{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:34:06Z","timestamp":1773455646463,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T00:00:00Z","timestamp":1516320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-018-5252-1","type":"journal-article","created":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T15:07:46Z","timestamp":1516374466000},"page":"2011-2031","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Fibonacci Based Key Frame Selection and Scrambling for Video Watermarking in DWT\u2013SVD Domain"],"prefix":"10.1007","volume":"102","author":[{"given":"S.","family":"Ponni alias Sathya","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8224-4812","authenticated-orcid":false,"given":"S.","family":"Ramakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,19]]},"reference":[{"issue":"5","key":"5252_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"GC Langelaar","year":"2000","unstructured":"Langelaar, G. C., Setyawan, I., & Lagendijk, R. L. (2000). Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Processing Magazine, 17(5), 20\u201346.","journal-title":"IEEE Signal Processing Magazine"},{"key":"5252_CR2","doi-asserted-by":"crossref","unstructured":"Chang, X., Wang, W., Zhao, J., & Zhang, L. (2011). A survey of digital video watermarking. In 2011 Seventh international conference on natural computation (ICNC) (Vol. 1, pp. 61\u201365). IEEE.","DOI":"10.1109\/ICNC.2011.6022111"},{"key":"5252_CR3","first-page":"90","volume":"3","author":"RT Paul","year":"2011","unstructured":"Paul, R. T. (2011). Review of robust video watermarking techniques. IJCA Special Issue on Computational Science, 3, 90\u201395.","journal-title":"IJCA Special Issue on Computational Science"},{"issue":"4","key":"5252_CR4","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TLA.2006.4472122","volume":"4","author":"V Hernandez-Guzman","year":"2006","unstructured":"Hernandez-Guzman, V., Cruz-Ramos, C., Nakano-Miyatake, M., & Perez-Meana, H. (2006). Watermarking algorithm based on the DWT. IEEE Latin America Transactions, 4(4), 257\u2013267.","journal-title":"IEEE Latin America Transactions"},{"issue":"3","key":"5252_CR5","first-page":"532","volume":"83","author":"M Ejima","year":"2000","unstructured":"Ejima, M., & Miyazaki, A. (2000). A wavelet-based watermarking for digital images and video. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 83(3), 532\u2013540.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"5252_CR6","doi-asserted-by":"crossref","unstructured":"Xu, D. W. (2007). A blind video watermarking algorithm based on 3D wavelet transform. In 2007 International conference on computational intelligence and security (pp. 945\u2013949). IEEE.","DOI":"10.1109\/CIS.2007.123"},{"key":"5252_CR7","doi-asserted-by":"crossref","unstructured":"Al-Taweel, S. A., & Sumari, P. (2009). Robust video watermarking based on 3D-DWT domain. In TENCON 2009\u20132009 IEEE region 10 conference (pp. 1\u20136). IEEE.","DOI":"10.1109\/TENCON.2009.5395859"},{"issue":"3","key":"5252_CR8","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/TLA.2010.5538406","volume":"8","author":"R Reyes","year":"2010","unstructured":"Reyes, R., Cruz, C., Nakano-Miyatake, M., & Perez-Meana, H. (2010). Digital video watermarking in DWT domain using chaotic mixtures. IEEE Latin America Transactions, 8(3), 304\u2013310.","journal-title":"IEEE Latin America Transactions"},{"issue":"10","key":"5252_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5120\/863-1213","volume":"4","author":"KR Chetan","year":"2010","unstructured":"Chetan, K. R., & Raghavendra, K. (2010). DWT based blind digital video watermarking scheme for video authentication. International Journal of Computer Applications, 4(10), 19\u201326.","journal-title":"International Journal of Computer Applications"},{"issue":"10","key":"5252_CR10","doi-asserted-by":"publisher","first-page":"1720","DOI":"10.1016\/j.measurement.2010.07.009","volume":"43","author":"RO Preda","year":"2010","unstructured":"Preda, R. O., & Vizireanu, D. N. (2010). A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement, 43(10), 1720\u20131726.","journal-title":"Measurement"},{"issue":"3","key":"5252_CR11","doi-asserted-by":"crossref","first-page":"323","DOI":"10.22201\/icat.16656423.2010.8.03.454","volume":"8","author":"C Cruz-Ramos","year":"2010","unstructured":"Cruz-Ramos, C., Reyes-Reyes, R., Nakano-Miyatake, M., & P\u00e9rez-Meana, H. (2010). A blind video watermarking scheme robust to frame attacks combined with MPEG2 compression. Journal of Applied Research and Technology, 8(3), 323\u2013337.","journal-title":"Journal of Applied Research and Technology"},{"issue":"1","key":"5252_CR12","doi-asserted-by":"publisher","first-page":"013022","DOI":"10.1117\/1.3558734","volume":"20","author":"RO Preda","year":"2011","unstructured":"Preda, R. O., & Vizireanu, D. N. (2011). Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. Journal of Electronic Imaging, 20(1), 013022.","journal-title":"Journal of Electronic Imaging"},{"issue":"3","key":"5252_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.aeue.2012.07.010","volume":"67","author":"OS Faragallah","year":"2013","unstructured":"Faragallah, O. S. (2013). Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU-International Journal of Electronics and Communications, 67(3), 189\u2013196.","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"5252_CR14","unstructured":"Naved, A., Rajesh, Y. (2013). Dual band watermarking using 2-D DWT and 2-level SVD for robust watermarking. In Video. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064."},{"key":"5252_CR15","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1016\/j.procs.2015.02.104","volume":"46","author":"DK Thind","year":"2015","unstructured":"Thind, D. K., & Jindal, S. (2015). A semi blind DWT\u2013SVD video watermarking. Procedia Computer Science, 46, 1661\u20131667.","journal-title":"Procedia Computer Science"},{"issue":"04","key":"5252_CR16","doi-asserted-by":"publisher","first-page":"224","DOI":"10.4236\/jsea.2015.84023","volume":"8","author":"L Rajab","year":"2015","unstructured":"Rajab, L., Al-Khatib, T., & Al-Haj, A. (2015). A blind DWT-SCHUR based digital video watermarking technique. Journal of Software Engineering and Applications, 8(04), 224\u2013233.","journal-title":"Journal of Software Engineering and Applications"},{"issue":"6","key":"5252_CR17","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.aeue.2012.11.009","volume":"67","author":"M Masoumi","year":"2013","unstructured":"Masoumi, M., & Amiri, S. (2013). A blind scene-based watermarking for video copyright protection. AEU-International Journal of Electronics and Communications, 67(6), 528\u2013535.","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"5","key":"5252_CR18","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","volume":"25","author":"T Zong","year":"2015","unstructured":"Zong, T., Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W., & Beliakov, G. (2015). Robust histogram shape-based method for image watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 25(5), 717\u2013729.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"8","key":"5252_CR19","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/j.aeue.2013.01.008","volume":"67","author":"TR Singh","year":"2013","unstructured":"Singh, T. R., Singh, K. M., & Roy, S. (2013). Video watermarking scheme based on visual cryptography and scene change detection. AEU-International Journal of Electronics and Communications, 67(8), 645\u2013665.","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"5252_CR20","doi-asserted-by":"publisher","first-page":"131","DOI":"10.5121\/ijcis.2012.2312","volume":"2","author":"M Mishra","year":"2012","unstructured":"Mishra, M., Mishra, P., Adhikary, M. C., & Kumar, S. (2012). Image encryption using Fibonacci\u2013Lucas transformation. International Journal of Cryptography and Network Security, 2, 131\u2013141.","journal-title":"International Journal of Cryptography and Network Security"},{"key":"5252_CR21","volume-title":"A wavelet tour of signal processing","author":"S Mallat","year":"1999","unstructured":"Mallat, S. (1999). A wavelet tour of signal processing. Cambridge: Academic press."},{"key":"5252_CR22","unstructured":"Zou, J., Ward, R. K., & Qi, D. (2004). The generalized Fibonacci transformations and application to image scrambling. In IEEE international conference on acoustics, speech, and signal processing, 2004. Proceedings. (ICASSP\u201904) (Vol. 3, pp. iii-385). IEEE."},{"issue":"2","key":"5252_CR23","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W Diffie","year":"1992","unstructured":"Diffie, W., Van Oorschot, P. C., & Wiener, M. J. (1992). Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2), 107\u2013125.","journal-title":"Designs, Codes and Cryptography"},{"issue":"3","key":"5252_CR24","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ipl.2005.01.003","volume":"94","author":"M Burmester","year":"2005","unstructured":"Burmester, M., & Desmedt, Y. (2005). A secure and scalable group key exchange system. Information Processing Letters, 94(3), 137\u2013143.","journal-title":"Information Processing Letters"},{"issue":"1","key":"5252_CR25","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.cose.2006.08.005","volume":"26","author":"R Lu","year":"2007","unstructured":"Lu, R., & Cao, Z. (2007). Simple three-party key exchange protocol. Computers & Security, 26(1), 94\u201397.","journal-title":"Computers & Security"},{"key":"5252_CR26","volume-title":"Communicating pictures: A course in image and video coding","author":"DR Bull","year":"2014","unstructured":"Bull, D. R. (2014). Communicating pictures: A course in image and video coding. Cambridge: Academic Press."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5252-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5252-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5252-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,25]],"date-time":"2020-10-25T21:56:17Z","timestamp":1603662977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5252-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,19]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5252"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5252-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,19]]},"assertion":[{"value":"19 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}