer International Publishing, Berlin","edition":"1st edn."},{"key":"5611_CR27","unstructured":"Waddilove R (2015) Best free video editing software 2016 uk. http:\/\/www.pcadvisor.co.uk\/test-centre\/photo-video\/best-free-video-editing-software-2016-3614829\/ , [Accessed 1-April-2016]"},{"key":"5611_CR28","volume-title":"High efficieny video coding: Coding tools and specification","author":"M Wien","year":"2014","unstructured":"Wien M (2014) High efficieny video coding: Coding tools and specification, 1st edn. Springer-Verlag, Berlin Heidelberg","edition":"1st edn."},{"issue":"2","key":"5611_CR29","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensic Secur 7(2):826\u2013832","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"5611_CR30","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/TCSVT.2015.2416591","volume":"26","author":"J Zhou","year":"2016","unstructured":"Zhou J, Sun W, Dong L, Liu X, Au O C, Tang Y Y (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Video Technol 26(3):441\u2013452","journal-title":"IEEE Trans Circ Syst Video Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5611-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5611-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5611-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T23:48:13Z","timestamp":1603842493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5611-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,9]]},"references-count":30,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5611"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5611-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,9]]},"assertion":[{"value":"12 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}