{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:33:26Z","timestamp":1729668806128,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/ciss.2011.5766182","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T18:17:38Z","timestamp":1305310658000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Video object trajectory perturbation based data hiding satisfying statistical and perceptual invisibility"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Cay","sequence":"first","affiliation":[]},{"given":"Zia-ur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Dimitrie C","family":"Popescu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TIFS.2006.885020"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/SIBGRAPI.2001.963053","article-title":"Video watermark technique in motion vector","author":"zhang","year":"2001","journal-title":"Computer Graphics and Image Processing 2001 Proceedings of XIV Brazilian Symposium on"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICIP.2003.1246786"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2358","DOI":"10.1109\/ICOSP.2004.1442254","article-title":"A robust video watermarking in motion vectors","volume":"3","author":"liu","year":"2004","journal-title":"Signal Processing 2004 Proceedings ICSP '04 2004 7th International Conference on"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TCSVT.2008.918446"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ISKE.2008.4731095"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","article-title":"An information-theoretic model for steganography","author":"cachin","year":"1998","journal-title":"Procs of the 2nd Int Workshop on Information Hiding Ser LNCS"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIP.2002.807363"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/83.650120"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ITCC.2000.844175"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TCSVT.2009.2022781"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/76.845009"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TCSVT.2003.815958"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","article-title":"Watermarking of uncompressed and compressed video","volume":"66","author":"hartung","year":"1998","journal-title":"Signal Processing"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1016\/S0165-1684(01)00037-8","article-title":"The role of information theory in watermarking and its application to image watermarking","volume":"81","author":"moulin","year":"2001","journal-title":"Signal Processing"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.sigpro.2005.07.018"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/83.892451"}],"event":{"name":"2011 45th Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2011,3,23]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,3,25]]}},"container-title":["2011 45th Annual Conference on Information Sciences and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5764460\/5766094\/05766182.pdf?arnumber=5766182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T19:45:00Z","timestamp":1560195900000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ciss.2011.5766182","relation":{},"subject":[],"published":{"date-parts":[[2011,3]]}}}