{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T19:02:54Z","timestamp":1769799774909,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,14]]},"DOI":"10.1109\/comcomap68359.2025.11353195","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:19:25Z","timestamp":1769721565000},"page":"10-17","source":"Crossref","is-referenced-by-count":0,"title":["Video Integrity Verification against Deepfake alterations Using Aspects of Blockchain and SHA-256 Cryptographic algorithm"],"prefix":"10.1109","author":[{"given":"Fayzah","family":"AlOtaibi","sequence":"first","affiliation":[{"name":"King Saud University,Clollage Computer Science and Information Systems,Riyadh,Saudi Arabia"}]},{"given":"Samar","family":"Aljohani","sequence":"additional","affiliation":[{"name":"King Saud University,Clollage Computer Science and Information Systems,Riyadh,Saudi Arabia"}]},{"given":"Ghada","family":"Alnifie","sequence":"additional","affiliation":[{"name":"King Saud University,Clollage Computer Science and Information Systems,Riyadh,Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.32628\/cseit217372"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2352\/issn.2470-1173.2020.4.mwsf-117"},{"key":"ref3","volume-title":"Embedded blockchains: A synthesis of blockchains, spread spectrum watermarking, perceptual hashing & Digital Signatures","author":"Blake","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3233\/apc210227"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.47611\/jsr.v12i4.2209"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3233\/faia210284"},{"key":"ref7","article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto","year":"2008"},{"key":"ref8","first-page":"207368","article-title":"Blockchain Technology: A Survey of Its Applications and Security Issues","volume":"8","author":"Shah","year":"2020","journal-title":"IEEE Access"},{"issue":"3","key":"ref9","first-page":"1995","article-title":"Blockchain-Based Video Authentication Scheme for Digital Forensics","volume":"16","author":"Shah","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref10","first-page":"138","article-title":"Blockchain-Based Secure Video Integrity Verification Using Digital Watermarking","author":"Gupta","year":"2021","journal-title":"Proceedings of the IEEE International Conference on Blockchain"},{"key":"ref11","article-title":"Security Analysis of SHA-256 and Sisters\u22c6 Henri Gilbert1 and Helena Handschuh2 1 France T\u00e9l\u00e9com R&D, FTRD\/DTL\/SSR 38-40 Rue du G\u00e9n\u00e9ral Leclerc","volume-title":"F-92131 Issy-Les Moulineaux"},{"key":"ref12","volume-title":"Identification of Fake Video Using Smart Contracts and SHA Algorithm SwapnaliTambe a 1, Dr. Anil Pawar b, Dr. S K Yadav a aResearch Scholar"},{"key":"ref13","article-title":"Fake Product Identification Using Blockchain","volume-title":"Bachelor of Engineering Project Report","author":"L","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24996\/ijs.2024.65.10.30"},{"key":"ref15","article-title":"Research on the application of cryptography on the blockchain","volume-title":"ResearchGate","author":"Zhang","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.04.014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMNWC60182.2023.10435983"},{"key":"ref18","volume-title":"XceptionNet-Keras","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24996\/ijs.2025.66.2.17"}],"event":{"name":"2025 Computing, Communications and IoT Applications (ComComAp)","location":"Madrid, Spain","start":{"date-parts":[[2025,12,14]]},"end":{"date-parts":[[2025,12,17]]}},"container-title":["2025 Computing, Communications and IoT Applications (ComComAp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11353105\/11353106\/11353195.pdf?arnumber=11353195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:21:07Z","timestamp":1769757667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11353195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/comcomap68359.2025.11353195","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]}}}