{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T16:02:41Z","timestamp":1775232161692,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T00:00:00Z","timestamp":1770076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T00:00:00Z","timestamp":1775174400000},"content-version":"vor","delay-in-days":59,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272478"],"award-info":[{"award-number":["62272478"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272478"],"award-info":[{"award-number":["62272478"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272478"],"award-info":[{"award-number":["62272478"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272478"],"award-info":[{"award-number":["62272478"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272478"],"award-info":[{"award-number":["62272478"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"and the Basic Frontier Innovation Project of Engineering University of the Chinese People's Armed Police Force","award":["WJY202314"],"award-info":[{"award-number":["WJY202314"]}]},{"name":"and the Basic Frontier Innovation Project of Engineering University of the Chinese People's Armed Police Force","award":["WJY202314"],"award-info":[{"award-number":["WJY202314"]}]},{"name":"and the Basic Frontier Innovation Project of Engineering University of the Chinese People's Armed Police Force","award":["WJY202314"],"award-info":[{"award-number":["WJY202314"]}]},{"name":"and the Basic Frontier Innovation Project of Engineering University of the Chinese People's Armed Police Force","award":["WJY202314"],"award-info":[{"award-number":["WJY202314"]}]},{"name":"and the Basic Frontier Innovation Project of Engineering University of the Chinese People's Armed Police Force","award":["WJY202314"],"award-info":[{"award-number":["WJY202314"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s44443-026-00528-6","type":"journal-article","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T11:35:49Z","timestamp":1770118549000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CSTFMark: robust video watermarking against H.264\/AVC compression via dynamic spati-temporal frequency modulation and curriculum learning"],"prefix":"10.1007","volume":"38","author":[{"given":"Shunzhe","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Ke","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yihang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Qianhui","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,3]]},"reference":[{"key":"528_CR1","doi-asserted-by":"crossref","unstructured":"Bengio Y, Louradour J, Collobert R, Weston J (2009) Curriculum learning. In: Proceedings of the 26Th annual international conference on machine learning, pp 41\u201348","DOI":"10.1145\/1553374.1553380"},{"issue":"2","key":"528_CR2","first-page":"140","volume":"18","author":"A Benziane","year":"2021","unstructured":"Benziane A, Awang S, Lebcir M (2021) Development and implementation of a video watermarking method based on dct transform. Int Arab J Inf Technol 18(2):140\u2013147","journal-title":"Int Arab J Inf Technol"},{"issue":"18","key":"528_CR3","doi-asserted-by":"publisher","first-page":"5242","DOI":"10.3390\/s20185242","volume":"20","author":"M Cao","year":"2020","unstructured":"Cao M, Tian L, Li C (2020) A secure video steganography based on the intra-prediction mode (ipm) for h264. Sensors 20(18):5242","journal-title":"Sensors"},{"key":"528_CR4","doi-asserted-by":"crossref","unstructured":"Chan P-W, Lyu MR (2003) A dwt-based digital video watermarking scheme with error correcting code. In: International conference on information and communications security, pp 202\u2013213. Springer","DOI":"10.1007\/978-3-540-39927-8_19"},{"issue":"3","key":"528_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C-K Chan","year":"2004","unstructured":"Chan C-K, Cheng L-M (2004) Hiding data in images by simple lsb substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"issue":"9","key":"528_CR6","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/s10462-024-10862-8","volume":"57","author":"VK Chauhan","year":"2024","unstructured":"Chauhan VK, Zhou J, Lu P, Molaei S, Clifton DA (2024) A brief review of hypernetworks in deep learning. Artif Intell Rev 57(9):250","journal-title":"Artif Intell Rev"},{"key":"528_CR7","doi-asserted-by":"crossref","unstructured":"Chen L, Wang C, Zhou X, Qin Z (2024) Robust and compatible video watermarking via spatio-temporal enhancement and multiscale pyramid attention. IEEE Tran Circ Syst Video Technol","DOI":"10.1109\/TCSVT.2024.3471891"},{"issue":"4","key":"528_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/3386569.3392457","volume":"39","author":"M Chu","year":"2020","unstructured":"Chu M, Xie Y, Mayer J, Leal-Taix\u00e9 L, Thuerey N (2020) Learning temporal coherence via self-supervision for gan-based video generation. ACM Transactions on Graphics (TOG) 39(4):75\u20131","journal-title":"ACM Transactions on Graphics (TOG)"},{"issue":"10","key":"528_CR9","doi-asserted-by":"publisher","first-page":"0308451","DOI":"10.1371\/journal.pone.0308451","volume":"19","author":"SM Darwish","year":"2024","unstructured":"Darwish SM, Abu-Deif MM, Elkaffas SM (2024) Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function. PLoS ONE 19(10):0308451","journal-title":"PLoS ONE"},{"issue":"13","key":"528_CR10","doi-asserted-by":"publisher","first-page":"4752","DOI":"10.3390\/s22134752","volume":"22","author":"D Fan","year":"2022","unstructured":"Fan D, Zhang X, Kang W, Zhao H, Lv Y (2022) Video watermarking algorithm based on nsct, pseudo 3d-dct and nmf. Sensors 22(13):4752","journal-title":"Sensors"},{"issue":"1","key":"528_CR11","doi-asserted-by":"publisher","first-page":"7860","DOI":"10.1038\/s41598-025-91192-9","volume":"15","author":"Y Fu","year":"2025","unstructured":"Fu Y, Liang X, Lu F, Wang J, Tang Z (2025) Robust and blind video watermarking against online sharing platforms. Sci Rep 15(1):7860","journal-title":"Sci Rep"},{"key":"528_CR12","unstructured":"Ha D, Dai AM, Le QV (2017) Hypernetworks. In: International conference on learning representations"},{"key":"528_CR13","doi-asserted-by":"crossref","unstructured":"Hazim HT, Alseelawi N, ALRikabi HT (2023) A novel method of invisible video watermarking based on index mapping and hybrid dwt-dct. Int J Online Biomed Eng 19(4)","DOI":"10.3991\/ijoe.v19i04.37581"},{"issue":"4","key":"528_CR14","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1109\/TCSVT.2021.3092004","volume":"32","author":"W Huan","year":"2021","unstructured":"Huan W, Li S, Qian Z, Zhang X (2021) Exploring stable coefficients on joint sub-bands for robust video watermarking in dt cwt domain. IEEE Trans Circuits Syst Video Technol 32(4):1955\u20131965","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"528_CR15","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"528_CR16","unstructured":"Hu R, Zhang J, Li Y, Li J, Guo Q, Qiu H, Zhang T (2025) Videoshield: Regulating diffusion-based video generation models via watermarking. In: The thirteenth international conference on learning representations"},{"key":"528_CR17","unstructured":"Jang M, Jang Y, Lee J, Kawamura K, Yang F, Kim S (2024) Lvmark: Robust watermark for latent video diffusion models. CoRR"},{"key":"528_CR18","doi-asserted-by":"crossref","unstructured":"Jia Z, Fang H, Zhang W (2021) Mbrs: Enhancing robustness of dnn-based watermarking by mini-batch of real and simulated jpeg compression. In: Proceedings of the 29th ACM international conference on multimedia, pp 41\u201349","DOI":"10.1145\/3474085.3475324"},{"key":"528_CR19","doi-asserted-by":"crossref","unstructured":"Ji J, Xu D, Dong L, Yang L, He S (2025) Dinvmark: A deep invertible network for video watermarking. arXiv preprint arXiv:2509.17416","DOI":"10.1109\/TMM.2026.3651109"},{"key":"528_CR20","unstructured":"Kay W, Carreira J, Simonyan K, Zhang B, Hillier C, Vijayanarasimhan S, Viola F, Green T, Back T, Natsev P et al (2017) The kinetics human action video dataset. arXiv preprint arXiv:1705.06950"},{"key":"528_CR21","doi-asserted-by":"crossref","unstructured":"Ke Z, Huang H, Liang Y, Ding Y, Cheng X, Wu Q (2022) Robust video watermarking based on deep neural network and curriculum learning. In: 2022 IEEE international conference on e-business engineering (ICEBE), pp 80\u201385. IEEE","DOI":"10.1109\/ICEBE55470.2022.00023"},{"issue":"1","key":"528_CR22","volume":"2012","author":"G Liu","year":"2012","unstructured":"Liu G, Liu H, Kadir A (2012) Wavelet-based color pathological image watermark through dynamically adjusting the embedding intensity. Comput Math Methods Med 2012(1):406349","journal-title":"Comput Math Methods Med"},{"issue":"1","key":"528_CR23","doi-asserted-by":"publisher","first-page":"17016","DOI":"10.1038\/s41598-025-00912-8","volume":"15","author":"L Liu","year":"2025","unstructured":"Liu L, Xu P, Xue Q (2025) Screen shooting resistant watermarking based on cross attention. Sci Rep 15(1):17016","journal-title":"Sci Rep"},{"key":"528_CR24","unstructured":"Luo X, Li Y, Chang H, Liu C, Milanfar P, Yang F (2023) Dvmark: a deep multiscale framework for video watermarking. IEEE Trans Image Proc"},{"key":"528_CR25","doi-asserted-by":"crossref","unstructured":"Perez E, Strub F, De\u00a0Vries H, Dumoulin V, Courville A (2018) Film: Visual reasoning with a general conditioning layer. In: Proceedings of the AAAI conference on artificial intelligence, vol 32","DOI":"10.1609\/aaai.v32i1.11671"},{"issue":"12","key":"528_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3742472","volume":"57","author":"L Peroni","year":"2025","unstructured":"Peroni L, Gorinsky S (2025) An end-to-end pipeline perspective on video streaming in best-effort networks: a survey and tutorial. ACM Comput Surv 57(12):1\u201347","journal-title":"ACM Comput Surv"},{"key":"528_CR27","unstructured":"Qiu Y, Li T, Cui J, Wang Y, Zhang K, Su Y (2005) Quantum watermarking scheme based on dna encoding and quantum error correction. J King Saud Univ Comput Inf Sci"},{"key":"528_CR28","doi-asserted-by":"crossref","unstructured":"Ranjan A, Black MJ (2017) Optical flow estimation using a spatial pyramid network. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4161\u20134170","DOI":"10.1109\/CVPR.2017.291"},{"key":"528_CR29","doi-asserted-by":"crossref","unstructured":"Ridwan R, Kabir MN (2025) Robust color image watermarking using dual embedding via schur decomposition. IJACI: Int J Adv Comput Inf 1(1):39\u201347","DOI":"10.71129\/ijaci.v1.i1.pp39-47"},{"issue":"1","key":"528_CR30","doi-asserted-by":"publisher","first-page":"29472","DOI":"10.1038\/s41598-025-13862-y","volume":"15","author":"S Sengan","year":"2025","unstructured":"Sengan S, Gugulothu P, Alroobaea R, Webber JL, Mehbodniya A, Yousef A (2025) A non-sub-sampled shearlet transform-based deep learning sub band enhancement and fusion method for multi-modal images. Sci Rep 15(1):29472","journal-title":"Sci Rep"},{"key":"528_CR31","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"issue":"10","key":"528_CR32","doi-asserted-by":"publisher","first-page":"14045","DOI":"10.1007\/s11042-022-12082-0","volume":"81","author":"R Sinhal","year":"2022","unstructured":"Sinhal R, Sharma S, Ansari IA, Bajaj V (2022) Multipurpose medical image watermarking for effective security solutions. Multimedia Tools and Applications 81(10):14045\u201314063","journal-title":"Multimedia Tools and Applications"},{"key":"528_CR33","unstructured":"Soomro K, Zamir AR, Shah M (2012) Ucf101: A dataset of 101 human actions classes from videos in the wild. arXiv preprint arXiv:1212.0402"},{"issue":"6","key":"528_CR34","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1007\/s11263-022-01611-x","volume":"130","author":"P Soviany","year":"2022","unstructured":"Soviany P, Ionescu RT, Rota P, Sebe N (2022) Curriculum learning: A survey. Int J Comput Vision 130(6):1526\u20131565","journal-title":"Int J Comput Vision"},{"key":"528_CR35","doi-asserted-by":"crossref","unstructured":"Van\u00a0Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proceedings of 1sT international conference on image processing 2:86\u201390. IEEE","DOI":"10.1109\/ICIP.1994.413536"},{"key":"528_CR36","doi-asserted-by":"crossref","unstructured":"Wahyudi MI, Fauzi I, Atmojo D (2025) Robust image watermarking based on hybrid iwt-dct-svd. IJACI: Int J Adv Comput Inf 1(2):89\u201398","DOI":"10.71129\/ijaci.v1.i2.pp89-98"},{"issue":"4","key":"528_CR37","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s44443-025-00077-4","volume":"37","author":"J Wu","year":"2025","unstructured":"Wu J, Wang C, Zhang Z, He L, Chen Y, Cheng W (2025) Patterns in time series to image phase and multi-step forecasting of financial indices. Journal of King Saud University Computer and Information Sciences 37(4):59","journal-title":"Journal of King Saud University Computer and Information Sciences"},{"key":"528_CR38","doi-asserted-by":"crossref","unstructured":"Yan Q, Luo Y, Wang Z, Xi J, Xia G, Cai Z (2025) Spatiotemporal attention-based real-time video watermarking. Data Min Knowl Disc 39(5):62","DOI":"10.1007\/s10618-025-01129-z"},{"key":"528_CR39","unstructured":"Zhang KA, Xu L, Cuesta-Infante A, Veeramachaneni K (2019) Robust invisible video watermarking with attention. CoRR"},{"key":"528_CR40","doi-asserted-by":"crossref","unstructured":"Zhang Z (2018) Improved adam optimizer for deep neural networks. In: 2018 IEEE\/ACM 26th international symposium on quality of service (IWQoS), pp 1\u20132. Ieee","DOI":"10.1109\/IWQoS.2018.8624183"},{"key":"528_CR41","doi-asserted-by":"crossref","unstructured":"Zhang Z, Chen P, Li W, Xiong X, Wang Q, Wen H, Liu S, Cai S (2021) Design and arm-based implementation of bitstream-oriented chaotic encryption scheme for h. 264\/avc video. Entropy 23(11):1431","DOI":"10.3390\/e23111431"},{"key":"528_CR42","doi-asserted-by":"crossref","unstructured":"Zhang R, Isola P, Efros AA, Shechtman E, Wang O (2018) The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 586\u2013595","DOI":"10.1109\/CVPR.2018.00068"},{"key":"528_CR43","doi-asserted-by":"crossref","unstructured":"Zhang Y, Ni J, Su W, Liao X (2023) A novel deep video watermarking framework with enhanced robustness to h. 264\/avc compression. In: Proceedings of the 31st ACM international conference on multimedia, pp 8095\u20138104","DOI":"10.1145\/3581783.3612270"},{"key":"528_CR44","doi-asserted-by":"crossref","unstructured":"Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: Hiding data with deep networks. In: Proceedings of the european conference on computer vision (ECCV), pp 657\u2013672","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-026-00528-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00528-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00528-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:30:01Z","timestamp":1775230201000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-026-00528-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,3]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["528"],"URL":"https:\/\/doi.org\/10.1007\/s44443-026-00528-6","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,3]]},"assertion":[{"value":"23 December 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"112"}}