{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:23:25Z","timestamp":1774538605797,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T00:00:00Z","timestamp":1602288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T00:00:00Z","timestamp":1602288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09904-4","type":"journal-article","created":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T13:02:56Z","timestamp":1602334976000},"page":"6019-6039","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["A robust video zero-watermarking based on deep convolutional neural network and self-organizing map in polar complex exponential transform domain"],"prefix":"10.1007","volume":"80","author":[{"given":"Yumei","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2537-639X","authenticated-orcid":false,"given":"Xiaobing","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Yajun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,10]]},"reference":[{"issue":"9","key":"9904_CR1","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"M Asikuzzaman","year":"2018","unstructured":"Asikuzzaman M, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans Circ Syst Video Technol 28(9):2131\u20132153","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"18","key":"9904_CR2","doi-asserted-by":"publisher","first-page":"26089","DOI":"10.1007\/s11042-019-07809-5","volume":"78","author":"Z Cao","year":"2019","unstructured":"Cao Z, Wang L (2019) A secure video watermarking technique based on hyperchaotic Lorentz system. Multimed Tools Appl 78(18):26089\u201326109","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"9904_CR3","doi-asserted-by":"publisher","first-page":"7187","DOI":"10.1007\/s11042-017-4628-7","volume":"77","author":"L Chen","year":"2017","unstructured":"Chen L, Zhao J (2017) Contourlet-based image and video watermarking robust to geometric attacks and compressions. Multimed Tools Appl 77(6):7187\u20137204","journal-title":"Multimed Tools Appl"},{"key":"9904_CR4","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.neunet.2019.11.017","volume":"123","author":"Z Gao","year":"2020","unstructured":"Gao Z, Wang X, Sun S, Wu D, Bai J, Yin Y, Liu X, Zhang H, Victor H (2020) Learning physical properties in complex visual scenes: an intelligent machine for perceiving blood flow dynamics from static CT angiography imaging. Neural Netw 123:82\u201393","journal-title":"Neural Netw"},{"issue":"2","key":"9904_CR5","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1504\/IJHPCN.2019.097508","volume":"13","author":"NE-H Golea","year":"2019","unstructured":"Golea NE-H, Melkemi KE (2019) ROI-based fragile watermarking for medical image tamper detection. Int J High Perform Comput Netw 13(2):199\u2013210","journal-title":"Int J High Perform Comput Netw"},{"key":"9904_CR6","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-981-10-1675-2_45","volume-title":"Proceedings of the international conference on data engineering and communication technology","author":"AM Joshi","year":"2017","unstructured":"Joshi AM, Gupta S, Girdhar M, Agarwal P, Sarker R (2017) Combined DWT\u2013DCT-based video watermarking algorithm using Arnold transform technique. In: Proceedings of the international conference on data engineering and communication technology. Springer, Singapore, pp 455\u2013463"},{"issue":"1\u20132","key":"9904_CR7","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1007\/s11042-019-08191-y","volume":"79","author":"X Kang","year":"2020","unstructured":"Kang X, Lin G, Chen Y, Zhao F, Zhang E, Jing C (2020) Robust and secure zero-watermarking algorithm for color images based on majority voting pattern and hyper-chaotic encryption. Multimed Tools Appl 79(1\u20132):1169\u20131202","journal-title":"Multimed Tools Appl"},{"key":"9904_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56927-2","volume-title":"Self-Organizating maps, 3rd extended Ed","author":"T Kohonen","year":"2001","unstructured":"Kohonen T (2001) Self-Organizating maps, 3rd extended Ed. Springer-Verlag, New York"},{"key":"9904_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2012.02.062","volume":"199","author":"L Li","year":"2012","unstructured":"Li L, Li S, Abraham A, Pan JS (2012) Geometrically invariant image watermarking using polar harmonic transforms. Inf Sci 199:1\u201319","journal-title":"Inf Sci"},{"issue":"21","key":"9904_CR10","doi-asserted-by":"publisher","first-page":"13093","DOI":"10.1007\/s11042-015-2733-z","volume":"75","author":"D Li","year":"2015","unstructured":"Li D, Qiao L, Kim J (2015) A video zero-watermarking algorithm based on LPM. Multimed Tools Appl 75(21):13093\u201313106","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9904_CR11","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multim Tools Appl 77(4):4545-4561","journal-title":"Multim Tools Appl"},{"key":"9904_CR12","doi-asserted-by":"crossref","unstructured":"Li D, Yang S, Zuo Y, Zheng Z, Cui L (2018) Animation Zero Watermarking Algorithm Based on Edge Feature. MUE\/FutureTech 2018:565-571","DOI":"10.1007\/978-981-13-1328-8_73"},{"key":"9904_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432\u2013447","journal-title":"Inf Sci"},{"issue":"3","key":"9904_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3397179","volume":"16","author":"Y Li","year":"2020","unstructured":"Li Y, Hu H, Zhu Z, Zhou G (2020) SCANet: sensor-based continuous authentication with two-stream convolutional neural networks. ACM Trans Sensor Netw 16(3):1\u201326. https:\/\/doi.org\/10.1145\/3397179","journal-title":"ACM Trans Sensor Netw"},{"issue":"21","key":"9904_CR15","doi-asserted-by":"publisher","first-page":"9157","DOI":"10.1007\/s11042-014-2073-4","volume":"74","author":"X Liu","year":"2014","unstructured":"Liu X, Zhu Y, Sun Z, Diao M, Zhang L (2014) A novel robust video fingerprinting-watermarking hybrid scheme based on visual secret sharing. Multimed Tools Appl 74(21):9157\u20139174","journal-title":"Multimed Tools Appl"},{"key":"9904_CR16","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.image.2017.03.002","volume":"54","author":"X Liu","year":"2017","unstructured":"Liu X, Zhao R, Li F, Liao S, Ding Y, Zou B (2017) Novel robust zero-watermarking scheme for digital rights management of 3D videos. Signal Process Image Commun 54:140\u2013151","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"9904_CR17","first-page":"214","volume":"31","author":"W Quan","year":"2003","unstructured":"Quan W, Sun T, Wang S (2003) Concept and application of zero-watermark. Acta Electron Sin 31(2):214\u2013216","journal-title":"Acta Electron Sin"},{"key":"9904_CR18","doi-asserted-by":"crossref","unstructured":"Qu Z, He H, Liu W, Ma S (2019) A self-adaptive quantum steganography algorithm based on QLSb modification in watermarked quantum image. Int J High Perform Comput Netw 14(2):121\u2013129","DOI":"10.1504\/IJHPCN.2019.10022723"},{"key":"9904_CR19","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.neunet.2020.01.017","volume":"124","author":"S Raghu","year":"2020","unstructured":"Raghu S, Natarajan S, Yasin T, Shyam VR, Pieter LK (2020) EEG based multi-class seizure type classification using convolutional neural network and transfer learning. Neural Netw 124:202\u2013212","journal-title":"Neural Netw"},{"issue":"3","key":"9904_CR20","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M (2015) ImageNet large scale visual recognition challenge. Int J Comput Vis 115(3):211\u2013252","journal-title":"Int J Comput Vis"},{"key":"9904_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.neunet.2019.12.029","volume":"124","author":"A Shadi","year":"2020","unstructured":"Shadi A, Mehdi G, Gian L, Christian M (2020) Adaptive neural tree exploiting expert nodes to classify high-dimensional data. Neural Netw 124:20\u201338","journal-title":"Neural Netw"},{"issue":"1","key":"9904_CR22","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1515\/jisys-2017-0039","volume":"27","author":"D Shukla","year":"2018","unstructured":"Shukla D, Sharma M (2018) A novel scene-based video watermarking scheme for copyright protection. J Intell Syst 27(1):47\u201366","journal-title":"J Intell Syst"},{"key":"9904_CR23","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. Computer science arXiv:1409.1556v1"},{"issue":"13","key":"9904_CR24","doi-asserted-by":"publisher","first-page":"16419","DOI":"10.1007\/s11042-017-5213-9","volume":"77","author":"KM Singh","year":"2018","unstructured":"Singh KM (2018) A robust rotation resilient video watermarking scheme based on the SIFT. Multimed Tools Appl 77(13):16419\u201316444","journal-title":"Multimed Tools Appl"},{"key":"9904_CR25","unstructured":"Strogatz SH (2015) Nonlinear dynamics and Chaos: with applications to physics, Second edn. CRC Press"},{"key":"9904_CR26","unstructured":"Video trace library. YUV 4:2:0 video sequences [Online]. Available: http:\/\/trace.eas.asu.edu\/yuv\/index.html"},{"key":"9904_CR27","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.jvcir.2016.10.004","volume":"41","author":"C Wang","year":"2016","unstructured":"Wang C, Wang X, Xia Z, Zhang C, Chen X (2016) Geometrically resilient color image zero-watermarking algorithm based on quaternion exponent moments. J Vis Commun Image Represent 41:247\u2013259","journal-title":"J Vis Commun Image Represent"},{"key":"9904_CR28","doi-asserted-by":"publisher","first-page":"15816","DOI":"10.1109\/ACCESS.2018.2802928","volume":"6","author":"Y-G Wang","year":"2018","unstructured":"Wang Y-G, Xie D, Gupta BB (2018) A study on the collusion security of LUT-based client-side watermark embedding. IEEE Access 6:15816\u201315822","journal-title":"IEEE Access"},{"key":"9904_CR29","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109-120","journal-title":"Inf Sci"},{"key":"9904_CR30","doi-asserted-by":"crossref","unstructured":"Xu G, Wang R (2009) A video zero-watermark algorithm against RST attacks. In: 2009 Asia-Pacific conference on information processing. Pp 15-18","DOI":"10.1109\/APCIP.2009.140"},{"key":"9904_CR31","doi-asserted-by":"publisher","first-page":"115747","DOI":"10.1016\/j.image.2019.115747","volume":"82","author":"H Yang","year":"2020","unstructured":"Yang H, Qi S, Niu P, Wang X (2020) Color image zero-watermarking based on fast quaternion generic polar complex exponential transform. Signal Process Image Commun 82:115747","journal-title":"Signal Process Image Commun"},{"issue":"7","key":"9904_CR32","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1109\/TPAMI.2009.119","volume":"32","author":"PT Yap","year":"2010","unstructured":"Yap PT, Jiang X, Kot AC (2010) Two-dimensional polar harmonic transforms for invariant image representation. IEEE Trans Pattern Anal Mach Intell 32(7):1259\u20131270","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9904_CR33","doi-asserted-by":"publisher","first-page":"115708","DOI":"10.1109\/ACCESS.2019.2936134","volume":"7","author":"X Yu","year":"2019","unstructured":"Yu X, Wang C, Zhou X (2019) A hybrid transforms-based robust video zero-watermarking algorithm for resisting high efficiency video coding compression. IEEE Access 7:115708\u2013115724","journal-title":"IEEE Access"},{"key":"9904_CR34","doi-asserted-by":"crossref","unstructured":"Zhang H, Li J, Dong C (2012) Multiple video Zero-Watermarking based on 3D DFT to resist geometric attacks. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). pp 1141\u20131144","DOI":"10.1109\/CECNet.2012.6201983"},{"issue":"5","key":"9904_CR35","doi-asserted-by":"publisher","first-page":"841","DOI":"10.3390\/app9050841","volume":"9","author":"E Zhang","year":"2019","unstructured":"Zhang E, Zhang Y, Duan J (2019) Color inverse Halftoning method with the correlation of multi-color components based on extreme learning machine. Appl Sci 9(5):841","journal-title":"Appl Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09904-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09904-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09904-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:35:56Z","timestamp":1633912556000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09904-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,10]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9904"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09904-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,10]]},"assertion":[{"value":"21 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}