{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:55:20Z","timestamp":1767142520384,"version":"build-2238731810"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T00:00:00Z","timestamp":1675987200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T00:00:00Z","timestamp":1675987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11265-022-01830-y","type":"journal-article","created":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T12:18:22Z","timestamp":1676031502000},"page":"363-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Wavelet Optimized Video Copy Detection Using Content Fingerprinting"],"prefix":"10.1007","volume":"95","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-8984","authenticated-orcid":false,"given":"S.","family":"Preetha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1447-8406","authenticated-orcid":false,"given":"V. R.","family":"Bindu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,10]]},"reference":[{"issue":"2","key":"1830_CR1","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s13735-018-0159-x","volume":"8","author":"A Wary","year":"2019","unstructured":"Wary, A., & Neelima, A. (2019). A review on robust video copy detection. International Journal of Multimedia Information Retrieval, 8(2), 61\u201378.","journal-title":"International Journal of Multimedia Information Retrieval"},{"issue":"12","key":"1830_CR2","doi-asserted-by":"publisher","first-page":"2029","DOI":"10.3390\/electronics9122029","volume":"9","author":"X Liu","year":"2020","unstructured":"Liu, X., Liang, J., Wang, Z. Y., Tsai, Y. T., Lin, C. C., & Chen, C. C. (2020). Content-based image copy detection using convolutional neural network. Electronics, 9(12), 2029.","journal-title":"Electronics"},{"key":"1830_CR3","doi-asserted-by":"crossref","unstructured":"Dong, X., Zhang, W., Shah, M., Wang, B., & Yu, N. (2020).Watermarking-based\nsecure plaintext image protocols for storage, show, deletion and retrieval in the cloud. IEEE\nTransactions on Services Computing\u00a0(pp. 1-15).","DOI":"10.1109\/TSC.2020.3008957"},{"key":"1830_CR4","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2020.06.066","volume":"542","author":"X Liu","year":"2021","unstructured":"Liu, X., Wang, Y., Sun, Z., Wang, L., Zhao, R., Zhu, Y., & Fang, H. (2021). Robust and discriminative zero-watermark scheme based on invariant features and similarity-based retrieval to protect large-scale DIBR 3D videos. Information Sciences, 542, 263\u2013285.","journal-title":"Information Sciences"},{"issue":"sup1","key":"1830_CR5","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1080\/21642583.2020.1833782","volume":"9","author":"L Xinwei","year":"2021","unstructured":"Xinwei, L., Lianghao, X., & Yi, Y. (2021). Compact video fingerprinting via an improved capsule net. Systems Science & Control Engineering, 9(sup1), 122\u2013130.","journal-title":"Systems Science & Control Engineering"},{"issue":"13","key":"1830_CR6","doi-asserted-by":"publisher","first-page":"17309","DOI":"10.1007\/s11042-017-5307-4","volume":"77","author":"Y Himeur","year":"2018","unstructured":"Himeur, Y., & Sadi, K. A. (2018). Robust video copy detection based on ring decomposition based binarized statistical image features and invariant color descriptor (RBSIF-ICD). Multimedia Tools and Applications, 77(13), 17309\u201317331.","journal-title":"Multimedia Tools and Applications"},{"key":"1830_CR7","doi-asserted-by":"crossref","unstructured":"Karthika, P., & VidhyaSaraswathi, P. (2018). Digital video copy detection using steganography frame based fusion techniques. In Proceedings of the International Conference on ISMAC\nin Computational Vision and Bio-Engineering 2018 (ISMAC-CVB) (pp. 61-68), Lecture Notes\nin Computational Vision and Biomechanics 30.","DOI":"10.1007\/978-3-030-00665-5_7"},{"key":"1830_CR8","unstructured":"Meenachi, E., Vinayagam, G. S., & Vinothini, C. (2012). Enhancing security in a\nvideo copy detection system using content based fingerprinting. International Journal of Modern Engineering Research (IJMER), 2(4), 1747\u20131753."},{"issue":"4","key":"1830_CR9","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TMM.2016.2629758","volume":"19","author":"X Nie","year":"2016","unstructured":"Nie, X., Yin, Y., Sun, J., Liu, J., & Cui, C. (2016). Comprehensive feature-based robust video fingerprinting using tensor model. IEEE Transactions on Multimedia, 19(4), 785\u2013796.","journal-title":"IEEE Transactions on Multimedia"},{"key":"1830_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.ijleo.2016.09.105","volume":"128","author":"R Sun","year":"2017","unstructured":"Sun, R., Yan, X., & Gao, J. (2017). Robust video fingerprinting scheme based on contourlet hidden Markov tree model. Optik, 128, 139\u2013147.","journal-title":"Optik"},{"key":"1830_CR11","unstructured":"Mengyang, L. I. U., Po, L. M., Chang, Z. H. O. U., Yuen, W. Y., Cheung, H. K.,\nPeter, H. W., ... & Lau, K. W. (2018). Contentbased video copy detection using binary object\nfingerprints. In 2018 IEEE International Conference on Signal Processing, Communications\nand Computing (ICSPCC)\u00a0(pp. 1\u20136)."},{"issue":"8","key":"1830_CR12","doi-asserted-by":"publisher","first-page":"10601","DOI":"10.1007\/s11042-018-6639-4","volume":"78","author":"M Liu","year":"2019","unstructured":"Liu, M., Po, L. M., Rehman, Y. A. U., Xu, X., Li, Y., & Feng, L. (2019). Video copy detection by conducting fast searching of inverted files. Multimedia Tools and Applications, 78(8), 10601\u201310624.","journal-title":"Multimedia Tools and Applications"},{"key":"1830_CR13","doi-asserted-by":"crossref","unstructured":"Wary, A., & Neelima, A. (2020). Ring decomposition based video copy detection using\nglobal ordinal measure features and local features. Multimedia Tools and Applications\u00a0(pp. 1\u201337).","DOI":"10.1007\/s11042-019-08412-4"},{"key":"1830_CR14","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhao, X., & Cao, Y. (2020). Detecting the fingerprint of video data hiding\ntool OpenPuff. Forensic Science International: Reports, 2(1), 1\u20136.","DOI":"10.1016\/j.fsir.2020.100088"},{"key":"1830_CR15","doi-asserted-by":"crossref","unstructured":"Prakash, C. S., & Maheshkar, S. (2020). Copy-move forgery detection using DyWT. In Cyber warfare and terrorism: Concepts, methodologies, tools, and applications, IGI\nGlobal\u00a0(pp. 741\u2013750).","DOI":"10.4018\/978-1-7998-2466-4.ch046"},{"issue":"15","key":"1830_CR16","doi-asserted-by":"publisher","first-page":"21999","DOI":"10.1007\/s11042-019-7513-8","volume":"78","author":"W Tang","year":"2019","unstructured":"Tang, W., Wo, Y., & Han, G. (2019). Geometrically robust video hashing based on ST-PCT for video copy detection. Multimedia Tools and Applications, 78(15), 21999\u201322022.","journal-title":"Multimedia Tools and Applications"},{"issue":"18","key":"1830_CR17","doi-asserted-by":"publisher","first-page":"23751","DOI":"10.1007\/s11042-018-5624-2","volume":"77","author":"K Zhou","year":"2018","unstructured":"Zhou, K., Zhao, L., & Lin, T. (2018). A flexible and uniform string matching technique for general screen content coding. Multimedia Tools and Applications, 77(18), 23751\u201323775.","journal-title":"Multimedia Tools and Applications"},{"issue":"16","key":"1830_CR18","doi-asserted-by":"publisher","first-page":"23877","DOI":"10.1007\/s11042-021-10810-6","volume":"80","author":"A Rani","year":"2021","unstructured":"Rani, A., Jain, A., & Kumar, M. (2021). Identification of copy-move and splicing based forgeries using advanced SURF and revised template matching. Multimedia Tools and Applications, 80(16), 23877\u201323898.","journal-title":"Multimedia Tools and Applications"},{"key":"1830_CR19","doi-asserted-by":"publisher","first-page":"395","DOI":"10.14257\/ijsip.2016.9.10.35","volume":"9","author":"M Kumar","year":"2016","unstructured":"Kumar, M., Sriastava, S., & Hensman, A. (2016). A hybrid novel approach of video watermarking. International Journal of Signal Processing Image Processing Pattern Recognit, 9, 395\u2013406.","journal-title":"International Journal of Signal Processing Image Processing Pattern Recognit"},{"issue":"7","key":"1830_CR20","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.3390\/app9071345","volume":"9","author":"M Rhif","year":"2019","unstructured":"Rhif, M., Ben Abbes, A., Farah, I. R., Mart\u00ednez, B., & Sang, Y. (2019). Wavelet transform application for\/in non-stationary time-series analysis: A review. Applied Sciences, 9(7), 1345.","journal-title":"Applied Sciences"},{"key":"1830_CR21","doi-asserted-by":"publisher","first-page":"104106","DOI":"10.1016\/j.jappgeo.2020.104106","volume":"179","author":"M Aleardi","year":"2020","unstructured":"Aleardi, M. (2020). Discrete cosine transform for parameter space reduction in linear and non-linear AVA inversions. Journal of Applied Geophysics, 179, 104106.","journal-title":"Journal of Applied Geophysics"},{"key":"1830_CR22","doi-asserted-by":"crossref","unstructured":"Pires, I. M., Santos, R., Pombo, N., Garcia, N. M., Fl\u00f3rez-Revuelta, F., Spinsante, S., ... & Zdravevski, E. (2018). Recognition of activities of daily living based on environmental analyses using audio fingerprinting techniques: A systematic review. Sensors, 18(1), 160.","DOI":"10.3390\/s18010160"},{"issue":"4","key":"1830_CR23","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.bspc.2011.07.001","volume":"7","author":"A Daamouche","year":"2012","unstructured":"Daamouche, A., Hamami, L., Alajlan, N., & Melgani, F. (2012). A wavelet optimization approach for ECG signal classification. Biomedical Signal Processing and Control, 7(4), 342\u2013349.","journal-title":"Biomedical Signal Processing and Control"},{"key":"1830_CR24","doi-asserted-by":"crossref","unstructured":"He, S., & Kirovski, D. (2007). An estimation attack on contentbased video\nfingerprinting. In Transactions on Data Hiding and Multimedia Security II\u00a0(pp. 35\u201347).","DOI":"10.1007\/978-3-540-73092-7_2"},{"issue":"2","key":"1830_CR25","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/ip-vis:19949924","volume":"141","author":"BG Sherlock","year":"1994","unstructured":"Sherlock, B. G., Monro, D. M., & Millard, K. (1994). Fingerprint enhancement by directional Fourier filtering. IEEE Proceedings-Vision, Image and Signal Processing, 141(2), 87\u201394.","journal-title":"IEEE Proceedings-Vision, Image and Signal Processing"},{"issue":"9","key":"1830_CR26","doi-asserted-by":"publisher","first-page":"4373","DOI":"10.1007\/s00521-020-05251-5","volume":"33","author":"K Khelil","year":"2021","unstructured":"Khelil, K., Berrezzek, F., & Bouadjila, T. (2021). GA-based design of optimal discrete wavelet filters for efficient wind speed forecasting. Neural Computing and Applications, 33(9), 4373\u20134386.","journal-title":"Neural Computing and Applications"},{"issue":"13","key":"1830_CR27","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","volume":"179","author":"E Rashedi","year":"2009","unstructured":"Rashedi, E., Nezamabadi-Pour, H., & Saryazdi, S. (2009). GSA: A gravitational search algorithm. Information sciences, 179(13), 2232\u20132248.","journal-title":"Information sciences"},{"issue":"2","key":"1830_CR28","doi-asserted-by":"publisher","first-page":"1631","DOI":"10.1007\/s12652-020-02235-0","volume":"12","author":"WM Alenazy","year":"2021","unstructured":"Alenazy, W. M., & Alqahtani, A. S. (2021). Gravitational search algorithm based optimized deep learning model with diverse set of features for facial expression recognition. Journal of Ambient Intelligence and Humanized Computing, 12(2), 1631\u20131646.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"#cr-split#-1830_CR29.1","unstructured":"Singh, A., Deep, K., & Nagar, A. (2015). A new Improved Gravitational Search"},{"key":"#cr-split#-1830_CR29.2","unstructured":"Algorithm for Function Optimization using a novel \"best-so-far\" Update Mechanism. In Soft Computing and Machine Intelligence (ISCMI), 2015 Second International Conference\u00a0(pp. 35-39)."},{"issue":"2","key":"1830_CR30","first-page":"231","volume":"9","author":"C Tong","year":"2014","unstructured":"Tong, C. (2014). Gravitational search algorithm based on simulated annealing. Journal of Convergence Information Technology, 9(2), 231\u2013237.","journal-title":"Journal of Convergence Information Technology"}],"updated-by":[{"DOI":"10.1007\/s11265-023-01876-6","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T00:00:00Z","timestamp":1686009600000}}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-022-01830-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-022-01830-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-022-01830-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T13:51:57Z","timestamp":1686059517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-022-01830-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,10]]},"references-count":31,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1830"],"URL":"https:\/\/doi.org\/10.1007\/s11265-022-01830-y","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,10]]},"assertion":[{"value":"25 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2023","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11265-023-01876-6","URL":"https:\/\/doi.org\/10.1007\/s11265-023-01876-6","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}