{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:12Z","timestamp":1750307172042,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393241","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"145-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing the security of digital Video Watermarking using watermark encryption"],"prefix":"10.1145","author":[{"given":"Ujan","family":"Mukhopadhyay","sequence":"first","affiliation":[{"name":"St. Thomas' College of Engineering and Technology, Kolkata, India"}]},{"given":"Souptik","family":"Sinha","sequence":"additional","affiliation":[{"name":"St. Thomas' College of Engineering and Technology, Kolkata, India"}]},{"given":"Poulomi","family":"Ghosh","sequence":"additional","affiliation":[{"name":"St. Thomas' College of Engineering and Technology, Kolkata, India"}]},{"given":"Rilok","family":"Ghosh","sequence":"additional","affiliation":[{"name":"St. Thomas' College of Engineering and Technology, Kolkata, India"}]},{"given":"Dipak Kr.","family":"Kole","sequence":"additional","affiliation":[{"name":"St. Thomas' College of Engineering and Technology, Kolkata, India"}]},{"given":"Aruna","family":"Chakroborty","sequence":"additional","affiliation":[{"name":"St. Thomas' College of Engineering and Technology, Kolkata, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"volume-title":"Media Informatics","author":"El-Gayyar Mahmoud","unstructured":"Mahmoud El-Gayyar and Prof. Dr. Joachim von zur Gathen , \" Watermarking Techniques Spatial Domain Digital Rights Seminar\" , Media Informatics , University of Bonn , Germany, May 06 Mahmoud El-Gayyar and Prof. Dr. Joachim von zur Gathen, \"Watermarking Techniques Spatial Domain Digital Rights Seminar\", Media Informatics, University of Bonn, Germany, May 06","key":"e_1_3_2_1_1_1"},{"unstructured":"C. H. Li and S. S. Wang \"Transform-Based Watermarking for Digital Images and Video \" IEEE International Conference June1999  C. H. Li and S. S. Wang \"Transform-Based Watermarking for Digital Images and Video \" IEEE International Conference June1999","key":"e_1_3_2_1_2_1"},{"issue":"2","key":"e_1_3_2_1_3_1","article-title":"Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis","volume":"1","author":"Sinha S.","year":"2011","unstructured":"S. Sinha , S. Pramanick , A. Jagatramka , P. Bardhan , D. K. Kole , A. Chakraborty , \" Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis \", International Journal of Wisdom Based Computing , Vol. 1 ( 2 ), August 2011 S. Sinha, S. Pramanick, A. Jagatramka, P. Bardhan, D. K. Kole, A. Chakraborty, \"Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis\", International Journal of Wisdom Based Computing, Vol. 1 (2), August 2011","journal-title":"International Journal of Wisdom Based Computing"},{"issue":"8","key":"e_1_3_2_1_4_1","article-title":"Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform","volume":"9","author":"Mostafa Salwa A. K","year":"2009","unstructured":"Salwa A. K Mostafa , A. S. Tolba , F. M. Abdelkader , Hisham M. Elhindy , \" Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform \" IJCSNS International Journal of Computer Science and Network Security, VOL . 9 No. 8 , August 2009 Salwa A. K Mostafa, A. S. Tolba, F. M. Abdelkader, Hisham M. Elhindy, \"Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform \"IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009","journal-title":"IJCSNS International Journal of Computer Science and Network Security, VOL"},{"unstructured":"Majid Rabbani Nasir Memon R. Chandramouli \"Digital Watermarking\"  Majid Rabbani Nasir Memon R. Chandramouli \"Digital Watermarking\"","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.14429\/djlit.29.249"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/79.939835"},{"key":"e_1_3_2_1_8_1","first-page":"9","article-title":"A Study on Digital Image and Video Watermarking Schemes using Neural Networks","volume":"12","author":"Isac Bibi","year":"2011","unstructured":"Bibi Isac , V. Santhi , \" A Study on Digital Image and Video Watermarking Schemes using Neural Networks \", International Journal of Computer Applications (0975--8887) Volume 12 --No. 9 , January 2011 Bibi Isac, V. Santhi, \"A Study on Digital Image and Video Watermarking Schemes using Neural Networks\", International Journal of Computer Applications (0975--8887) Volume 12--No.9, January 2011","journal-title":"International Journal of Computer Applications (0975--8887)"},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"121","article-title":"A Multi-band Wavelet Watermarking Scheme","volume":"6","author":"Kang X.","year":"2008","unstructured":"X. Kang , WenjunZeng, J. Huang , \" A Multi-band Wavelet Watermarking Scheme \", International Journal of Network Security , vol 6 , no 2 , pp. 121 -- 126 , Mar 2008 . X. Kang, WenjunZeng, J. Huang, \"A Multi-band Wavelet Watermarking Scheme\", International Journal of Network Security, vol 6, no 2, pp. 121--126, Mar 2008.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_10_1","first-page":"352","volume-title":"Proceedings of the International Conference on Signal and Image Processing Applications (ICSIPA), IEEE","author":"Liu H.","year":"2000","unstructured":"H. Liu , N. Chen , J. Huang , \" A Robust DWT- Based Video Watermarking Algorithm\" , Proceedings of the International Conference on Signal and Image Processing Applications (ICSIPA), IEEE , pp. 352 -- 356 , 2000 . H. Liu, N. Chen, J. Huang, \"A Robust DWT-Based Video Watermarking Algorithm\", Proceedings of the International Conference on Signal and Image Processing Applications (ICSIPA), IEEE, pp. 352--356, 2000."},{"unstructured":"Elham Shahinfard Shohreh Kasaei \"Digital Image Watermarking using Wavelet Transform\".  Elham Shahinfard Shohreh Kasaei \"Digital Image Watermarking using Wavelet Transform\".","key":"e_1_3_2_1_11_1"},{"issue":"12","key":"e_1_3_2_1_12_1","first-page":"6963","article-title":"Survey on Digital Video Watermarking Techniques and Attacks on Watermarks","volume":"2","author":"Jayamalar T.","year":"2010","unstructured":"T. Jayamalar , Dr. V. Radha , \" Survey on Digital Video Watermarking Techniques and Attacks on Watermarks \", International Journal of Engineering Science and Technology , Vol. 2 ( 12 ), 2010 , 6963 -- 6967 T. Jayamalar, Dr. V. Radha, \"Survey on Digital Video Watermarking Techniques and Attacks on Watermarks\", International Journal of Engineering Science and Technology, Vol. 2(12), 2010, 6963--6967","journal-title":"International Journal of Engineering Science and Technology"}],"event":{"sponsor":["Avinashilingam University Avinashilingam University"],"acronym":"CCSEIT '12","name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","location":"Coimbatore UNK India"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393241","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:46Z","timestamp":1750240486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":12,"alternative-id":["10.1145\/2393216.2393241","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393241","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}