{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:24:57Z","timestamp":1745987097970,"version":"3.40.4"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,3,24]],"date-time":"2013-03-24T00:00:00Z","timestamp":1364083200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s11554-013-0335-4","type":"journal-article","created":{"date-parts":[[2013,3,23]],"date-time":"2013-03-23T07:38:46Z","timestamp":1364024326000},"page":"211-222","source":"Crossref","is-referenced-by-count":7,"title":["Video watermark application for embedding recipient ID in real-time-encoding VoD server"],"prefix":"10.1007","volume":"11","author":[{"given":"Takaaki","family":"Yamada","sequence":"first","affiliation":[]},{"given":"Michiro","family":"Maeta","sequence":"additional","affiliation":[]},{"given":"Fuminori","family":"Mizushima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,24]]},"reference":[{"key":"335_CR1","unstructured":"George, C., Scerri, J.: Web 2.0 and user-generated content: legal challenges in the new frontier. J. Inf. Law Technol. 2 (2007)"},{"issue":"2","key":"335_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1346330.1346335","volume":"55","author":"G Tardos","year":"2008","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2), 1\u201324 (2008)","journal-title":"J. ACM"},{"key":"335_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Hamburg, M.: Generalized identity based and broadcast encryption schemes. In: Proceedings of ASIACRYPT 2008, pp. 455\u2013470 (2008)","DOI":"10.1007\/978-3-540-89255-7_28"},{"issue":"5","key":"335_CR4","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/TIT.2003.810629","volume":"49","author":"R Safavi-naini","year":"2003","unstructured":"Safavi-naini, R., Wang, Y.: Sequential traitor tracing. IEEE Trans. Inf. Theory 49(5), 1319\u20131326 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"335_CR5","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Malvar, H., Yacobi, Y.: Multimedia content screening using a dual watermarking and fingerprinting system. In: Proceedings of ACM International Conference on Multimedia, pp. 372\u2013381 (2002)","DOI":"10.1145\/641007.641086"},{"key":"335_CR6","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, Burlington (2001)","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"335_CR7","doi-asserted-by":"crossref","unstructured":"Lancini, R., Mapelli, F., Tubaro, S.: A robust video watermarking technique for compression and transcoding processing. In: Proceedings of IEEE International Conference on Multimedia & Expo (ICME), vol. 1, pp. 549\u2013552 (2002)","DOI":"10.1109\/ICME.2002.1035840"},{"issue":"3","key":"335_CR8","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F Hartung","year":"1998","unstructured":"Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283\u2013301 (1998)","journal-title":"Signal Process."},{"issue":"8","key":"335_CR9","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/TCSVT.2003.815958","volume":"13","author":"AM Alattar","year":"2003","unstructured":"Alattar, A.M., Lin, E.T., Celik, M.U.: Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol. (CSVT) 13(8), 787\u2013800 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol. (CSVT)"},{"key":"335_CR10","unstructured":"Gopal, K., Latha, M.M.: Watermarking of digital video stream for source authentication. Int. J. Comput. Sci. Issues 7(4), No 1, 18\u201325 (2010)"},{"key":"335_CR11","doi-asserted-by":"crossref","unstructured":"Jeong, Y.J., Kim, W.H., Moon, K.S., Kim, J.N.: Implementation of watermark detection system for hardware based video watermark embedder. In: Proceedings of International Conference on Convergence and Hybrid Information Technology, pp. 450\u2013453 (2008)","DOI":"10.1109\/ICCIT.2008.321"},{"key":"335_CR12","doi-asserted-by":"crossref","unstructured":"Kim, K.S., Lee, H.Y., Im, D.H., Lee, H.K.: Practical, real-time, and robust watermarking on the spatial domain for high-definition video contents. IEICE Trans. Inf. Syst. E91-D(5), 1359\u20131368 (2008)","DOI":"10.1093\/ietisy\/e91-d.5.1359"},{"issue":"6","key":"335_CR13","first-page":"897","volume":"127C","author":"T Yamada","year":"2007","unstructured":"Yamada, T., Echizen, I., Tezuka, S., Yoshiura, H.: Real-time digital video watermark embedding system based on software in commodity PC. IEEE J. Electron. Inf. Syst. 127C(6), 897\u2013903 (2007)","journal-title":"IEEE J. Electron. Inf. Syst."},{"key":"335_CR14","doi-asserted-by":"crossref","unstructured":"Yamada, T., Echizen, I., Yoshiura, H.: PC-based real-time video watermark embedding system independent of platform for parallel computing. In: Shi, Y.Q. (ed.) Trans. on Data Hiding and Multimedia Security VII, LNCS, vol. 7110, pp. 15\u201333. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-28693-3_2"},{"key":"335_CR15","doi-asserted-by":"crossref","unstructured":"Y. J. Jeong, K. S. Moon, and J. N. Kim: \u201cImplementation of real time video watermark embedder based on Haar wavelet transform using FPGA\u201d, in Proc. of Int\u2019l Conf. on Future Generation Communication and Networking Symposia (FGCNS2008), pp. 63\u201366, 2008","DOI":"10.1109\/FGCNS.2008.50"},{"key":"335_CR16","doi-asserted-by":"crossref","unstructured":"Mathai, J.N., Sheikholeslami, A., Kundur, D.: VLSI Implementation of a real-time video watermark embedder and detector. In: Proc. of IEEE Int\u2019l Symposium on Circuits and Systems, vol. 2, pp. 772\u2013775 (2003)","DOI":"10.1109\/ISCAS.2003.1206088"},{"key":"335_CR17","doi-asserted-by":"crossref","unstructured":"Jarvinen, S., Laulajainen, J.-P., Sutinen, T., Sallinen, S.: QoS-aware real-time video encoding. In: Proc. of IEEE Consumer Communications and Networking Conference (CCNC2006), vol. 2, pp. 994\u2013997 (2006)","DOI":"10.1109\/CCNC.2006.1593187"},{"key":"335_CR18","unstructured":"Rec. ITU-R BT.500-11: Methodology for the subjective assessment of the quality of television pictures (2002)"},{"key":"335_CR19","unstructured":"The Institute of Image Information and Television Engineers (ITE): HDTV standard video set (1993)"},{"key":"335_CR20","doi-asserted-by":"crossref","unstructured":"Yamada, T., Maeta, M., Mizushima, F.: Feasibility of a watermark application for real-time-encoding video-on-demand service. In: Proc. of IEEE\/SICE Int\u2019l Symp. on System Integration (SII2011), pp. 1131\u20131136 (2011)","DOI":"10.1109\/SII.2011.6147608"},{"key":"335_CR21","unstructured":"VoD service, T\u2019s TV: http:\/\/t-s.tv\/ (Japanese)"},{"key":"335_CR22","doi-asserted-by":"crossref","unstructured":"Feng, H., Ling, H., Zou, F., Yan, W., Lu, Z.: A Collusion attack optimization strategy for digital fingerprinting. ACM Trans. Multimed. Comput. Commun. Appl. 8(S2), 36:01\u201336:20 (2012)","DOI":"10.1145\/2344436.2344442"},{"key":"335_CR23","doi-asserted-by":"crossref","unstructured":"Meerwald, P., Uhl, A.: An efficient robust watermarking method integrated in H.264\/SVC. In: Shi,Y.Q. (ed.) Trans. on Data Hiding and Multimedia Security VII, LNCS, vol. 7110, pp. 1\u201314. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-28693-3_1"},{"issue":"6","key":"335_CR24","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1109\/TIP.2006.873476","volume":"15","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Pearmain, A.: Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. IEEE Trans. Image Process. 15(6), 1536\u20131543 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"335_CR25","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1049\/iet-ipr.2009.0362","volume":"5","author":"W-M Chen","year":"2011","unstructured":"Chen, W.-M., Lai, C.-J., Wang, H.-C., Chao, H.-C., Lo, C.-H.: H.264 video watermarking with secret image sharing. IET Image Process. 5(4), 349\u2013354 (2011)","journal-title":"IET Image Process."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-013-0335-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-013-0335-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-013-0335-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T01:44:06Z","timestamp":1745977446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-013-0335-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,24]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["335"],"URL":"https:\/\/doi.org\/10.1007\/s11554-013-0335-4","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2013,3,24]]}}}