{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T03:37:52Z","timestamp":1774064272578,"version":"3.50.1"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T00:00:00Z","timestamp":1484611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2017,2,28]]},"abstract":"<jats:p>\n            Digital watermarking has received much attention in recent years as a promising solution to copyright protection. Video watermarking in compressed domain has gained importance since videos are stored and transmitted in a compressed format. This decreases the overhead to fully decode and re-encode the video for embedding and extraction of the watermark. High Efficiency Video Coding (HEVC\/H.265) is the latest and most efficient video compression standard and a successor to H.264 Advanced Video Coding. In this article, we propose a robust watermarking framework for HEVC-encoded video using informed detector. A readable watermark is embedded invisibly in\n            <jats:bold>P<\/jats:bold>\n            frames for better perceptual quality. Our framework imposes security and robustness by selecting appropriate blocks using a random key and the spatio-temporal characteristics of the compressed video. A detail analysis of the strengths of different compressed domain features is performed for implementing the watermarking framework. We experimentally demonstrate the utility of the proposed work. The results show that the proposed work effectively limits the increase in video bitrate and degradation in perceptual quality. The proposed framework is robust against re-encoding and image processing attacks.\n          <\/jats:p>","DOI":"10.1145\/3002178","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T13:13:59Z","timestamp":1484745239000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["An Efficient Framework for Compressed Domain Watermarking in P Frames of High-Efficiency Video Coding (HEVC)--Encoded Video"],"prefix":"10.1145","volume":"13","author":[{"given":"Tanima","family":"Dutta","sequence":"first","affiliation":[{"name":"Indian Institute of Technology (BHU) Varanasi, India"}]},{"given":"Hari Prabhat","family":"Gupta","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology (BHU) Varanasi, India"}]}],"member":"320","published-online":{"date-parts":[[2017,1,17]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"1996. American National Standard for Telecommunications-Digital Transport of One-Way Video Signals-Parameters for Objective Performance Assessment. American National Standards Institute Alliance for Telecommunications Industry Solutions.  1996. American National Standard for Telecommunications-Digital Transport of One-Way Video Signals-Parameters for Objective Performance Assessment. American National Standards Institute Alliance for Telecommunications Industry Solutions."},{"key":"e_1_2_1_2_1","unstructured":"2012. HEVC reference software. (2012). http:\/\/hevc.kw.bbc.co.uk\/trac\/browser\/jctvc-hm\/tags.  2012. HEVC reference software. (2012). http:\/\/hevc.kw.bbc.co.uk\/trac\/browser\/jctvc-hm\/tags."},{"key":"e_1_2_1_3_1","unstructured":"2015a. Database: Images and Video Clip. (2015). http:\/\/see.xidian.edu.cn\/vipsl\/database_Video.html.  2015a. Database: Images and Video Clip. (2015). http:\/\/see.xidian.edu.cn\/vipsl\/database_Video.html."},{"key":"e_1_2_1_4_1","unstructured":"2015b. Xiph.org Video Test Media {derf\u2019s collection}. (2015). https:\/\/media.xiph.org\/video\/derf\/.  2015b. Xiph.org Video Test Media {derf\u2019s collection}. (2015). https:\/\/media.xiph.org\/video\/derf\/."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230220"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0329-x"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2042-y"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"I. Cox M. Miller J. Bloom J. Fridrich and T. Kalker. 2008. Digital Watermarking and Steganography (2 ed.). Morgan Kaufmann Publishers Inc.   I. Cox M. Miller J. Bloom J. Fridrich and T. Kalker. 2008. Digital Watermarking and Steganography (2 ed.). Morgan Kaufmann Publishers Inc.","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"e_1_2_1_9_1","unstructured":"T. Dutta. 2014. Robust Compressed Domain Video Watermarking for H.264\/AVC. Ph.D. Thesis Indian Institute of Technology.  T. Dutta. 2014. Robust Compressed Domain Video Watermarking for H.264\/AVC. Ph.D. Thesis Indian Institute of Technology."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.12.007"},{"key":"e_1_2_1_11_1","volume-title":"Proc. of NCC. 1--5.","author":"Dutta T."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2134770"},{"key":"e_1_2_1_13_1","volume-title":"Proc. of ASID. 73--76","author":"Feng G."},{"key":"e_1_2_1_14_1","volume-title":"Proc. of BMSB. 1--6.","author":"Kuo T."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.230"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2344436.2344439"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2076280"},{"key":"e_1_2_1_18_1","volume-title":"Proc. of the APCCAS. 81--84","author":"Nguyen C."},{"key":"e_1_2_1_19_1","first-page":"890","article-title":"Compressed-domain video watermarking for H.264","volume":"2","author":"Noorkami M.","year":"2005","journal-title":"Proc. of ICIP"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.923825"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.890306"},{"key":"e_1_2_1_22_1","volume-title":"Proc. of ICCE. 102--103","author":"Ogawa K."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.46"},{"key":"e_1_2_1_24_1","unstructured":"D. Salomon G. Motta and D. Bryant. 2010. An Engineer\u2019s guide to Automated Testing of High-speed Interfaces. Artech House.  D. Salomon G. Motta and D. Bryant. 2010. An Engineer\u2019s guide to Automated Testing of High-speed Interfaces. Artech House."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2310595"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2221191"},{"key":"e_1_2_1_27_1","volume-title":"Proc. of INDICON. 1--4.","author":"Swaraja K."},{"key":"e_1_2_1_28_1","first-page":"e105613","article-title":"A Watermarking Scheme for High Efficiency Video Coding (HEVC)","volume":"9","author":"Swati S.","year":"2014","journal-title":"Public Library of Science (PLoS) ONE"},{"key":"e_1_2_1_29_1","volume-title":"Proc. of SPIE 1913","author":"Watson A. B.","year":"1993"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2011.04.008"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2006.886247"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2006.448"},{"key":"e_1_2_1_33_1","volume-title":"Proc. of the Media Forensics and Security. 725--740","author":"Zou D."},{"key":"e_1_2_1_34_1","volume-title":"Proc. of the ICME. 117--121","author":"Zou D."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3002178","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3002178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:54Z","timestamp":1750218594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3002178"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,17]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2,28]]}},"alternative-id":["10.1145\/3002178"],"URL":"https:\/\/doi.org\/10.1145\/3002178","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,17]]},"assertion":[{"value":"2014-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}