{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T06:07:42Z","timestamp":1747894062307},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T00:00:00Z","timestamp":1696377600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T00:00:00Z","timestamp":1696377600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,4]]},"DOI":"10.1109\/nof58724.2023.10302792","type":"proceedings-article","created":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T17:47:46Z","timestamp":1698947266000},"page":"57-61","source":"Crossref","is-referenced-by-count":2,"title":["Illegal Broadcasting: A Way for Protecting Revenue"],"prefix":"10.1109","author":[{"given":"Reza Shokri","family":"Kalan","sequence":"first","affiliation":[{"name":"Digiturk beIN Media Group,T&#x00FC;rkiye"}]},{"given":"Emre","family":"Karsl\u0131","sequence":"additional","affiliation":[{"name":"Digiturk beIN Media Group,T&#x00FC;rkiye"}]}],"member":"263","reference":[{"year":"2023","key":"ref13","article-title":"Irdeto Watermarking"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2014.6776048"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/5.771066"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2018.8587565"},{"year":"2023","key":"ref11","article-title":"DASH-IF Forensic A\/B Watermarking"},{"year":"2023","key":"ref10","article-title":"DASH-IF IOP watermarking"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08177-w"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3083165.3083174"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3114299"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3524273.3532904"},{"key":"ref9","first-page":"687","article-title":"Steal this movie: Automatically bypassing drm protection in streaming media services","author":"wang","year":"2013","journal-title":"USENIX Security Symposium"},{"year":"2023","key":"ref4","article-title":"Apple http live streaming"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.140405"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2011.71"},{"year":"0","key":"ref5","article-title":"Microsoft smooth streaming"}],"event":{"name":"2023 14th International Conference on Network of the Future (NoF)","start":{"date-parts":[[2023,10,4]]},"location":"Izmir, Turkiye","end":{"date-parts":[[2023,10,6]]}},"container-title":["2023 14th International Conference on Network of the Future (NoF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10302728\/10302750\/10302792.pdf?arnumber=10302792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:33:28Z","timestamp":1701113608000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10302792\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/nof58724.2023.10302792","relation":{},"subject":[],"published":{"date-parts":[[2023,10,4]]}}}