{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:17Z","timestamp":1750306277445,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905137","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Video Watermarking using DWT and Singular Values"],"prefix":"10.1145","author":[{"given":"S. Bhargavi","family":"Latha","sequence":"first","affiliation":[{"name":"Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad"}]},{"given":"D. Venkata","family":"Reddy","sequence":"additional","affiliation":[{"name":"Mahatma Gandhi Institute of Technology, Hyderabad"}]},{"given":"A.","family":"Damodaram","sequence":"additional","affiliation":[{"name":"Sri Venkateswara University, Tirupathi"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the International Conference on Image Processing","volume":"2","author":"van Schyndel R. G.","unstructured":"R. G. van Schyndel , A. Z. Tirkel , and C. F. Osborne . 1994. A Digital Watermark . In Proceedings of the International Conference on Image Processing , volume 2 , 86--90. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. 1994. A Digital Watermark. In Proceedings of the International Conference on Image Processing, volume 2, 86--90."},{"key":"e_1_3_2_1_2_1","unstructured":"L. F. Turner. 1989. Digital Data Security System. Patent IPN WO89\/08915.  L. F. Turner. 1989. Digital Data Security System. Patent IPN WO89\/08915."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the SPIE Conference on Multimedia Computing and Networking","volume":"3020","author":"Hartung F. H.","year":"1997","unstructured":"F. H. Hartung , B. Girod . 1997 . Watermarking of MPEG-2 Encoded Video without Decoding and Reencoding . In Proceedings of the SPIE Conference on Multimedia Computing and Networking 1997, SanJose. volume 3020 . 264--274. F. H. Hartung, B. Girod. 1997. Watermarking of MPEG-2 Encoded Video without Decoding and Reencoding. In Proceedings of the SPIE Conference on Multimedia Computing and Networking 1997, SanJose. volume 3020. 264--274."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1998.693656"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCABES.2012.13"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. SPIE, Security and Watermarking of Multimedia Content II.","volume":"3971","author":"Deguillaume F.","year":"2000","unstructured":"F. Deguillaume , G. Csurka , J. O'Ruanaidh , T. Pun . Robust. 2000 . 3D DFT video watermarking . Proc. SPIE, Security and Watermarking of Multimedia Content II. vol. 3971 . 346--357. F. Deguillaume, G. Csurka, J. O'Ruanaidh, T. Pun. Robust. 2000.3D DFT video watermarking. Proc. SPIE, Security and Watermarking of Multimedia Content II. vol. 3971. 346--357."},{"volume-title":"Multimedia Signal Processing, 2005 IEEE 7th Workshop. 1--4.","year":"2005","key":"e_1_3_2_1_7_1","unstructured":"Campisi, p. 2005 . Video watermarking in the 3D-DWT domain using quantization-based methods . Multimedia Signal Processing, 2005 IEEE 7th Workshop. 1--4. Campisi, p. 2005. Video watermarking in the 3D-DWT domain using quantization-based methods. Multimedia Signal Processing, 2005 IEEE 7th Workshop. 1--4."},{"key":"e_1_3_2_1_8_1","volume-title":"Industrial Electronics & Applications (ISIEA), 2010 IEEE Symposium. 186--189","author":"Hesabi R.E.","year":"2010","unstructured":"Zamanidoost, A., Mirzakuchaki, S., Atani, R.E. , Hesabi , Z.R. , Ayat , M. 2010 . A novel 3D wavelet-based method for blind digital video watermarking . Industrial Electronics & Applications (ISIEA), 2010 IEEE Symposium. 186--189 . Zamanidoost, A., Mirzakuchaki, S., Atani, R.E., Hesabi, Z.R., Ayat, M. 2010. A novel 3D wavelet-based method for blind digital video watermarking. Industrial Electronics & Applications (ISIEA), 2010 IEEE Symposium. 186--189."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2015.7260346"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2014.7003762"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2004.833513"},{"key":"e_1_3_2_1_12_1","article-title":"The discrete wavelet transform and the scale analysis of the surface properties of sea ice","author":"Percival R. W., D. B.","year":"1996","unstructured":"Lindsay, R. W., D. B. Percival , D. A. Rothrock . 1996 . The discrete wavelet transform and the scale analysis of the surface properties of sea ice . IEEE Trans. on Geosci. and Remote Sens. 771--787. Lindsay, R. W., D. B. Percival, D. A. Rothrock. 1996. The discrete wavelet transform and the scale analysis of the surface properties of sea ice. IEEE Trans. on Geosci. and Remote Sens. 771--787.","journal-title":"IEEE Trans. on Geosci. and Remote Sens. 771--787."},{"key":"e_1_3_2_1_13_1","unstructured":"M. Ali. An introduction to wavelets and haar transform. Available: http:\/\/www.cs.ucf.edu\/mali\/haar.  M. Ali. An introduction to wavelets and haar transform. Available: http:\/\/www.cs.ucf.edu\/mali\/haar."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2006.162"},{"volume-title":"International Journal of Computer Science and 48 Information Technologies (IJCSIT).","author":"Rhine Reema","key":"e_1_3_2_1_15_1","unstructured":"Reema Rhine , Nikhila T Bhuvan . Image Scrambling Methods for Image Hiding: A Survey . International Journal of Computer Science and 48 Information Technologies (IJCSIT). vol. 5 . 751--755. Reema Rhine, Nikhila T Bhuvan. Image Scrambling Methods for Image Hiding: A Survey. International Journal of Computer Science and 48 Information Technologies (IJCSIT). vol. 5. 751--755."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905137","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:49Z","timestamp":1750221529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":15,"alternative-id":["10.1145\/2905055.2905137","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905137","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}