{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:25:16Z","timestamp":1729621516772,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/icmew.2014.6890692","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T15:50:12Z","timestamp":1410364212000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Generic attacks on content-based video stream authentication"],"prefix":"10.1109","author":[{"given":"Swee-Won","family":"Lo","sequence":"first","affiliation":[]},{"given":"Zhuo","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Xuhua","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/79.939835"},{"key":"17","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1117\/12.344703","article-title":"Issues and solutions for authenticating MPEG video","volume":"3657","author":"lin","year":"1999","journal-title":"SPIE Security Watermarking Multimedia Contents"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202860"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2002.805505"},{"key":"16","first-page":"1875","article-title":"Fault induced attack to semifragile image authentication schemes","volume":"5150","author":"wu","year":"2003","journal-title":"Proc SPIE Visual Communications and Image Processing"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30543-9_25"},{"key":"14","first-page":"51","article-title":"Selective intra prediction mode decision for H.264\/AVC encoders","volume":"13","author":"park","year":"2006","journal-title":"World Academy of Science Engineering and Technology"},{"key":"11","first-page":"129","article-title":"Authentication and copyright protection scheme for H.264\/AVC and SVC","volume":"27","author":"park","year":"2011","journal-title":"Journal of Information Science and Engineering"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1561-2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2002.5745399"},{"key":"2","first-page":"ii893","article-title":"Lossless authentication of MPEG-2 video","volume":"2","author":"du","year":"2002","journal-title":"International Conference on Image Processing"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34601-9_15"},{"key":"10","first-page":"1799","article-title":"Combined fragile watermark and digital signature for H.264\/AVC video authentication","author":"saadi","year":"2009","journal-title":"17th European Signal Processing Conference"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.8.1150-1154"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2011.04.008"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.873476"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.882540"},{"key":"9","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1109\/IIH-MSP.2008.230","article-title":"Fragile video watermarking technique by motion field embedding with rate-distortion minimization","author":"kuo","year":"2008","journal-title":"International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1117\/12.526686"}],"event":{"name":"2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)","start":{"date-parts":[[2014,7,14]]},"location":"Chengdu, China","end":{"date-parts":[[2014,7,18]]}},"container-title":["2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6882610\/6890528\/06890692.pdf?arnumber=6890692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:46:39Z","timestamp":1602686799000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6890692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icmew.2014.6890692","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}