{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:40:26Z","timestamp":1760708426801},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/tcsvt.2012.2203738","type":"journal-article","created":{"date-parts":[[2012,6,7]],"date-time":"2012-06-07T18:02:33Z","timestamp":1339092153000},"page":"289-301","source":"Crossref","is-referenced-by-count":48,"title":["Hardware Implementation of a Digital Watermarking System for Video Authentication"],"prefix":"10.1109","volume":"23","author":[{"given":"Sonjoy Deb","family":"Roy","sequence":"first","affiliation":[]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yonatan","family":"Shoshan","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Fish","sequence":"additional","affiliation":[]},{"given":"Orly","family":"Yadid-Pecht","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2002.1035852"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FGCNS.2008.50"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref31","author":"schneier","year":"1996","journal-title":"Applied Cryptography"},{"key":"ref30","year":"2012"},{"key":"ref37","year":"2012"},{"key":"ref36","year":"2012"},{"key":"ref35","year":"2012","journal-title":"A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications"},{"key":"ref34","first-page":"22","article-title":"A new class of stream ciphers combining LFSR and FCSR architectures","author":"arnault","year":"2002","journal-title":"Proc Adv Cryptology INDOCRYPT"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2002.1013906"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2009.09.005"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1109\/MMCS.1998.693656","article-title":"Watermarking methods for MPEG encoded video: Toward resolving rightful ownership","author":"qiao","year":"1998","journal-title":"Proc IEEE Int Conf Multimedia Comput Syst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20000580"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809382"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2003.1206088"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2003.1218892"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/79.879338"},{"key":"ref17","first-page":"75","article-title":"A secure semifragile watermarking for image authentication based on integer wavelet transform with parameters","volume":"44","author":"wu","year":"2005","journal-title":"Proc Australasian Workshop Grid Computing and e-Research"},{"key":"ref18","year":"1996","journal-title":"Information technology generic coding of moving pictures and associated audio information"},{"key":"ref19","author":"jack","year":"2001","journal-title":"Video Demystified A Handbook for the Digital Engineer"},{"key":"ref28","year":"2012"},{"key":"ref4","first-page":"379","article-title":"VLSI watermark implementations and applications","volume":"2","author":"shoshan","year":"2008","journal-title":"International J Inf Technol Knowledge"},{"key":"ref27","first-page":"19","article-title":"Encoding high-resolution Ogg\/Theora video with reconfigurable FPGAs","author":"filippov","year":"2005","journal-title":"Xcell J"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1003126"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref29","year":"2011"},{"key":"ref5","first-page":"9","volume":"2","author":"li","year":"2008","journal-title":"International Book Series on Information Science and Computing"},{"key":"ref8","first-page":"283","article-title":"Watermarking of uncompressed and compressed video","volume":"66","author":"hartung","year":"1998","journal-title":"IEEE Trans Signal Process"},{"key":"ref7","author":"mohanty","year":"1999","journal-title":"Digital Watermarking A Tutorial Review"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(02)00144-3"},{"key":"ref9","first-page":"0","article-title":"Selective encryption and watermarking of MPEG video","author":"wu","year":"1997","journal-title":"Proc Int Conf Imag Sci Syst Technol"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/0470869615"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1117\/12.385000"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/5.959338"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5120\/721-1013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2005.1465838"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.12.012"},{"key":"ref23","first-page":"372","article-title":"A simplified approach for designing secure random number generators in HW","author":"li","year":"2008","journal-title":"Proc IEEE Int Conf Electron Circuits Syst"},{"key":"ref26","year":"2012","journal-title":"Theory org"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2008.4674867"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/76\/6428711\/06213527.pdf?arnumber=6213527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:42:48Z","timestamp":1638218568000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6213527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":42,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2012.2203738","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2]]}}}