{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T14:47:42Z","timestamp":1770562062988,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/tip.2013.2278463","type":"journal-article","created":{"date-parts":[[2013,9,27]],"date-time":"2013-09-27T19:49:10Z","timestamp":1380311350000},"page":"4825-4840","source":"Crossref","is-referenced-by-count":44,"title":["Video Watermarking With Empirical PCA-Based Decoding"],"prefix":"10.1109","volume":"22","author":[{"given":"Hanieh","family":"Khalilian","sequence":"first","affiliation":[]},{"given":"Ivan V.","family":"Bajic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1117\/12.689901"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2005.848313"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.834657"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809374"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913512","author":"barni","year":"2004","journal-title":"Watermarking Systems Engineering Enabling Digital Assets Security and Other Applications"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.837557"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1090\/gsm\/132","author":"tao","year":"2012","journal-title":"Topics in Random Matrix Theory"},{"key":"ref36","author":"mackay","year":"2003","journal-title":"Information Theory Inference and Learning Algorithm"},{"key":"ref35","author":"campos","year":"1999"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/76.475896"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1117\/12.344662"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/83.799882"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","article-title":"Watermarking of uncompressed and compressed video","volume":"66","author":"hartung","year":"1998","journal-title":"Signal Process"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2002.1035845"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.923825"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"43008-1","DOI":"10.1117\/1.2816054","article-title":"Robust digital video watermarking scheme for H.264 advanced video coding standard","volume":"16","author":"golikeri","year":"2007","journal-title":"J Electron Imaging"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652607"},{"key":"ref16","author":"cox","year":"2008","journal-title":"Digital Watermarking and Steganography"},{"key":"ref17","author":"arnold","year":"2003","journal-title":"Techniques and Applications of Digital Watermarking and Content Protection"},{"key":"ref18","author":"petitcolas","year":"2000","journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.02.013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/83.982816"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/11551492_33","volume":"3710","author":"campisi","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/6046.985560"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/11922841_32","volume":"4283","author":"park","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"ref6","first-page":"252","article-title":"Robust content-based video watermarking exploiting motion entropy masking effect","author":"houmansadr","year":"2006","journal-title":"Proc Int Conf Signal Process Multimedia Appl"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2012.07.010"},{"key":"ref5","first-page":"1643","article-title":"Digital video watermarking in 3D ridgelet domain","volume":"3","author":"khalilian","year":"2009","journal-title":"Proc 11th ICACT"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2011.6032879"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2080675"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2003.1562600"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918446"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/30.663749"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2038774"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1121\/1.1910407"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2005.03.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2009.2012922"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1117\/12.526642","article-title":"Wavelet domain watermarking using maximum-likelihood detection","volume":"5306","author":"ng","year":"2004","journal-title":"Proc SPIE"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2009.10.015"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809374"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379868"},{"key":"ref44","author":"mcclave","year":"2003","journal-title":"Statistics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2066770"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.843776"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.874411"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/83\/6609090\/06578562.pdf?arnumber=6578562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:54:56Z","timestamp":1642006496000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578562\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":45,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tip.2013.2278463","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]}}}