{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:42:02Z","timestamp":1772725322968,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100012964","name":"Minist\u00e8re de l\u2019Enseignement Sup\u00e9rieur et de la Recherche Scientifique","doi-asserted-by":"publisher","award":["LR11ES48"],"award-info":[{"award-number":["LR11ES48"]}],"id":[{"id":"10.13039\/100012964","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09982-4","type":"journal-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T06:02:47Z","timestamp":1603864967000},"page":"7479-7513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Blind semi-fragile watermarking scheme for video authentication in video surveillance context"],"prefix":"10.1007","volume":"80","author":[{"given":"Amal","family":"Hammami","sequence":"first","affiliation":[]},{"given":"Amal","family":"Ben Hamida","sequence":"additional","affiliation":[]},{"given":"Chokri","family":"Ben Amar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,28]]},"reference":[{"issue":"7","key":"9982_CR1","first-page":"495","volume":"8","author":"OG Abood","year":"2018","unstructured":"Abood OG, Guirguis SK (2018) A survey on cryptography algorithms. Int J Sci Res Publ 8(7):495\u2013512","journal-title":"Int J Sci Res Publ"},{"key":"9982_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal P, Choudhary A (2014) Protecting video data through watermarking: a comprehensive study. In: 5th international conference-confluence the next generation information technology summit, pp 657\u2013662","DOI":"10.1109\/CONFLUENCE.2014.6949276"},{"issue":"4","key":"9982_CR3","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1080\/00207217.2016.1242163","volume":"104","author":"K Ait Sadi","year":"2016","unstructured":"Ait Sadi K, Guessoum A, Bouridane A, Khelifi F (2016) Content fragile watermarking for H.264\/AVC video authentication. Int J Electron 104 (4):673\u2013691","journal-title":"Int J Electron"},{"key":"9982_CR4","doi-asserted-by":"crossref","unstructured":"Alenizi F, Kurdahi F, Eltawil A, Aljumah A (2015) DWT-Based watermarking technique for video authentication. In: International conference on electronics, circuits, and systems (ICECS), pp 41\u201344","DOI":"10.1109\/ICECS.2015.7440244"},{"issue":"9","key":"9982_CR5","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"M Asikuzzaman","year":"2018","unstructured":"Asikuzzaman M, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans Circ Sys Video Technol 28(9):2131\u20132153","journal-title":"IEEE Trans Circ Sys Video Technol"},{"issue":"10","key":"9982_CR6","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/5.959338","volume":"89","author":"F Bartolini","year":"2001","unstructured":"Bartolini F, Tefas A, Barni M, Pitas I (2001) Image authentication techniques for surveillance applications. Proc IEEE 89(10):1403\u20131418","journal-title":"Proc IEEE"},{"key":"9982_CR7","doi-asserted-by":"crossref","unstructured":"Ben Hamida A, Koubaa M, Nicolas H, Ben Amar C (2013) Video pre-analyzing and coding in the context of video surveillance applications. In: International conference on multimedia and expo workshops (ICMEW), pp 1\u20134","DOI":"10.1109\/ICMEW.2013.6618313"},{"key":"9982_CR8","doi-asserted-by":"crossref","unstructured":"Ben Hamida A, Koubaa M, Nicolas H, Ben Amar C (2014) Toward scalable application-oriented video surveillance systems. In: Science and information conference, pp 384\u2013388","DOI":"10.1109\/SAI.2014.6918215"},{"issue":"24","key":"9982_CR9","doi-asserted-by":"publisher","first-page":"17187","DOI":"10.1007\/s11042-015-2987-5","volume":"75","author":"A Ben Hamida","year":"2016","unstructured":"Ben Hamida A, Koubaa M, Nicolas H, Ben Amar C (2016) Video surveillance system based on a scalable application-oriented architecture. Multimed Tools Appl 75(24):17187\u201317213","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"9982_CR10","doi-asserted-by":"publisher","first-page":"19659","DOI":"10.1007\/s11042-017-5340-3","volume":"77","author":"A Bhardwaj","year":"2018","unstructured":"Bhardwaj A, Verma VS, Jha RK (2018) Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed Tools Appl 77(15):19659\u201319678","journal-title":"Multimed Tools Appl"},{"key":"9982_CR11","doi-asserted-by":"crossref","unstructured":"Boreiry M, Keyvanpour MR (2017) Classification of watermarking methods based on watermarking approaches. In: Artificial intelligence and robotics (IRANOPEN), pp 73\u201376","DOI":"10.1109\/RIOS.2017.7956446"},{"key":"9982_CR12","unstructured":"Chang Y-C, Wang J-T, Chang Y-T, Yu S-S (2016) An error-detecting code based fragile watermarking scheme in spherical coordinate system. In: International symposium on computer, consumer and control (IS3C), pp 287\u2013290"},{"key":"9982_CR13","doi-asserted-by":"crossref","unstructured":"Chaudhary S, Berki E, Nykanen P, Zolotavkin Y, Helenius M, Kela J (2016) Towards a conceptual framework for privacy protection in the use of interactive 360 video surveillance. In: 22nd international conference on virtual system & multimedia (VSMM), pp 1\u201310","DOI":"10.1109\/VSMM.2016.7863179"},{"issue":"3","key":"9982_CR14","first-page":"1","volume":"25","author":"D Deljavan Amiri","year":"2019","unstructured":"Deljavan Amiri D, Amiri A, Meghdadi M (2019) HVS-Based scalable video watermarking. Multimedia Systems 25(3):1\u201319","journal-title":"Multimedia Systems"},{"issue":"13","key":"9982_CR15","doi-asserted-by":"publisher","first-page":"7465","DOI":"10.1007\/s11042-015-2672-8","volume":"75","author":"ME Farfoura","year":"2016","unstructured":"Farfoura ME, Horng S-J, Guo JM (2016) Low complexity semi-fragile watermarking scheme for H.264\/AVC authentication. Multimed Tools Appl 75(13):7465","journal-title":"Multimed Tools Appl"},{"key":"9982_CR16","doi-asserted-by":"crossref","unstructured":"Hammami A, Ben Hamida A, Ben Amar C (2019) A robust blind video watermarking scheme based on discrete wavelet transform and singular value decomposition. In: International joint conference on computer vision, imaging and computer graphics theory and application, pp 597\u2013604","DOI":"10.5220\/0007685305970604"},{"key":"9982_CR17","doi-asserted-by":"crossref","unstructured":"Hammami A, Ben Hamida A, Ben Amar C, Nicolas H (2020) Regions based semi-fragile watermarking scheme for video authentication. In: International conference in Central Europe on computer graphics, visualization and computer vision, pp 96\u2013104","DOI":"10.24132\/JWSCG.2020.28.12"},{"key":"9982_CR18","unstructured":"Hasnaoui M, Mitrea M (2012) Semi-fragile watermarking for video surveillance applications. In: 20th European signal processing conference (EUSIPCO), pp 1782\u20131786"},{"issue":"7","key":"9982_CR19","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-017-4754-2","volume":"77","author":"Y Himeur","year":"2018","unstructured":"Himeur Y, Boukabou A (2018) A robust and secure key-frame based video watermarking system using chaotic encryption. Multimed Tools Appl 77 (7):8603\u20138627","journal-title":"Multimed Tools Appl"},{"key":"9982_CR20","unstructured":"IHS Web page. [Online]. Available: https:\/\/technology.ihs.com"},{"key":"9982_CR21","unstructured":"ISO 18004 Web page. [Online]. Available: https:\/\/www.iso.org\/standard\/62021.html"},{"key":"9982_CR22","unstructured":"Jenkins N (2015) 245 million video surveillance cameras installed globally in 2014 [Online]. Available: https:\/\/technology.ihs.com\/532501\/245-million-video-surveillance-cameras-installed-globally-in-2014"},{"key":"9982_CR23","unstructured":"Jindal H, Kasana SS, Saxena S (2016) A novel image zooming technique using wavelet coefficients. In: Proceedings of the international conference on recent cognizance in wireless communication and image processing, pp 1\u20137"},{"issue":"01","key":"9982_CR24","doi-asserted-by":"publisher","first-page":"1850013","DOI":"10.1142\/S0219691318500133","volume":"16","author":"H Jindal","year":"2018","unstructured":"Jindal H, Kasana SS, Saxena S (2018) Underwater pipelines panoramic image transmission and refinement using acoustic sensors. International Journal of Wavelets, Multiresolution and Information Processing 16(01):1850013","journal-title":"International Journal of Wavelets, Multiresolution and Information Processing"},{"issue":"6","key":"9982_CR25","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1007\/s11042-014-2426-z","volume":"75","author":"AM Joshi","year":"2016","unstructured":"Joshi AM, Mishra V, Patrikar RM (2016) FPGA prototyping of video watermarking for ownership verification based on H.264\/AVC. Multimed Tools Appl 75(6):3121","journal-title":"Multimed Tools Appl"},{"key":"9982_CR26","doi-asserted-by":"crossref","unstructured":"Joshi AM, Gupta S, Girdhar M, Agarwal P, Sarker R (2017) Combined DWT-DCT-based video watermarking algorithm using arnold transform technique. In: International conference on data engineering and communication technology, pp 455\u2013463","DOI":"10.1007\/978-981-10-1675-2_45"},{"issue":"4","key":"9982_CR27","first-page":"399","volume":"1","author":"W Jumana","year":"2015","unstructured":"Jumana W, Huang Dong J, Sarah S, Saad H, Hiyam H (2015) An immune secret QR-code sharing based on a twofold zero watermarking scheme. International Journal of Multimedia and Ubiquitous Engineering 1(4):399\u2013412","journal-title":"International Journal of Multimedia and Ubiquitous Engineering"},{"key":"9982_CR28","unstructured":"Kalker T, Depovere G, Haitsma J, Maes MJ (1999) Video watermarking system for broadcast monitoring. In: The international society for optical engineering, pp 103\u2013112"},{"issue":"7","key":"9982_CR29","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5815\/ijigsp.2017.07.03","volume":"9","author":"S Kaur","year":"2017","unstructured":"Kaur S, Jindal H (2017) Enhanced image watermarking technique using wavelets and interpolation. Int J Image Graph Signal Process 9(7):23\u201335","journal-title":"Int J Image Graph Signal Process"},{"issue":"15","key":"9982_CR30","doi-asserted-by":"publisher","first-page":"21245","DOI":"10.1007\/s11042-019-7456-0","volume":"78","author":"G Kaur","year":"2019","unstructured":"Kaur G, Kasana SS, Sharma MK (2019) An efficient authentication scheme for high efficiency video coding\/H.265. Multimed Tools Appl 78 (15):21245\u201321271","journal-title":"Multimed Tools Appl"},{"key":"9982_CR31","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1007\/s00521-018-3489-y","volume":"30","author":"MR Khosravi","year":"2018","unstructured":"Khosravi MR, Yazdi M (2018) A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights. Neural Comput Appli 30:2017\u20132028","journal-title":"Neural Comput Appli"},{"issue":"4","key":"9982_CR32","doi-asserted-by":"publisher","first-page":"2603","DOI":"10.1109\/JIOT.2019.2952284","volume":"7","author":"MR Khosravi","year":"2019","unstructured":"Khosravi MR, Samadi S (2019) Reliable data aggregation in internet of ViSAR vehicles using chained dual-phase adaptive interpolation and data embedding. IEEE Internet of Things Journal 7(4):2603\u20132610","journal-title":"IEEE Internet of Things Journal"},{"key":"9982_CR33","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1186\/s13638-019-1572-4","volume":"2019","author":"MR Khosravi","year":"2019","unstructured":"Khosravi MR, Samadi S (2019) Efficient payload communications for IoT-enabled ViSAR vehicles using discrete cosine transform-based quasi-sparse bit injection. EURASIP J Wirel Commun Netw 2019:262","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"9982_CR34","unstructured":"Khosravi MR, Samadi S (2019) Modified data aggregation for aerial viSAR sensor networks in transform domain. In: 25th international conference on parallel and distributed processing techniques and applications (PDPTA), pp 87\u201390"},{"key":"9982_CR35","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.displa.2018.04.002","volume":"55","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang C-N (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71\u201379","journal-title":"Displays"},{"issue":"1","key":"9982_CR36","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101\u2013114","journal-title":"J Real-Time Image Proc"},{"key":"9982_CR37","doi-asserted-by":"publisher","first-page":"644","DOI":"10.3390\/electronics9040644","volume":"9","author":"C Kim","year":"2020","unstructured":"Kim C, Yang CN, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9:644","journal-title":"Electronics"},{"key":"9982_CR38","doi-asserted-by":"crossref","unstructured":"Kirovski D, Malvar H, Yacobi Y (2002) Multimedia content screening using a dual watermarking and fingerprinting system. In: ACM international conference on multimedia, pp 372\u2013381","DOI":"10.1145\/641007.641086"},{"issue":"1","key":"9982_CR39","first-page":"208","volume":"112","author":"T Koohpayeh","year":"2018","unstructured":"Koohpayeh T, Abd A, Kohpayeh S (2018) A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst Appl 112(1):208\u2013228","journal-title":"Expert Syst Appl"},{"key":"9982_CR40","first-page":"123","volume":"43","author":"S Kumar","year":"2018","unstructured":"Kumar S, Kumar M, Budhiraja R, Das MK, Singh S (2018) A cryptographic model for better information security. J Inf Secur Appl 43:123\u2013138","journal-title":"J Inf Secur Appl"},{"issue":"17","key":"9982_CR41","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang JS, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543\u20132554","journal-title":"Int J Phys Sci"},{"key":"9982_CR42","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Li M, Kim C, Bi K (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76:333\u2013354","journal-title":"Multimed Tools Appl"},{"key":"9982_CR43","doi-asserted-by":"crossref","unstructured":"Li L, Li X, Qiao T, Xu X, Zhang S, Chang CC (2018) A novel framework of robust video watermarking based on statistical model. In: International conference cloud computing and security (ICCCS), pp 160\u2013172","DOI":"10.1007\/978-3-030-00015-8_14"},{"key":"9982_CR44","doi-asserted-by":"crossref","unstructured":"Li J, Li X, Guo Y, Xu X, Liu S (2018) Semi-fragile video watermarking algorithm based on energy relation. In: International conference on virtual reality (ICVR), pp 95\u2013101","DOI":"10.1145\/3198910.3234660"},{"key":"9982_CR45","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739\u201320753","journal-title":"Multimed Tools Appl"},{"key":"9982_CR46","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146\u2013156","journal-title":"Signal Process Image Commun"},{"key":"9982_CR47","doi-asserted-by":"crossref","unstructured":"Liu L, Li X (2010) Watermarking protocol for broadcast monitoring. In: International conference on E-business and E-government, pp 1634\u20131637","DOI":"10.1109\/ICEE.2010.414"},{"issue":"8","key":"9982_CR48","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5815\/ijigsp.2017.08.03","volume":"9","author":"K Mander","year":"2017","unstructured":"Mander K, Jindal H (2017) An improved image compression decompression technique using block truncation and wavelets. Int J Image Graph Signal Proc 9(8):17\u201329","journal-title":"Int J Image Graph Signal Proc"},{"key":"9982_CR49","doi-asserted-by":"crossref","unstructured":"Mishra A, Agarwal C, Chetty G (2018) Lifting wavelet transform based fast watermarking of video summaries using extreme learning machine. In: International joint conference on neural networks, pp 1\u20137","DOI":"10.1109\/IJCNN.2018.8489305"},{"issue":"5","key":"9982_CR50","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5815\/ijigsp.2017.05.04","volume":"9","author":"A Mittal","year":"2017","unstructured":"Mittal A, Jindal H (2017) Novelty in image reconstruction using dwt and clahe. Int J Image Graph Signal Proc 9(5):28\u201334","journal-title":"Int J Image Graph Signal Proc"},{"issue":"10","key":"9982_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6712065","volume":"2018","author":"I Nouioua","year":"2018","unstructured":"Nouioua I, Amardjia N, Belilita S (2018) A novel blind and robust video watermarking technique in fast motion frames based on SVD and MR-SVD. Security and Communication Networks 2018(10):1\u201317","journal-title":"Security and Communication Networks"},{"key":"9982_CR52","doi-asserted-by":"crossref","unstructured":"Panyavaraporn J (2017) DWT\/DCT watermarking techniques with chaotic map for video authentication. In: Ninth international conference on digital image processing (ICDIP","DOI":"10.1117\/12.2281682"},{"key":"9982_CR53","doi-asserted-by":"crossref","unstructured":"Ponnisathya S, Ramakrishnan S, Dhinakaran S, Ashwanth PS, Dhamodharan P (2017) CHAOTIC map based video watermarking using DWT and SVD. In: International conference on inventive communication and computational technologies, pp 45\u201349","DOI":"10.1109\/ICICCT.2017.7975156"},{"issue":"1","key":"9982_CR54","first-page":"93","volume":"73","author":"RO Preda","year":"2011","unstructured":"Preda RO, Vizireanu N (2011) New robust watermarking scheme for video copyright protection in the spatial domain. UPB Sci Bull 73(1):93\u2013104","journal-title":"UPB Sci Bull"},{"issue":"3","key":"9982_CR55","first-page":"630","volume":"4","author":"P Priya","year":"2014","unstructured":"Priya P, Tanvi G, Nikita P, Ankita T (2014) Digital video watermarking using modified LSB and DCT technique. Int J Res Eng Technol 4(3):630\u2013634","journal-title":"Int J Res Eng Technol"},{"key":"9982_CR56","first-page":"119","volume":"35","author":"H Rafik","year":"2017","unstructured":"Rafik H (2017) A novel pseudo random sequence generator for image-cryptographic applications. J Inf Secur Appl 35:119\u2013127","journal-title":"J Inf Secur Appl"},{"issue":"7","key":"9982_CR57","first-page":"26","volume":"3","author":"RA Sadek","year":"2012","unstructured":"Sadek RA (2012) SVD based image processing applications: state of the art, contributions and research challenges. Int J Adv Comput Sci Appl 3 (7):26\u201334","journal-title":"Int J Adv Comput Sci Appl"},{"key":"9982_CR58","doi-asserted-by":"crossref","unstructured":"Saikrishna N, Resmipriya MG (2016) An invisible logo watermarking using arnold transform. In: International conference on advances in computing & communications (ICACC), pp 808\u2013815","DOI":"10.1016\/j.procs.2016.07.299"},{"key":"9982_CR59","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1007\/s11277-018-5252-1","volume":"102","author":"SPA Sathya","year":"2018","unstructured":"Sathya SPA, Ramakrishnan S (2018) Fibonacci based key frame selection and scrambling for video watermarking in DWT-SVD domain. Wirel Pers Commun 102:2011\u20132031","journal-title":"Wirel Pers Commun"},{"key":"9982_CR60","unstructured":"Shi J, Tomasi C (1994) Good features to track. In: Conference on computer vision and pattern recognition, pp 593\u2013600"},{"issue":"1","key":"9982_CR61","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1515\/jisys-2017-0039","volume":"27","author":"D Shukla","year":"2018","unstructured":"Shukla D, Sharma M (2018) A novel scene-based video watermarking scheme for copyright protection. J Intell Syst 27(1):47\u201366","journal-title":"J Intell Syst"},{"key":"9982_CR62","doi-asserted-by":"crossref","unstructured":"Stauffer C, Grimson WEL (1999) Adaptive background mixture models for real-time tracking. In: Computer society conference on computer vision and pattern recognition, pp 246\u2013252","DOI":"10.1109\/CVPR.1999.784637"},{"key":"9982_CR63","unstructured":"Sujatha CN, Sathyanarayana P (2019) DWT-based blind video watermarking using image scrambling technique. In: Information and communication technology for intelligent systems, pp 621\u2013628"},{"key":"9982_CR64","unstructured":"Swaraja K, Karuna G, Kora P, Meenakshi K (2019) Video watermarking fundamentals and overview. In: International conference on intelligent computing and communication technologies (ICICCT), pp 379\u2013385"},{"key":"9982_CR65","doi-asserted-by":"crossref","unstructured":"Tyagi S, Singh HV, Agarwal R, Gangwar SK (2016) Digital watermarking techniques for security applications. In: International conference on emerging trends in electrical electronics & sustainable energy systems (ICETEESES), pp 379\u2013382","DOI":"10.1109\/ICETEESES.2016.7581413"},{"issue":"4","key":"9982_CR66","doi-asserted-by":"publisher","first-page":"75","DOI":"10.5121\/ijcses.2011.2406","volume":"2","author":"S Upadhy","year":"2011","unstructured":"Upadhy S, Singh SK (2011) Video authentication- an overview. Int J Comput Sci Eng Surv 2(4):75\u201396","journal-title":"Int J Comput Sci Eng Surv"},{"issue":"4","key":"9982_CR67","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.aej.2014.07.008","volume":"53","author":"NI Yassin","year":"2014","unstructured":"Yassin NI, Salem NM, Adawy MIE (2014) QIM Blind video watermarking scheme based on wavelet transform and principal component analysis. Alex Eng J 53(4):833\u2013842","journal-title":"Alex Eng J"},{"issue":"10","key":"9982_CR68","doi-asserted-by":"publisher","first-page":"1891","DOI":"10.3390\/app8101891","volume":"8","author":"X-Y Yu","year":"2018","unstructured":"Yu X-Y, Wang C-Y, Zhou X (2018) A survey on robust video watermarking algorithms for copyright protection. Appl Sci 8(10):1891","journal-title":"Appl Sci"},{"key":"9982_CR69","doi-asserted-by":"crossref","unstructured":"Zhang D, Li Y (2010) A non-blind watermarking on 3D model in spatial domain. In: International conference on computer application and system modeling, pp 267\u2013269","DOI":"10.1109\/ICCASM.2010.5622796"},{"key":"9982_CR70","doi-asserted-by":"crossref","unstructured":"Zebbiche K, Ghouti L, Khelifi F, Bouridane A (2006) Protecting fingerprint data using watermarking. In: NASA\/ESA conference on adaptive hardware and systems, pp 451\u2013456","DOI":"10.1109\/AHS.2006.61"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09982-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-09982-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09982-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T23:43:14Z","timestamp":1614210194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-09982-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,28]]},"references-count":70,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9982"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09982-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,28]]},"assertion":[{"value":"23 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}