{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T09:14:16Z","timestamp":1768468456824,"version":"3.49.0"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcsvt.2017.2716828","type":"journal-article","created":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T18:23:50Z","timestamp":1497637430000},"page":"2116-2130","source":"Crossref","is-referenced-by-count":19,"title":["Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9600-4505","authenticated-orcid":false,"given":"Priyanka","family":"Singh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Balasubramanian","family":"Raman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nishant","family":"Agarwal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.11834\/jig.20100802","article-title":"Invertible semi-fragile video watermarking algorithm used for content authentication","volume":"15","author":"zeng","year":"2010","journal-title":"J Image Graph"},{"key":"ref31","first-page":"134","article-title":"A novel video content authentication algorithm combined semi-fragile watermarking with compressive sensing","author":"chen","year":"2012","journal-title":"Proc IEEE 2nd Int Conf Intell Syst Design Eng Appl (ISDEA)"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1288869.1288876","article-title":"Exposing digital forgeries in video by detecting duplication","author":"wang","year":"2007","journal-title":"Proc the 9th ACM Workshop on Multimedia and Security"},{"key":"ref10","first-page":"2049","article-title":"A novel secret sharing scheme using POB number system and CRT","volume":"11","author":"deepika","year":"2016","journal-title":"Int J Appl Eng Res"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2656205"},{"key":"ref12","first-page":"12","article-title":"Don&#x2019;t see me, just filter me: Towards secure cloud based filtering using Shamir&#x2019;s secret sharing and pob number system","author":"singh","year":"2016","journal-title":"Proc 10th Indian Conf Comput Vis Graph Image Process"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1671954.1671960"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918801"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2011.01.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2736-9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2301916"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.903553"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2017.01.001"},{"key":"ref4","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc Nat Comput Conf"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1117\/12.465311"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref6","first-page":"371","article-title":"How to share a secret","author":"mignotte","year":"1982","journal-title":"Proc Conf Cryptography"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2302899"},{"key":"ref5","article-title":"Foundations and properties of Shamir&#x2019;s secret sharing scheme research seminar in cryptography","author":"bogdanov","year":"2007"},{"key":"ref8","first-page":"33","article-title":"An efficient secret sharing scheme for n out of n scheme using pob-number system","author":"sreekumar","year":"2009","journal-title":"Proc Hack"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"ref9","article-title":"Generalized secret sharing using permutation ordered binary system","volume":"abs 1407 3609","author":"binu","year":"2014","journal-title":"CoRR"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2014.6103"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1109\/TCSVT.2009.2017404","article-title":"Towards effective content authentication for digital videos by employing feature extraction and quantization","volume":"19","author":"su","year":"2009","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2014.2299371"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459370"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MULMM.2004.1265004"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/SIBGRAPI.2014.50","article-title":"Tampering detection of audio-visual content using encrypted watermarks","author":"rigoni","year":"2014","journal-title":"Proc 27th IEEE SIBGRAPI Conf Graph Patterns Images"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref25","year":"2006","journal-title":"YUV Video Sequences"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/76\/8466125\/07951022.pdf?arnumber=7951022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T18:28:41Z","timestamp":1750357721000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7951022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":32,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2017.2716828","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}