{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:14:23Z","timestamp":1758816863034,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s42979-021-00729-y","type":"journal-article","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T20:03:24Z","timestamp":1624737804000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Robust Watermarking Technique for High-Efficiency Video Coding (HEVC) Based on Blind Extraction Scheme"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1360-5346","authenticated-orcid":false,"given":"Asem","family":"Khmag","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,7]]},"reference":[{"key":"729_CR1","doi-asserted-by":"crossref","unstructured":"Tew Y, Wong K. An overview of information hiding in H.264\/AVC compressed video. IEEE Trans Circ Syst Video Technol. 2014;24(2):305\u2013319.","DOI":"10.1109\/TCSVT.2013.2276710"},{"issue":"4","key":"729_CR2","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1109\/TCSVT.2006.888837","volume":"17","author":"C Lu","year":"2007","unstructured":"Lu C, Hsu C. Near-optimal watermark estimation and its countermeasure: antidisclosure watermark for multiple watermark embedding. IEEE Trans Circ Syst Video Technol. 2007;17(4):454\u201367.","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"729_CR3","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1016\/j.jvcir.2013.12.017","volume":"25","author":"HM Al-Otum","year":"2014","unstructured":"Al-Otum HM. Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J Vis Commun Image Represent. 2014;25:1064\u201381.","journal-title":"J Vis Commun Image Represent"},{"issue":"12","key":"729_CR4","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","volume":"22","author":"G Sullivan","year":"2012","unstructured":"Sullivan G, Ohm J, Han W-J, Wiegand T. Overview of the high efficiency video coding (HEVC) standard. IEEE Trans Circ Syst Video Technol. 2012;22(12):1649\u201368.","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"9","key":"729_CR5","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1109\/TCSVT.2014.2308453","volume":"24","author":"J Vanne","year":"2014","unstructured":"Vanne J, Vitanen M, Hamalainen TD. Efficient mode decision schemes for HEVC inter prediction. IEEE Trans Circ Syst Video Technol. 2014;24(9):1579\u201393.","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"729_CR6","doi-asserted-by":"crossref","unstructured":"Khmag A, Kamarudin N (2019) Natural image deblurring using recursive deep convolutional neural network (R-DbCNN) and Second-Generation Wavelets. In 2019 IEEE International Conference on signal and image processing applications (ICSIPA), pp 285\u2013290","DOI":"10.1109\/ICSIPA45851.2019.8977756"},{"key":"729_CR7","first-page":"159","volume-title":"Digital watermarking lecture notes in computer science","author":"P Meerwald","year":"2011","unstructured":"Meerwald P, Uhl A. Robust watermarking of H.264\/SVC-Encoded video: quality and resolution scalability. In: Kim H-J, Shi Y, Barni M, editors. Digital watermarking lecture notes in computer science, vol. 6526. Berlin: Springer; 2011. p. 159\u201369."},{"key":"729_CR8","doi-asserted-by":"crossref","unstructured":"Ogawa K, Ohtake G (2015) Watermarking for HEVC\/H.265 stream. In: Proceedings of ICCE, vol. 5, p. 102\u2013103","DOI":"10.1109\/ICCE.2015.7066337"},{"issue":"2","key":"729_CR9","doi-asserted-by":"publisher","first-page":"316","DOI":"10.3844\/ajassp.2014.316.328","volume":"11","author":"ASARSJB KhmagAl-HaddadHashim","year":"2014","unstructured":"KhmagAl-HaddadHashim ASARSJB. Additive and multiplicative noise removal based on adaptive wavelet transformation using cycle spinning. Am J Appl Sci. 2014;11(2):316.","journal-title":"Am J Appl Sci"},{"key":"729_CR10","unstructured":"Navas K, Sasikumar M (2007) Survey of medical image watermarking algorithms. In: Proceedings of International Conference on sciences of electronics, technologies of information and telecommunications, vol. 12, p. 25\u201329"},{"issue":"2","key":"729_CR11","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TCSVT.2012.2203738","volume":"23","author":"S Roy","year":"2013","unstructured":"Roy S, Li X, Shoshan Y, Fish A, Yadid-Pecht O. Hardware implementation of a digital watermarking system for video authentication. IEEE Trans Circuits Syst Video Technol. 2013;23(2):289\u2013301.","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"729_CR12","first-page":"1","volume":"4","author":"NR Bamane","year":"2013","unstructured":"Bamane NR, Patil SB. Comparison & performance analysis of different digital video watermarking techniques. Int J Sci Eng Res. 2013;4(1):1\u20136.","journal-title":"Int J Sci Eng Res"},{"issue":"2","key":"729_CR13","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MSP.2012.2230220","volume":"30","author":"A Boho","year":"2013","unstructured":"Boho A, Van Wallendael G, Dooms A, De Cock J, Braeckman G, Schelkens P, Preneel B, Van De Walle R. End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation. IEEE Sig Process Magaz. 2013;30(2):97\u2013107.","journal-title":"IEEE Sig Process Magaz"},{"key":"729_CR14","doi-asserted-by":"crossref","unstructured":"Tew Y, Wong K (2014) Information hiding in HEVC standard using adaptive coding block size decision. In: 21th IEEE Int. Conference on Image Process (ICIP), vol. 5, p. 5502\u20135506","DOI":"10.1109\/ICIP.2014.7026113"},{"key":"729_CR15","doi-asserted-by":"crossref","unstructured":"Helle P, Lakshman H, Siekmann M, Stegemann J, Hinz T, Schwarz H, Marpe D, Wiegand T (2013) A scalable video coding extension of HEVC. In: IEEE Conference on Data Compression (DCC), Snowbird: UT, vol. 18, p. 201\u2013210","DOI":"10.1109\/DCC.2013.28"},{"issue":"9","key":"729_CR16","first-page":"1141","volume":"33","author":"AARSARSNH KhmagRamliAl-haddadYusoffKamarudin","year":"2016","unstructured":"KhmagRamliAl-haddadYusoffKamarudin AARSARSNH. Denoising of natural images through robust wavelet thresholding and genetic programming. Vis Comput. 2016;33(9):1141\u201354.","journal-title":"Vis Comput"},{"issue":"6","key":"729_CR17","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.image.2011.04.008","volume":"26","author":"D Xu","year":"2011","unstructured":"Xu D, Wang R, Wang J. A novel watermarking scheme for H.264\/AVC video authentication. Sig Process Image Commun. 2011;26(6):267\u201379.","journal-title":"Sig Process Image Commun"},{"key":"729_CR18","doi-asserted-by":"crossref","unstructured":"Lo S-W, Wei Z, Ding X, Deng RH (2014) Generic attacks on content-based video stream authentication. In: IEEE Int. Conference on Multimedia and Expo Workshops, 2014, pp 1\u20136","DOI":"10.1109\/ICMEW.2014.6890612"},{"key":"729_CR19","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1016\/j.jvcir.2011.03.011","volume":"22","author":"J-C Chuang","year":"2011","unstructured":"Chuang J-C, Hu Y-C. An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image Represent. 2011;22:440\u20139.","journal-title":"J Vis Commun Image Represent"},{"key":"729_CR20","doi-asserted-by":"crossref","unstructured":"Baldimtsi F, Kiayias A, Samari K (2017) Atermarking public-key cryptographic functionalities and implementations. In: International Conference on Information Security, vol. 2, p. 173\u2013191","DOI":"10.1007\/978-3-319-69659-1_10"},{"key":"729_CR21","first-page":"34","volume":"17","author":"A Khmag","year":"2009","unstructured":"Khmag A, Ramli AR (2009) Implementation and evaluation of new cryptography algorithm for e-mail applications. Int J Comput Internet Manag, 17, 34\u201343","journal-title":"Int J Comput Internet Manag"},{"issue":"6","key":"729_CR22","doi-asserted-by":"publisher","first-page":"2157","DOI":"10.1137\/18M1164834","volume":"47","author":"A Cohen","year":"2018","unstructured":"Cohen A, Holmgren J, Nishimaki R, Vaikuntanathan V, Wichs D. Watermarking cryptographic capabilities. SIAM J Comput. 2018;47(6):2157\u2013202.","journal-title":"SIAM J Comput"},{"key":"729_CR23","volume-title":"The H.264 advanced video compression standard","author":"IE ichardson","year":"2011","unstructured":"ichardson IE. The H.264 advanced video compression standard. Wiley, Vcodex Limited; 2011."},{"issue":"4","key":"729_CR24","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TIFS.2010.2076280","volume":"5","author":"A Mansouri","year":"2010","unstructured":"Mansouri A, Aznaveh A, Torkamani F, Kurugollu F. A low complexity video watermarking in H.264 compressed domain. IEEE Trans Inf For Secur. 2010;5(4):649\u201357.","journal-title":"IEEE Trans Inf For Secur"},{"volume-title":"multimedia encryption and authentication techniques and applications","year":"2006","key":"729_CR25","unstructured":"Furht B, Kirovski D, editors. multimedia encryption and authentication techniques and applications. Auerbach Publications; 2006."},{"key":"729_CR26","unstructured":"Dutta T (2014) Robust compressed domain video watermarking for H.264\/AVC, Ph.D. Thesis, Indian Institute of Technology Guwahati, 2014"},{"key":"729_CR27","doi-asserted-by":"crossref","unstructured":"Khmag A, Mallallah F, Sharef B (2019) Additive noise level estimation based on singular value decomposition (SVD) in natural digital images. In: International Conference on signal and image processing applications, vol 7. IEEE, p. 342\u2013348.","DOI":"10.1109\/ICSIPA45851.2019.8977764"},{"key":"729_CR28","unstructured":"HEVC Reference Software (2012) http:\/\/hevc.kw.bbc.co.uk\/trac\/browser\/jctvc-hm\/tags. Accessed 4 May 2021"},{"key":"729_CR29","unstructured":"Xiph.org Video Test Media [derf\u2019s collection] (2015) https:\/\/media.xiph.org\/video\/derf\/. Accessed 29 March 2021"},{"issue":"1","key":"729_CR30","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TIFS.2006.890306","volume":"2","author":"M Noorkami","year":"2007","unstructured":"Noorkami M, Mersereau RM. A framework for robust watermarking of H.264-encoded video with controllable detection performance. IEEE Trans Inf For Secur. 2007;2(1):14\u201323.","journal-title":"IEEE Trans Inf For Secur"},{"issue":"2S","key":"729_CR31","doi-asserted-by":"publisher","first-page":"33:1","DOI":"10.1145\/2344436.2344439","volume":"8","author":"J Li","year":"2012","unstructured":"Li J, Liu H, Huang J, Shi YQ. Reference index-based H.264 video watermarking scheme. ACM Trans Multim Comput Commun Appl. 2012;8(2S):33:1-33:22.","journal-title":"ACM Trans Multim Comput Commun Appl"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00729-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-021-00729-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00729-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T20:42:30Z","timestamp":1624740150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-021-00729-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,7]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["729"],"URL":"https:\/\/doi.org\/10.1007\/s42979-021-00729-y","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"type":"print","value":"2662-995X"},{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2021,6,7]]},"assertion":[{"value":"14 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that he has no conflict of interest regarding the publishing of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"329"}}