{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T05:42:04Z","timestamp":1759815724039,"version":"3.37.3"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"19","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072390","62102334"],"award-info":[{"award-number":["62072390","62102334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council, Hong Kong SAR, China","award":["15222118","15218919","15203120","15226221","15225921"],"award-info":[{"award-number":["15222118","15218919","15203120","15226221","15225921"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/jiot.2022.3165365","type":"journal-article","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T19:28:34Z","timestamp":1649359714000},"page":"19373-19386","source":"Crossref","is-referenced-by-count":9,"title":["Stateful-CCSH: An Efficient Authentication Scheme for High-Resolution Video Surveillance System"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0123-1364","authenticated-orcid":false,"given":"Li","family":"Tang","sequence":"first","affiliation":[{"name":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1547-2847","authenticated-orcid":false,"given":"Qingqing","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1224-9885","authenticated-orcid":false,"given":"Huadi","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9008-2112","authenticated-orcid":false,"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1976-4241","authenticated-orcid":false,"given":"Ziyang","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9809-5110","authenticated-orcid":false,"given":"Ngai-Fong","family":"Law","sequence":"additional","affiliation":[{"name":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong"}]}],"member":"263","reference":[{"volume-title":"Advanced Video Forensics","year":"2014","author":"Garrison","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102452"},{"volume-title":"Courts and Lawyers Struggle with Growing Prevalence of Deepfakes","year":"2020","author":"Reynolds","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.29085\/9781856049627.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2925961"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2014.6983237"},{"key":"ref8","first-page":"101","article-title":"SIGMATA: Storage integrity guaranteeing mechanism against tampering attempts for video event data recorders","volume-title":"Proc. 7th Int. Multi-Conf. Complexity Informat. Cybern. (IMCIC) 7th Int. Conf. Soc. Inf. Technol. (ICSIT)","author":"Kwon"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/sym12111811"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2014.2299371"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2800-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2017404"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2301916"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2978573"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2776159"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07102-x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2205568"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854085"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638215"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288150"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2251632"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412641"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2008.4665069"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2165843"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2473436"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2993004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2007.323"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918801"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3002146"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2837745"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12351"},{"volume-title":"Imagehash.AverageHash","year":"2020","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2015.55"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995586"},{"volume-title":"Video: Copy-Move Forgeries Dataset","year":"2020","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3339825.3394937"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23234-8_61"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2016.07.013"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2967640"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11301-7_66"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2051410"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18405-5_13"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IS3C.2014.198"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.900991"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.861293"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863505"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ISETC.2018.8584003"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279542"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115725"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28493-9_33"},{"volume-title":"Statistics in a Nutshell: A Desktop Quick Reference","year":"2012","author":"Boslaugh","key":"ref53"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1631081.1631093"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2004.840614"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936134"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.230"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1080\/00207217.2016.1242163"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101702"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9899827\/09751595.pdf?arnumber=9751595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:20:25Z","timestamp":1705537225000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9751595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":59,"journal-issue":{"issue":"19"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3165365","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}