{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T11:24:46Z","timestamp":1746444286653},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17558-1","type":"journal-article","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T06:02:00Z","timestamp":1699941720000},"page":"51647-51668","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multipurpose video watermarking algorithm for copyright protection and tamper detection"],"prefix":"10.1007","volume":"83","author":[{"given":"Kai","family":"An","sequence":"first","affiliation":[]},{"given":"Zhe-Ming","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xue-Cheng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zong-Hui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,14]]},"reference":[{"issue":"14","key":"17558_CR1","doi-asserted-by":"publisher","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","volume":"75","author":"AK Singh","year":"2016","unstructured":"Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381\u20138401","journal-title":"Multimed Tools Appl"},{"key":"17558_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.4018\/978-1-7998-2701-6.ch005","volume-title":"Chapter 5 in Handbook of Research on Multimedia Cyber Security","author":"BB Gupta","year":"2020","unstructured":"Gupta BB, Sahoo SR, Chugh P, Iota V, Shukla A (2020) Defending Multimedia Content Embedded in Online Social Networks (OSNs) Using Digital Watermarking. Chapter 5 in Handbook of Research on Multimedia Cyber Security. IGI Global, pp 90\u2013113. https:\/\/doi.org\/10.4018\/978-1-7998-2701-6.ch005"},{"key":"17558_CR3","doi-asserted-by":"publisher","first-page":"15816","DOI":"10.1109\/ACCESS.2018.2802928","volume":"6","author":"YG Wang","year":"2018","unstructured":"Wang YG, Xie D, Gupta BB (2018) A study on the collusion security of LUT-based client-side watermark embedding. IEEE Access 6:15816\u201315822","journal-title":"IEEE Access"},{"issue":"23","key":"17558_CR4","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1049\/el.2015.2522","volume":"51","author":"RO Preda","year":"2015","unstructured":"Preda RO, Vizireanu DN (2015) Watermarking-based image authentication robust to JPEG compression. Electron Lett 51(23):1873\u20131875","journal-title":"Electron Lett"},{"key":"17558_CR5","doi-asserted-by":"crossref","unstructured":"Noorkami M, Mersereau RM (2005) Compressed-domain video watermarking for H. 264. IEEE Int Conf Image Process 2005(2):II\u2013890","DOI":"10.1109\/ICIP.2005.1530199"},{"issue":"4","key":"17558_CR6","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TIFS.2010.2076280","volume":"5","author":"A Mansouri","year":"2010","unstructured":"Mansouri A, Aznaveh AM, Torkamani-Azar F et al (2010) A low complexity video watermarking in H. 264 compressed domain. IEEE Trans Inf Forensics Secur 5(4):649\u2013657","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1\u20132","key":"17558_CR7","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.csi.2009.06.004","volume":"32","author":"SD Lin","year":"2010","unstructured":"Lin SD, Shie SC, Guo JY (2010) Improving the robustness of DCT-based image watermarking against JPEG compression. Comput Stand Interfaces 32(1\u20132):54\u201360","journal-title":"Comput Stand Interfaces"},{"key":"17558_CR8","first-page":"458","volume":"2012","author":"K Deb","year":"2012","unstructured":"Deb K, Al-Seraj MS, Hoque MM et al (2012) Combined DWT-DCT based digital image watermarking technique for copyright protection. IEEE Int Conf Electr Comput Eng 2012:458\u2013461","journal-title":"IEEE Int Conf Electr Comput Eng"},{"key":"17558_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","volume":"53","author":"SA Parah","year":"2016","unstructured":"Parah SA, Sheikh JA, Loan NA et al (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit Signal Proc 53:11\u201324","journal-title":"Digit Signal Proc"},{"issue":"7","key":"17558_CR10","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s11760-013-0607-2","volume":"9","author":"N Yadav","year":"2015","unstructured":"Yadav N, Singh K (2015) Robust image-adaptive watermarking using an adjustable dynamic strength factor. SIViP 9(7):1531\u20131542","journal-title":"SIViP"},{"issue":"11","key":"17558_CR11","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"CC Lai","year":"2010","unstructured":"Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060\u20133063","journal-title":"IEEE Trans Instrum Meas"},{"issue":"11","key":"17558_CR12","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/83.967401","volume":"10","author":"V Solachidis","year":"2001","unstructured":"Solachidis V, Pitas L (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741\u20131753","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"17558_CR13","doi-asserted-by":"publisher","first-page":"033008","DOI":"10.1117\/1.3609010","volume":"20","author":"A Poljicak","year":"2011","unstructured":"Poljicak A, Mandic L, Agic D (2011) Discrete Fourier transform-based watermarking method with an optimal implementation radius. J Electron Imaging 20(3):033008","journal-title":"J Electron Imaging"},{"issue":"9","key":"17558_CR14","doi-asserted-by":"publisher","first-page":"13491","DOI":"10.1007\/s11042-020-10392-9","volume":"80","author":"XC Sun","year":"2021","unstructured":"Sun XC, Lu ZM, Wang Z et al (2021) A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT. Multimed Tools Appl 80(9):13491\u201313511","journal-title":"Multimed Tools Appl"},{"key":"17558_CR15","first-page":"136","volume":"5","author":"M Sharkas","year":"2005","unstructured":"Sharkas M, ElShafie D, Hamdy N (2005) A dual digital-image watermarking technique. WEC 2005 5:136\u2013139","journal-title":"WEC 2005"},{"key":"17558_CR16","first-page":"668","volume":"2007","author":"K Wu","year":"2007","unstructured":"Wu K, Yan W, Du J (2007) A robust dual digital-image watermarking technique. IEEE Int Conf Comput Intell Sec Workshops 2007:668\u2013671","journal-title":"IEEE Int Conf Comput Intell Sec Workshops"},{"key":"17558_CR17","unstructured":"Chemak C, Bouhlel MS, Lapayre JC (2007) A new scheme of robust image watermarking: the double watermarking algorithm. Proceedings of the 2007 summer computer simulation conference 2007 1201\u20131208"},{"key":"17558_CR18","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.patrec.2016.12.010","volume":"94","author":"IA Ansari","year":"2017","unstructured":"Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recognit Lett 94:228\u2013236","journal-title":"Pattern Recognit Lett"},{"issue":"1","key":"17558_CR19","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s11042-014-2301-y","volume":"75","author":"H Shi","year":"2016","unstructured":"Shi H, Li M, Guo C et al (2016) A region-adaptive semi-fragile dual watermarking scheme. Multimed Tools Appl 75(1):465\u2013495","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"17558_CR20","doi-asserted-by":"publisher","first-page":"27085","DOI":"10.1007\/s11042-017-4743-5","volume":"78","author":"B Lei","year":"2019","unstructured":"Lei B, Zhao X, Lei H et al (2019) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 78(19):27085\u201327107","journal-title":"Multimed Tools Appl"},{"key":"17558_CR21","volume-title":"Transform coding of images","author":"RJ Clark","year":"1985","unstructured":"Clark RJ (1985) Transform coding of images. Academic Press, New York"},{"key":"17558_CR22","volume-title":"Two-dimensional signal and image processing","author":"JS Lim","year":"1990","unstructured":"Lim JS (1990) Two-dimensional signal and image processing. Prentice Hall PTR, New Jersey"},{"issue":"9","key":"17558_CR23","doi-asserted-by":"publisher","first-page":"40","DOI":"10.5815\/ijigsp.2017.09.05","volume":"9","author":"S Das","year":"2017","unstructured":"Das S, Banerjee M, Chaudhuri A (2017) An improved DCT based image watermarking robust against JPEG compression and other attacks. Int J Image Graphics Signal Process 9(9):40","journal-title":"Int J Image Graphics Signal Process"},{"key":"17558_CR24","unstructured":"Xiph.Org Foundation (2020) Xiph.org Video Test Media [derf\u2019s collection]. https:\/\/media.xiph.org\/video\/derf. Accessed 20 Apr 2020"},{"issue":"6","key":"17558_CR25","doi-asserted-by":"publisher","first-page":"7187","DOI":"10.1007\/s11042-017-4628-7","volume":"77","author":"L Chen","year":"2018","unstructured":"Chen L, Zhao J (2018) Contourlet-based image and video watermarking robust to geometric attacks and compressions. Multimed Tools Appl 77(6):7187\u20137204","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17558-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17558-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17558-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T07:41:33Z","timestamp":1715758893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17558-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":25,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17558"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17558-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,14]]},"assertion":[{"value":"14 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}