{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T21:33:23Z","timestamp":1649021603670},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2008,10,11]],"date-time":"2008-10-11T00:00:00Z","timestamp":1223683200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s11235-008-9141-x","type":"journal-article","created":{"date-parts":[[2008,10,10]],"date-time":"2008-10-10T16:13:55Z","timestamp":1223655235000},"page":"5-15","source":"Crossref","is-referenced-by-count":13,"title":["Integrating SVM classification with SVD watermarking for\u00a0intelligent video\u00a0authentication"],"prefix":"10.1007","volume":"40","author":[{"given":"Richa","family":"Singh","sequence":"first","affiliation":[]},{"given":"Mayank","family":"Vatsa","sequence":"additional","affiliation":[]},{"given":"Sanjay K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Saurabh","family":"Upadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,10,11]]},"reference":[{"key":"9141_CR1","doi-asserted-by":"crossref","unstructured":"Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. In Proceedings of IEEE international conference on image processing (Vol.\u00a01, pp.\u00a0435\u2013439).","DOI":"10.1109\/ICIP.1998.723518"},{"key":"9141_CR2","doi-asserted-by":"crossref","unstructured":"Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2002). Video authentication with self recovery. In Proceedings of security and watermarking of multimedia contents (Vol.\u00a04314, pp.\u00a0531\u2013541).","DOI":"10.1117\/12.465311"},{"key":"9141_CR3","doi-asserted-by":"crossref","unstructured":"Cross, D., & Mobasseri, B. G. (2002). Watermarking for self authentication of compressed video. In Proceedings of IEEE international conference on image processing (Vol.\u00a02, pp.\u00a0913\u2013916).","DOI":"10.1109\/ICIP.2002.1040100"},{"issue":"6","key":"9141_CR4","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6),644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9141_CR5","doi-asserted-by":"crossref","unstructured":"Ditmann, J., Steinmetz, A., & Steinmetz, R. (1999). Content based digital signature for motion pictures authentication and content fragile watermarking. In Proceedings of IEEE international conference on multimedia computing and systems (Vol.\u00a02, pp.\u00a0209\u2013213).","DOI":"10.1109\/MMCS.1999.778274"},{"key":"9141_CR6","unstructured":"He, D., Sun, O., & Tian, O. (2003). A semi fragile object based video authentication system. In Proceedings of international symposium on circuits and systems (Vol.\u00a03, pp.\u00a0814\u2013817)."},{"key":"9141_CR7","first-page":"2185","volume":"14","author":"D. He","year":"2004","unstructured":"He, D., Sun, O., & Tian, O. (2004). A secure and robust object-based video authentication system. EURASIP Journal on Applied Signal Processing, 14, 2185\u20132200.","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"9141_CR8","unstructured":"Kong, W., Yang, B., Wu, D., & Niu, X. (2006). Blind video watermarking algorithm. In Proceedings of international conference on innovative computing, information and control (pp.\u00a0265\u2013268)."},{"key":"9141_CR9","unstructured":"Kovesi, P. D. (1999). Image features from phase congruency. Journal of Computer Vision Research, 1(3)."},{"key":"9141_CR10","doi-asserted-by":"crossref","unstructured":"Latechi, L., Wildt, D., & Hu, J. (2001). Extraction of key frames from videos by optimal color composition matching and polygon simplification. In Proceedings of multimedia signal processing (pp.\u00a0245\u2013250).","DOI":"10.1109\/MMSP.2001.962741"},{"key":"9141_CR11","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1117\/12.344703","volume":"3657","author":"C. Y. Lin","year":"1999","unstructured":"Lin, C. Y., & Chang, S. F. (1999). Issues and solutions for authenticating MPEG video. SPIE Electronic Imaging Security and Watermarking of Multimedia Contents, 3657, 54\u201365.","journal-title":"SPIE Electronic Imaging Security and Watermarking of Multimedia Contents"},{"issue":"2","key":"9141_CR12","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/TMM.2003.811621","volume":"5","author":"C. S. Lu","year":"2003","unstructured":"Lu, C. S., & Liao, H. Y. M. (2003). Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Transactions on Multimedia, 5(2), 161\u2013173.","journal-title":"IEEE Transactions on Multimedia"},{"key":"9141_CR13","doi-asserted-by":"crossref","unstructured":"Mobasseri, B. G., & Evans, A. E. (2001). Content dependent video authentication by self water marking in color space. In Proceedings of security and watermarking of multimedia contents III (Vol.\u00a04314, pp.\u00a035\u201346).","DOI":"10.1117\/12.435437"},{"key":"9141_CR14","doi-asserted-by":"crossref","unstructured":"Pramateftakis, A., Oelbaum, T., & Diepold, K. (2004). Authentication of MPEG-4-based surveillance video. In Proceedings of IEEE international conference on image processing (Vol.\u00a01, pp.\u00a033\u201337).","DOI":"10.1109\/ICIP.2004.1418683"},{"key":"9141_CR15","doi-asserted-by":"crossref","unstructured":"Queluz, M. P. (1998). Toward robust, content based techniques for image authentication. In Proceedings of IEEE second workshop on multimedia signal processing (pp.\u00a0297\u2013302).","DOI":"10.1109\/MMSP.1998.738950"},{"issue":"3","key":"9141_CR16","doi-asserted-by":"crossref","first-page":"213","DOI":"10.3233\/JCS-1997-5303","volume":"5","author":"J. Quisquater","year":"1997","unstructured":"Quisquater, J. (1997). Authentication of sequences with the SL2 hash function application to video sequences. Journal of Computer Security, 5(3), 213\u2013223.","journal-title":"Journal of Computer Security"},{"key":"9141_CR17","first-page":"327","volume-title":"Soft computing in image processing: recent advances","author":"R. Singh","year":"2006","unstructured":"Singh, R., Vatsa, M., & Noore, A. (2006). Intelligent biometric information fusion using support vector machine. In M. Nachtegael, D. V. Weken, E. E. Kerre, & W. Philips (Eds.), Soft computing in image processing: recent advances (pp. 327\u2013350). Berlin: Springer."},{"key":"9141_CR18","unstructured":"Sun, Q., Chang, F. S., & Maeno, K. (2002). A new semi fragile image authentication framework combining ECC and PKI infrastructure. In Proceedings of IEEE international symposium on circuits and systems (Vol.\u00a02, pp.\u00a0440\u2013443)."},{"key":"9141_CR19","unstructured":"Sun, Q., He, D., Zhang, Z., & Tian, Q. (2003). A secure and robust approach to scalable video authentication. In Proceedings of international conference on multimedia and expo (Vol.\u00a02, pp.\u00a0209\u2013212)."},{"key":"9141_CR20","doi-asserted-by":"crossref","unstructured":"Thiemert, S., Sahbi, H., & Steinebach, M. (2006). Using entropy for image and video authentication watermarks. In Proceedings of SPIE security, steganography, and watermarking of multimedia contents VIII (Vol.\u00a06072, pp.\u00a0470\u2013479).","DOI":"10.1117\/12.643053"},{"key":"9141_CR21","doi-asserted-by":"crossref","unstructured":"Uehara, T., Naini, R. S., & Ogunbona, P. (2004). An MPEG tolerant authentication system for video data. In Proceedings of IEEE international conference on multimedia and expo (Vol.\u00a02, pp.\u00a0891\u2013894).","DOI":"10.1109\/ICME.2004.1394344"},{"key":"9141_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"V. N. Vapnik","year":"1995","unstructured":"Vapnik, V. N. (1995). The nature of statistical learning theory. Berlin: Springer."},{"key":"9141_CR23","unstructured":"Wohlmacher, P. (1998). Requirements and mechanism of IT-security including aspects of multimedia security. In Proceedings of multimedia and security workshop at ACM multimedia (p.\u00a011)."},{"key":"9141_CR24","unstructured":"Yan, W. Q., & Kankanhalli, M. S. (2003). Motion trajectory based video authentication. In Proceedings of international symposium on circuits and systems (Vol.\u00a03, pp.\u00a0810\u2013813)."},{"key":"9141_CR25","doi-asserted-by":"crossref","unstructured":"Yin, P., & Yu, H. H. (2001). Classification of video tampering methods and countermeasures using digital watermarking. In Proceedings of SPIE multimedia systems and applications IV (Vol.\u00a04518, pp.\u00a0239\u2013246).","DOI":"10.1117\/12.448208"},{"key":"9141_CR26","unstructured":"Zhao, L., Qi, W., Li, S., Yang, S., & Zhang, H. (2002). Key frame extraction and shot retrieval using nearest feature line (NFL). In Proceedings of international workshop on multimedia information retrieval. In conjunction with ACM multimedia conference (pp.\u00a0217\u2013220)."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-008-9141-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-008-9141-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-008-9141-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:47:12Z","timestamp":1559386032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-008-9141-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,11]]},"references-count":26,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["9141"],"URL":"https:\/\/doi.org\/10.1007\/s11235-008-9141-x","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,10,11]]}}}