{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:12:26Z","timestamp":1770221546194,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/tifs.2014.2338274","type":"journal-article","created":{"date-parts":[[2014,7,11]],"date-time":"2014-07-11T18:53:13Z","timestamp":1405104793000},"page":"1502-1517","source":"Crossref","is-referenced-by-count":109,"title":["Imperceptible and Robust Blind Video Watermarking Using Chrominance Embedding: A Set of Approaches in the DT CWT Domain"],"prefix":"10.1109","volume":"9","author":[{"given":"Md.","family":"Asikuzzaman","sequence":"first","affiliation":[]},{"given":"Md. Jahangir","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Andrew J.","family":"Lambert","sequence":"additional","affiliation":[]},{"given":"Mark Richard","family":"Pickering","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/5.771066"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1117\/12.344665","article-title":"Spread spectrum watermarking: Malicious attacks and counterattacks","volume":"3657","author":"hartung","year":"1999","journal-title":"Proc SPIE Security Watermarking Multimedia Contents"},{"key":"ref31","first-page":"146","article-title":"Computing the probability of false watermark detection","author":"miller","year":"1999","journal-title":"Proc 3rd Int Workshop Inform Hiding"},{"key":"ref30","year":"2002","journal-title":"Methodology for the Subjective Assessment of the Quality of Television Pictures"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855418"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1117\/12.384990","article-title":"Generalized watermarking attack based on watermark estimation and perceptual remodulation","volume":"3971","author":"voloshynovskiy","year":"2000","journal-title":"Proc SPIE Security Watermarking Multimedia Contents II"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1117\/12.384972","article-title":"Robust frame-dependent video watermarking","volume":"3971","author":"holliman","year":"2000","journal-title":"Proc SPIE Security Watermarking Multimedia Contents II"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2005.856932"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.927421"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/34.192463"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1999.756198"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1022431.1022465"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2007.341545"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2009.5201255"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2007.4511046"},{"key":"ref18","first-page":"675","article-title":"Robust image watermarking using dual tree complex wavelet transform based on human visual system","author":"liu","year":"2010","journal-title":"Proc Int Conf Image Anal Process"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2012.6411696"},{"key":"ref28","first-page":"10\/1","article-title":"digital watermarking with complex wavelets","author":"loo","year":"2000","journal-title":"IEE Seminar on Secure Images and Image Authentication"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(02)00144-3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.833866"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/79.879337"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-540-92238-4_25","article-title":"A practical real-time video watermarking scheme robust against downscaling attack","volume":"5041","author":"kim","year":"2008","journal-title":"Proc Int Workshop Digit Watermark"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.833867"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e91-d.5.1359"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2011.08.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.873476"},{"key":"ref2","author":"stelter","year":"2009","journal-title":"Digital Pirates Winning Battle with Studios"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.104"},{"key":"ref1","author":"koch","year":"2011","journal-title":"Camcording and Film Piracy in Asia-Pacific Economic Cooperation Economies"},{"key":"ref20","author":"kingsbury","year":"2005","journal-title":"Human Vision [OpenStax-CNX Web site]"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.10.009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.15.000563"},{"key":"ref24","first-page":"1","article-title":"A blind high definition video watermarking scheme robust to geometric and temporal synchronization attacks","author":"asikuzzaman","year":"2013","journal-title":"Proc IEEE Vis Commun Image Process (VCIP)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2009.5340971"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2009.5383785"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6867417\/06853371.pdf?arnumber=6853371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:31:06Z","timestamp":1642005066000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6853371\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":36,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2338274","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9]]}}}