{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T03:41:32Z","timestamp":1770435692926,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T00:00:00Z","timestamp":1301961600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1007\/s11760-011-0225-9","type":"journal-article","created":{"date-parts":[[2011,4,4]],"date-time":"2011-04-04T09:17:43Z","timestamp":1301908663000},"page":"75-93","source":"Crossref","is-referenced-by-count":24,"title":["Considering the reconstruction loop for data hiding of intra- and inter-frames of H.264\/AVC"],"prefix":"10.1007","volume":"7","author":[{"given":"Zafar","family":"Shahid","sequence":"first","affiliation":[]},{"given":"Marc","family":"Chaumont","sequence":"additional","affiliation":[]},{"given":"William","family":"Puech","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,5]]},"reference":[{"key":"225_CR1","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/TCSVT.2003.815958","volume":"13","author":"A.M. Alattar","year":"2003","unstructured":"Alattar A.M., Lin E.T., Celik M.U.: Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol. 13, 787\u2013800 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"225_CR2","doi-asserted-by":"crossref","unstructured":"Chandramouli, R., Memon, N.: Analysis of LSB based image steganography Techniques. In: Proceedings of the IEEE International Conference on Image Processing, vol. 3, pp. 1019\u20131022. (2001)","DOI":"10.1109\/ICIP.2001.958299"},{"key":"225_CR3","doi-asserted-by":"crossref","unstructured":"Chen, C., Ni, J., Huang, J.: Temporal statistic based video watermarking scheme robust against geometric attacks and frame dropping. In: IWDW \u201909: Proceedings of the 8th International Workshop on Digital Watermarking, pp. 81\u201395. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-03688-0_10"},{"key":"225_CR4","doi-asserted-by":"crossref","unstructured":"Chung, Y., Wang, P., Chen, X., Bae, C., Otoom, A., Tran, T.: A performance comparison of high capacity digital watermarking systems. In: KES, vol. 1, pp. 1193\u20131198. (2005)","DOI":"10.1007\/11552413_170"},{"key":"225_CR5","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"Cox I., Kilian J., Leighton F., Shamoon T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"225_CR6","unstructured":"Cox, R.D., Henri, C.J., Bret, P.M.: CD-based image archival and management on a hybrid radiology intranet. Can. J. Med. Radiat. Technol. 28(3), (1997)"},{"key":"225_CR7","doi-asserted-by":"crossref","unstructured":"Dai, Y., Zhang, L., Yang, Y.: A new method of MPEG video watermarking technology. In: Proceedings of International Conference on Communication Technology, vol. 2, pp. 1845\u20131847. (2003)","DOI":"10.1109\/ICCT.2003.1209886"},{"key":"225_CR8","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1117\/12.344662","volume":"3657","author":"F. Deguillaume","year":"1999","unstructured":"Deguillaume F., Csurka G., O\u2019Ruanaidh J., Pun T.: Robust 3D DFT video watermarking. SPIE 3657, 113\u2013124 (1999)","journal-title":"SPIE"},{"key":"225_CR9","doi-asserted-by":"crossref","unstructured":"Ejima, M., Miyazaki, A.: A wavelet-based watermarking for digital images and video. In: Proceedings of IEEE International Conference on Image Processing, vol. 3, pp. 678\u2013681. (2000)","DOI":"10.1109\/ICIP.2000.899545"},{"issue":"4","key":"225_CR10","doi-asserted-by":"crossref","first-page":"043008","DOI":"10.1117\/1.2816054","volume":"16","author":"A. Golikeri","year":"2007","unstructured":"Golikeri A., Nasiopoulos P., Wang Z.: Robust digital video watermarking scheme for H.264 advanced video coding standard. J. Electron. Imaging 16(4), 043008 (2007)","journal-title":"J. Electron. Imaging"},{"key":"225_CR11","doi-asserted-by":"crossref","unstructured":"Gong, X., Lu, H.: Towards fast and robust watermarking scheme for H.264 video. In: Proceedings of IEEE International Symposium on Multimedia, pp. 649\u2013653. (2008)","DOI":"10.1109\/ISM.2008.16"},{"key":"225_CR12","unstructured":"H264. Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264 ISO\/IEC 14496-10 AVC). Technical report, Joint Video Team (JVT), Doc. JVT-G050, March (2003)"},{"key":"225_CR13","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F. Hartung","year":"1998","unstructured":"Hartung F., Girod B.: Watermarking of uncompressed and compressed video. Signal Process 66, 283\u2013333 (1998)","journal-title":"Signal Process"},{"key":"225_CR14","doi-asserted-by":"crossref","unstructured":"He, D., Sun, Q., Tian, Q.: A semi-fragile object based video authentication system. In: Proceedings of International Symposium on Circuits and Systems, 3, pp. 814\u2013817 (2003)","DOI":"10.1109\/ISCAS.2003.1205144"},{"issue":"8","key":"225_CR15","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TCSVT.2003.815957","volume":"13","author":"X. Kang","year":"2003","unstructured":"Kang X., Huang J., Shi Y., Lin Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13(8), 776\u2013786 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"225_CR16","doi-asserted-by":"crossref","unstructured":"Kapotas, S., Varsaki, E., Skodras, A.: Data hiding in H.264 encoded video sequences. In: Proceedings of IEEE International Workshop on Multimedia Signal Processing, (2007)","DOI":"10.1109\/MMSP.2007.4412894"},{"key":"225_CR17","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F. (eds): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Inc., Norwood (2000)"},{"key":"225_CR18","doi-asserted-by":"crossref","unstructured":"Kim, S., Kim, S., Hong, Y., Won, C.: Data hiding on H.264\/AVC compressed video. In: Image Analysis and Recognition Lecture Notes in Computer Science, chapter 62, pp. 698\u2013707 (2007)","DOI":"10.1007\/978-3-540-74260-9_62"},{"key":"225_CR19","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/83.892451","volume":"10","author":"G. Langelaar","year":"2001","unstructured":"Langelaar G., Lagendijk R.: Differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process. 10, 148\u2013158 (2001)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"225_CR20","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/30.793622","volume":"45","author":"P. Lee","year":"1999","unstructured":"Lee P., Chen M.: Robust error concealment algorithm for video decoder. IEEE Trans. Consumer Electron. 45(3), 851\u2013859 (1999)","journal-title":"IEEE Trans. Consumer Electron."},{"key":"225_CR21","doi-asserted-by":"crossref","unstructured":"Li, J., Liu, H., Huang, J., Zhang, Y.: A robust watermarking scheme for H.264. In: Digital Watermarking volume 5450 of Lecture Notes in Computer Science, pp. 1\u201315. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04438-0_1"},{"key":"225_CR22","unstructured":"Li, K., Zhang X.: Reliable adaptive watermarking scheme integrated with JPEG2000. In: Proceedings of 3rd International Symposium on Image and Signal Processing and Analysis (ISPA 2003). Rome, Italy (2003)"},{"issue":"2","key":"225_CR23","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TIFS.2007.897266","volume":"2","author":"Q. Li","year":"2007","unstructured":"Li Q., Cox I.: Using perceptual models to improve fidelity and provide resistance to volumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forensics Security 2(2), 127\u2013139 (2007)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"7","key":"225_CR24","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1016\/j.image.2005.03.012","volume":"20","author":"C. Lu","year":"2005","unstructured":"Lu C., Chen J., Fan K.: Real-time frame-dependent video watermarking in VLC domain. Signal Process. Image Commun. 20(7), 624\u2013642 (2005)","journal-title":"Signal Process. Image Commun."},{"issue":"7","key":"225_CR25","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1109\/TCSVT.2003.814964","volume":"13","author":"H. Malvar","year":"2003","unstructured":"Malvar H., Hallapuro A., Karczewicz M., Kerofsky L.: Low-complexity transform and quantization in H.264\/AVC. IEEE Trans. Circuits Syst. Video Technol. 13(7), 598\u2013603 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"225_CR26","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1109\/TIP.2003.821551","volume":"13","author":"M. Miller","year":"2004","unstructured":"Miller M., Doerr G., Cox I.: Applying informed coding and embedding to design a robust high capacity watermark. IEEE Trans. Image Process. 13(2), 792\u2013807 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"225_CR27","doi-asserted-by":"crossref","unstructured":"Mobasseri, B., Raikar, Y.: Authentication of H.264 streams by direct watermarking of CAVLC blocks. In: Proceedings of Security, Steganography, and Watermarking of Multimedia Contents IX volume 6505 SPIE, San Jose, CA (2007)","DOI":"10.1117\/12.703369"},{"key":"225_CR28","doi-asserted-by":"crossref","unstructured":"Noorkami, M., Mersereau, R.: Compressed-domain video watermarking for h.264. In: Proceedings of IEEE International Conference on Image Processing, pp. 890\u2013893. Genoa, Italy (2005)","DOI":"10.1109\/ICIP.2005.1530199"},{"issue":"3","key":"225_CR29","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/TIFS.2008.923825","volume":"3","author":"M. Noorkami","year":"2008","unstructured":"Noorkami M., Mersereau R.: Digital video watermarking in P-frames with controlled video bit-rate increase. IEEE Trans. Inf. Forensics Security 3(3), 441\u2013455 (2008)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"225_CR30","doi-asserted-by":"crossref","unstructured":"Oostveen, J., Kalker, T., Haitsma J.: Visual hashing of digital video: applications and techniques. In: Proceedings of SPIE, Applications of Digital Image Processing XXIV. vol. 4472, pp. 121\u2013131. San Diego CA, USA (2009)","DOI":"10.1117\/12.449746"},{"key":"225_CR31","unstructured":"Pr\u00f6frock, D., Schlauweg, M., M\u00fcller, E.: A new uncompressed-domain video watermarking approach robust to H.264\/AVC compression. In: Proceedings of IASTED International Conference on Signal Processing, Pattern Recognition, and Applications, pp. 99\u2013104. Anaheim, CA, USA (2006)"},{"key":"225_CR32","doi-asserted-by":"crossref","unstructured":"Qiu, G., Marziliano, P., Ho, A.T.S., He, D., Sun, Q.: A hybrid watermarking scheme for h.264\/avc video. Pattern Recognition, International Conference on 4, pp. 865\u2013869 (2004)","DOI":"10.1109\/ICPR.2004.1333909"},{"key":"225_CR33","doi-asserted-by":"crossref","unstructured":"Ramkumar, M., Akansu, A.: Robust protocols for proving ownership of images. In: Proceedings of International Conference on Information Technology: Coding and Computing, pp. 22\u201327 (2000)","DOI":"10.1109\/ITCC.2000.844178"},{"key":"225_CR34","unstructured":"Wang, Q., Zhao, D., Ma, S., Lu, Y., Huang, Q., Ga, W.: Context-based 2D-VLC for video coding. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 89\u201392 (2004)"},{"key":"225_CR35","doi-asserted-by":"crossref","unstructured":"Watson, A.: DCT quantization matrices visually optimized for individual images. In: Proceedings of SPIE Society of Photo-Optical Instrumentation Engineers, vol. 1913, pp. 202\u2013216 (1993)","DOI":"10.1117\/12.152694"},{"key":"225_CR36","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T. Wiegand","year":"2003","unstructured":"Wiegand T., Sullivan G., Bjntegaard G., Luthra A.: Overview of the H.264\/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13, 560\u2013576 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"225_CR37","doi-asserted-by":"crossref","unstructured":"Wu, C., Zheng, Y., Ip, W., Chan, C., Yung, K., Lu, Z.: A fexible H.264\/AVC compressed video watermarking scheme using particle swarm optimization based Dither modulation. AEU Int. J. Electron. Commun. (2010)","DOI":"10.1016\/j.aeue.2010.02.003"},{"key":"225_CR38","doi-asserted-by":"crossref","unstructured":"Wu, G., Wang, Y., Hsu, W.: Robust watermark embedding\/detection algorithm for H.264 video. J. Electron. Imaging 14(1), (2005)","DOI":"10.1117\/1.1877525"},{"key":"225_CR39","doi-asserted-by":"crossref","unstructured":"Xie, F., Furon, T., Fontaine, C.: On-Off keying modulation and Tardos fingerprinting. In: Proceedings of ACM Workshop on Multimedia and security, pp. 101\u2013106. New York, NY, USA (2008)","DOI":"10.1145\/1411328.1411347"},{"key":"225_CR40","doi-asserted-by":"crossref","unstructured":"Zou, D., Bloom, J.: H.264\/AVC stream replacement technique for video watermarking. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1749 \u20131752 (2008)","DOI":"10.1109\/ICASSP.2008.4517968"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-011-0225-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-011-0225-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-011-0225-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T20:48:13Z","timestamp":1741121293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-011-0225-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,5]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["225"],"URL":"https:\/\/doi.org\/10.1007\/s11760-011-0225-9","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,5]]}}}