{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:54Z","timestamp":1750308774894,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,11]],"date-time":"2014-06-11T00:00:00Z","timestamp":1402444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Major State Basic Research Development Program","award":["2011CB302200"],"award-info":[{"award-number":["2011CB302200"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41371402"],"award-info":[{"award-number":["41371402"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,11]]},"DOI":"10.1145\/2600918.2600923","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"171-179","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Automatic location of frame deletion point for digital video forensics"],"prefix":"10.1145","author":[{"given":"Chunhui","family":"Feng","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Zhengquan","family":"Xu","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Wenting","family":"Zhang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Yanyan","family":"Xu","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2014,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"An Overview on Video Forensics. 2012 Proceedings of the 20th European Signal Processing Conference","author":"Bestagini P.","year":"2012","unstructured":"P. Bestagini , M. Fontani , S. Milani et al . An Overview on Video Forensics. 2012 Proceedings of the 20th European Signal Processing Conference , Bucharest, Romania, August 27 - 31 , 2012 . P. Bestagini, M. Fontani, S. Milani et al. An Overview on Video Forensics. 2012 Proceedings of the 20th European Signal Processing Conference, Bucharest, Romania, August 27 - 31, 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40099-5_22"},{"key":"e_1_3_2_1_3_1","volume-title":"Digital Watermarking","author":"Cox I. J.","year":"2002","unstructured":"I. J. Cox , M. L. Miller , and J. A. Bloom . Digital Watermarking . San Francisco, CA : Morgan Kaufmann , 2002 . I. J. Cox, M. L. Miller, and J. A. Bloom. Digital Watermarking. San Francisco, CA: Morgan Kaufmann, 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04438-0_2"},{"key":"e_1_3_2_1_5_1","volume-title":"Digital Image Processing","author":"Gonzalez R. C.","year":"2002","unstructured":"R. C. Gonzalez and R. E. Woods . Digital Image Processing . ( 2 nd ed.) Prentice-Hall , New Jersey ( 2002 ): 793 R. C. Gonzalez and R. E. Woods. Digital Image Processing. (2nd ed.) Prentice-Hall, New Jersey (2002): 793","edition":"2"},{"key":"e_1_3_2_1_6_1","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"Katzenbeisser S.","year":"2000","unstructured":"S. Katzenbeisser and F. A. P. Petitcolas . Information Hiding Techniques for Steganography and Digital Watermarking . Norwood, MA : Artec House , 2000 . S. Katzenbeisser and F. A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA: Artec House, 2000."},{"volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing, 2: II-217--II-220","author":"Luo W.","key":"e_1_3_2_1_7_1","unstructured":"W. Luo , Z. Qu , J. Huang , and G. Qiu . A Novel Method for Detecting Cropped and Recompressed Image Block . IEEE International Conference on Acoustics, Speech and Signal Processing, 2: II-217--II-220 . W. Luo, Z. Qu, J. Huang, and G. Qiu. A Novel Method for Detecting Cropped and Recompressed Image Block. IEEE International Conference on Acoustics, Speech and Signal Processing, 2: II-217--II-220."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.881856"},{"issue":"7","key":"e_1_3_2_1_9_1","first-page":"7","article-title":"Video Coding with H.264\/AVC: Tools, Performance, and Complexity","volume":"15","author":"Ostermann J.","year":"2005","unstructured":"J. Ostermann , J. Bormans , P. List , Video Coding with H.264\/AVC: Tools, Performance, and Complexity . IEEE Transactions on Circuits and Systems for Video Technology , 15 ( 7 ): 7 -- 28 , 2005 . J. Ostermann, J. Bormans, P. List, et al. Video Coding with H.264\/AVC: Tools, Performance, and Complexity. IEEE Transactions on Circuits and Systems for Video Technology, 15(7): 7--28, 2005.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"e_1_3_2_1_11_1","volume-title":"The IEEE International Workshop on Information Forensics and Security, 2--5","author":"Pad\u00edn D. V.","year":"2012","unstructured":"D. V. Pad\u00edn , M. Fontani , T. Bianchi , Detection of video double encoding with GOP size estimation . The IEEE International Workshop on Information Forensics and Security, 2--5 , 2012 . D. V. Pad\u00edn, M. Fontani, T. Bianchi, et al. Detection of video double encoding with GOP size estimation. The IEEE International Workshop on Information Forensics and Security, 2--5, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2205568"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2009.5366884"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.10.004"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902661"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161375"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288876"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597826"},{"volume-title":"Prediction of Intra Macroblocks","author":"White Paper Part","key":"e_1_3_2_1_20_1","unstructured":"H.264 \/ MPEG-4 Part 10 White Paper . Prediction of Intra Macroblocks ; Prediction of Inter Macroblocks in P- slices. H.264 \/ MPEG-4 Part 10 White Paper. Prediction of Intra Macroblocks; Prediction of Inter Macroblocks in P- slices."},{"key":"e_1_3_2_1_21_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Frame_rate  http:\/\/en.wikipedia.org\/wiki\/Frame_rate"},{"key":"e_1_3_2_1_22_1","unstructured":"http:\/\/www.videolan.org\/developers\/x264.html  http:\/\/www.videolan.org\/developers\/x264.html"},{"key":"e_1_3_2_1_23_1","unstructured":"http:\/\/trace.eas.asu.edu\/yuv\/  http:\/\/trace.eas.asu.edu\/yuv\/"}],"event":{"name":"IH&MMSec '14: ACM Information Hiding and Multimedia Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Salzburg Austria","acronym":"IH&MMSec '14"},"container-title":["Proceedings of the 2nd ACM workshop on Information hiding and multimedia security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600918.2600923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:38Z","timestamp":1750278158000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,11]]},"references-count":23,"alternative-id":["10.1145\/2600918.2600923","10.1145\/2600918"],"URL":"https:\/\/doi.org\/10.1145\/2600918.2600923","relation":{},"subject":[],"published":{"date-parts":[[2014,6,11]]},"assertion":[{"value":"2014-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}