{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:02:58Z","timestamp":1763348578377,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16223-x","type":"journal-article","created":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T06:01:32Z","timestamp":1689400892000},"page":"16395-16415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A secure system for digital video applications using an intelligent crypto model"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3446-7808","authenticated-orcid":false,"given":"Vinit","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Shital Sunil","family":"Mali","sequence":"additional","affiliation":[]},{"given":"G.","family":"Rajender","sequence":"additional","affiliation":[]},{"given":"Nageswara Rao","family":"Medikondu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,15]]},"reference":[{"issue":"2","key":"16223_CR1","first-page":"207","volume":"74","author":"O Al-Sanjary","year":"2015","unstructured":"Al-Sanjary O, Sulong G, Ismael Al-sanjary O (2015) Detection of video forgery: A review of literature. J Theor Appl Inf Technol 74(2):207\u2013220","journal-title":"J Theor Appl Inf Technol"},{"key":"16223_CR2","doi-asserted-by":"publisher","unstructured":"Ambadekar SP, Jain J, Khanapuri J (2019) Digital image watermarking through encryption and DWT for copyright protection. In Recent trends in signal and image processing, Springer, Singapore, pp 187\u2013195. https:\/\/doi.org\/10.1007\/978-981-10-8863-6_19","DOI":"10.1007\/978-981-10-8863-6_19"},{"key":"16223_CR3","doi-asserted-by":"publisher","first-page":"205034","DOI":"10.1109\/ACCESS.2020.3036916","volume":"8","author":"L Caruccio","year":"2020","unstructured":"Caruccio L, Desiato D, Polese G, Tortora G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access 8:205034\u2013205050. https:\/\/doi.org\/10.1109\/ACCESS.2020.3036916","journal-title":"IEEE Access"},{"key":"16223_CR4","unstructured":"Chimanna MA, Khot SR (2013) Digital video watermarking techniques for secure multimedia creation and delivery. Int J Eng Res 3(2):839844"},{"issue":"18","key":"16223_CR5","doi-asserted-by":"publisher","first-page":"5162","DOI":"10.3390\/s20185162","volume":"20","author":"CL Chowdhary","year":"2020","unstructured":"Chowdhary CL, Patel PV, Kathrotia KJ, Attique M, Perumal K, Ijaz MF (2020) Analytical study of hybrid techniques for image encryption and decryption. Sensors 20(18):5162. https:\/\/doi.org\/10.3390\/s20185162","journal-title":"Sensors"},{"issue":"2","key":"16223_CR6","first-page":"138","volume":"5","author":"PS Darshana Hooda","year":"2014","unstructured":"Darshana Hooda PS, Dcrust M (2014) Remote Reference Passing Framework for Video Encryption. Int J Comput Sci Commun 5(2):138\u2013147","journal-title":"Int J Comput Sci Commun"},{"key":"16223_CR7","unstructured":"Desiato D, Tortora G (2018) A Methodology for GDPR Compliant Data Processing. SEBD."},{"issue":"2","key":"16223_CR8","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1049\/iet-ipr.2018.5250","volume":"14","author":"H Elkamchouchi","year":"2020","unstructured":"Elkamchouchi H, Salama WM, Abouelseoud Y (2020) New video encryption schemes based on chaotic maps. IET Image Process 14(2):397\u2013406. https:\/\/doi.org\/10.1049\/iet-ipr.2018.5250","journal-title":"IET Image Process"},{"key":"16223_CR9","doi-asserted-by":"publisher","unstructured":"Elshamy AM, Abdelghany MA, Alhamad AQ, Hamed HF, Kelash HM, Hussein AI (2017) Secure implementation for video streams based on fully and permutation encryption techniques. In 2017 International Conference on Computer and Applications (ICCA). IEEE, pp 50\u201355. https:\/\/doi.org\/10.1109\/COMAPP.2017.8079738","DOI":"10.1109\/COMAPP.2017.8079738"},{"issue":"5","key":"16223_CR10","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.1007\/s12083-020-01023-z","volume":"14","author":"A Garba","year":"2021","unstructured":"Garba A, Dwivedi AD, Kamal M, Srivastava G, Tariq M, Hasan MA, Chen Z (2021) A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw Appl 14(5):2665\u201380. https:\/\/doi.org\/10.1007\/s12083-020-01023-z","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"16223_CR11","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/TMM.2019.2925961","volume":"22","author":"S Ghimire","year":"2019","unstructured":"Ghimire S, Choi JY, Lee B (2019) Using blockchain for improved video integrity verification. IEEE Trans Multimedia 22(1):108\u2013121. https:\/\/doi.org\/10.1109\/TMM.2019.2925961","journal-title":"IEEE Trans Multimedia"},{"issue":"7","key":"16223_CR12","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-017-4754-2","volume":"77","author":"Y Himeur","year":"2018","unstructured":"Himeur Y, Boukabou A (2018) A robust and secure keyframe based video watermarking system using chaotic encryption. Multimed Tools Appl 77(7):8603\u20138627. https:\/\/doi.org\/10.1007\/s11042-017-4754-2","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"16223_CR13","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s11042-019-08225-5","volume":"79","author":"M Jafari Barani","year":"2020","unstructured":"Jafari Barani M, Ayubi P, Yousefi Valandar M, Yosefnezhad Irani B (2020) A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed Tools Appl 79(3):2127\u20132159. https:\/\/doi.org\/10.1007\/s11042-019-08225-5","journal-title":"Multimed Tools Appl"},{"key":"16223_CR14","doi-asserted-by":"publisher","first-page":"38543","DOI":"10.1007\/s11042-022-13113-6","volume":"81","author":"M Jallouli","year":"2022","unstructured":"Jallouli M, Sayahi I, Mabrouk AB (2022) Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission. Multimed Tools Appl 81:38543\u201338567. https:\/\/doi.org\/10.1007\/s11042-022-13113-6","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"16223_CR15","doi-asserted-by":"publisher","first-page":"2427","DOI":"10.1007\/s11277-021-08562-5","volume":"120","author":"N Jayapandian","year":"2021","unstructured":"Jayapandian N (2021) Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm. Wirel Pers Commun 120(3):2427\u20132447. https:\/\/doi.org\/10.1007\/s11277-021-08562-5","journal-title":"Wirel Pers Commun"},{"key":"16223_CR16","doi-asserted-by":"publisher","first-page":"102410","DOI":"10.1016\/j.jisa.2019.102410","volume":"50","author":"SM Kareem","year":"2020","unstructured":"Kareem SM, Rahma AM (2020) A novel approach for the development of the Twofish algorithm based on multi-level key space. J Inf Secur Appl 50:102410. https:\/\/doi.org\/10.1016\/j.jisa.2019.102410","journal-title":"J Inf Secur Appl"},{"key":"16223_CR17","doi-asserted-by":"publisher","first-page":"64955","DOI":"10.1109\/ACCESS.2019.2916674","volume":"7","author":"U Khadam","year":"2019","unstructured":"Khadam U, Iqbal MM, Azam MA, Khalid S, Rho S, Chilamkurti N (2019) Digital watermarking technique for text document protection using data mining analysis. IEEE Access 7:64955\u201364965. https:\/\/doi.org\/10.1109\/ACCESS.2019.2916674","journal-title":"IEEE Access"},{"issue":"2","key":"16223_CR18","doi-asserted-by":"publisher","first-page":"175","DOI":"10.3390\/e22020175","volume":"22","author":"PW Khan","year":"2020","unstructured":"Khan PW, Byun Y (2020) A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy 22(2):175. https:\/\/doi.org\/10.3390\/e22020175","journal-title":"Entropy"},{"issue":"4","key":"16223_CR19","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","volume":"19","author":"N Kshetri","year":"2017","unstructured":"Kshetri N (2017) Can blockchain strengthen the Internet of things? IT professional 19(4):68\u201372. https:\/\/doi.org\/10.1109\/MITP.2017.3051335","journal-title":"IT professional"},{"key":"16223_CR20","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jpdc.2021.02.022","volume":"152","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R, Marchang N, Srivastava G, Gadekallu TR, Xiong NN (2021) A secured distributed detection system based on IPFS and blockchain for industrial image and video data security. J Parallel Distrib Comput 152:128\u2013143. https:\/\/doi.org\/10.1016\/j.jpdc.2021.02.022","journal-title":"J Parallel Distrib Comput"},{"issue":"39","key":"16223_CR21","doi-asserted-by":"publisher","first-page":"29161","DOI":"10.1007\/s11042-020-09448-7","volume":"79","author":"Y Li","year":"2020","unstructured":"Li Y, Li Z, Ma M, Wang M (2020) Generation of grid multi-wing chaotic attractors and its application in video secure communication system. Multimed Tools Appl 79(39):29161\u201329177. https:\/\/doi.org\/10.1007\/s11042-020-09448-7","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"16223_CR22","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3390\/healthcare8030243","volume":"8","author":"H Liu","year":"2020","unstructured":"Liu H, Crespo RG, Mart\u00ednez OS (2020) Enhancing privacy and data security across healthcare applications using blockchain and distributed ledger concepts. Healthcare 8(3):243. https:\/\/doi.org\/10.3390\/healthcare8030243","journal-title":"Healthcare"},{"key":"16223_CR23","unstructured":"Liu Q, Safavi-Naini R, Sheppard NP (2003) Digital rights management for content distribution. In Conferences in Research and Practice in Information Technology Series 34:49-58"},{"key":"16223_CR24","doi-asserted-by":"publisher","unstructured":"Malladar R, Sanjeev Kunte R (2019) Selective Video Encryption Based on Entropy Measure. Integrated Intelligent Computing, Communication and Security, Springer, Singapore, pp 603\u2013612. https:\/\/doi.org\/10.1007\/978-981-10-8797-4_61","DOI":"10.1007\/978-981-10-8797-4_61"},{"issue":"5","key":"16223_CR25","doi-asserted-by":"publisher","first-page":"2088","DOI":"10.11591\/ijece.v12i5","volume":"12","author":"AT Maolood","year":"2022","unstructured":"Maolood AT, Gbashi EK, Mahmood ES (2022) Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map. Int J Electr Comput Eng 12(5):2088\u20138708. https:\/\/doi.org\/10.11591\/ijece.v12i5","journal-title":"Int J Electr Comput Eng"},{"key":"16223_CR26","doi-asserted-by":"publisher","first-page":"100107","DOI":"10.1016\/j.iot.2019.100107","volume":"8","author":"BK Mohanta","year":"2019","unstructured":"Mohanta BK, Jena D, Panda SS, Sobhanayak S (2019) Blockchain technology: A survey on applications and security privacy challenges. Internet of Things 8:100107. https:\/\/doi.org\/10.1016\/j.iot.2019.100107","journal-title":"Internet of Things"},{"issue":"1","key":"16223_CR27","doi-asserted-by":"publisher","first-page":"28","DOI":"10.33969\/JIEC.2019.11004","volume":"1","author":"VR Prakash","year":"2019","unstructured":"Prakash VR (2019) An enhanced coding algorithm for efficient video coding. J Inst Electron Comput 1(1):28\u201338. https:\/\/doi.org\/10.33969\/JIEC.2019.11004","journal-title":"J Inst Electron Comput"},{"key":"16223_CR28","doi-asserted-by":"publisher","unstructured":"Ravi H, Subramanyam AV, Gupta G, Kumar BA (2014) Compression noise based video forgery detection. 2014 IEEE International Conferences on Image Processing. IEEE. https:\/\/doi.org\/10.1109\/ICIP.2014.7026083","DOI":"10.1109\/ICIP.2014.7026083"},{"key":"16223_CR29","doi-asserted-by":"publisher","unstructured":"Ren Z, Cong K, Aerts T, de Jonge B, Morais A, Erkin Z (2018)A scale-out blockchain for value transfer with spontaneous sharding. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE. https:\/\/doi.org\/10.1109\/CVCBT.2018.00006","DOI":"10.1109\/CVCBT.2018.00006"},{"key":"16223_CR30","doi-asserted-by":"publisher","first-page":"13877","DOI":"10.1007\/s11042-018-6721-y","volume":"78","author":"I Sayahi","year":"2019","unstructured":"Sayahi I, Elkefi A, Amar CB (2019) Crypto-watermarking system for safe transmission of 3D multiresolution meshes. Multimed Tools Appl 78:13877\u201313903. https:\/\/doi.org\/10.1007\/s11042-018-6721-y","journal-title":"Multimed Tools Appl"},{"key":"16223_CR31","doi-asserted-by":"publisher","unstructured":"Sharma S, Kumar K (2018) GUESS: genetic uses in video encryption with secret sharing. In Proceedings of 2nd international conference on computer vision & image processing, Springer, Singapore, pp 51\u201362. https:\/\/doi.org\/10.1007\/978-981-10-7895-8_5","DOI":"10.1007\/978-981-10-7895-8_5"},{"issue":"1","key":"16223_CR32","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1080\/02533839.2018.1537807","volume":"42","author":"TY Wu","year":"2019","unstructured":"Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20\u201328. https:\/\/doi.org\/10.1080\/02533839.2018.1537807","journal-title":"J Chin Inst Eng"},{"key":"16223_CR33","doi-asserted-by":"publisher","unstructured":"Xu R, Zhang L, Zhao H, Peng Y (2017) Design of network media's digital rights management scheme based on blockchain technology. In 2017 IEEE 13th international symposium on autonomous decentralized system (ISADS). IEEE, pp 128\u2013133. https:\/\/doi.org\/10.1109\/ISADS.2017.21","DOI":"10.1109\/ISADS.2017.21"},{"key":"16223_CR34","doi-asserted-by":"publisher","first-page":"5129","DOI":"10.1007\/s11042-017-4380-z","volume":"77","author":"KH Yeh","year":"2018","unstructured":"Yeh KH, Lo NW, Wan CK (2018) A robust NFC-based personalized IPTV service system. Multimed Tools Appl 77:5129\u20135148. https:\/\/doi.org\/10.1007\/s11042-017-4380-z","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"16223_CR35","first-page":"1","volume":"21","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhong S, Wang T, Chao HC, Wang J (2020) Blockchain-based systems and applications: a survey. J Internet Technol 21(1):1\u20134","journal-title":"J Internet Technol"},{"key":"16223_CR36","doi-asserted-by":"publisher","unstructured":"Zhao H, Liu Y, Wang Y, Huang Y (2020) Hiding Data into Blockchain-based Digital Video for Security Protection. In 2020 3rd International Conference on Smart BlockChain (SmartBlock). IEEE, pp 23\u201328. https:\/\/doi.org\/10.1109\/SmartBlock52591.2020.00012","DOI":"10.1109\/SmartBlock52591.2020.00012"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16223-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16223-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16223-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T08:37:04Z","timestamp":1706690224000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16223-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,15]]},"references-count":36,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["16223"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16223-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,7,15]]},"assertion":[{"value":"13 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"For this type of analysis formal consent is not needed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare that they have no potential conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Potential Conflict of Interest"}}]}}