{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:07:18Z","timestamp":1694635638399},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T00:00:00Z","timestamp":1246406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/tcsvt.2009.2020250","type":"journal-article","created":{"date-parts":[[2009,4,8]],"date-time":"2009-04-08T13:27:49Z","timestamp":1239197269000},"page":"965-977","source":"Crossref","is-referenced-by-count":1,"title":["Generalized Butterfly Graph and Its Application to Video Stream Authentication"],"prefix":"10.1109","volume":"19","author":[{"family":"Zhishou Zhang","sequence":"first","affiliation":[]},{"family":"Qibin Sun","sequence":"additional","affiliation":[]},{"given":"J.","family":"Apostolopoulos","sequence":"additional","affiliation":[]},{"family":"Wai-Choong Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"111","author":"zeng","year":"2006","journal-title":"Multimedia Security Technologies for Digital Right Management Multimedia Authentication"},{"key":"ref11","volume":"92","author":"kundur","year":"2004","journal-title":"Proc IEEE (Special issue enabling security technol digital rights manage )"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1421415"},{"key":"ref13","first-page":"429","author":"schneier","year":"1996","journal-title":"Applied Cryptography Public Key Algorithms"},{"key":"ref14","first-page":"180","article-title":"how to sign digital streams","author":"gennaro","year":"0","journal-title":"Proc Advances in Cryptology-Crypto"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref16","first-page":"13","article-title":"authentication streamed data in the presence of random packet loss","author":"golle","year":"2001","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2005.1521540"},{"key":"ref18","author":"wong","year":"1998","journal-title":"Digital Signatures for Flows and Multicasts"},{"key":"ref19","first-page":"227","article-title":"efficient multicast packet authentication using signature amortization","author":"park","year":"2002","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.21236\/ADA637135","author":"podolsky","year":"1998","journal-title":"Soft ARQ for layered streaming media"},{"key":"ref3","first-page":"1357","article-title":"optimal scheduling for streaming of scalable media","author":"ortega","year":"2000","journal-title":"Proc Asilomar Conf Signals Syst Comput"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2003.1194011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.864313"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1247331"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2005.854227"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815168"},{"key":"ref9","year":"0","journal-title":"Internet Streaming Media Alliance"},{"key":"ref1","year":"2003","journal-title":"Draft ITU-T Recommendation and Final Draft Int Std of Joint Video Specification"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjdc.3.55"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.888822"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.886281"},{"key":"ref24","author":"wang","year":"2005","journal-title":"Common Conditions for SVC Error Resilience Testing"},{"key":"ref23","year":"0","journal-title":"H 264\/AVC Reference Software JM Version 10 2"},{"key":"ref25","year":"2003","journal-title":"Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec H 264\/ISO\/IEC 14 496-10 AVC Joint Video Team (JVT) of ISO\/IEC MPEG and ITU-T VCEG JVTG050"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/76\/5175618\/04811976.pdf?arnumber=4811976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:51:21Z","timestamp":1633909881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4811976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":25,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2009.2020250","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7]]}}}