{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:35Z","timestamp":1750221155214,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T00:00:00Z","timestamp":1528761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004584","name":"Conseil R\u00e9gional de Bretagne","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004584","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,12]]},"DOI":"10.1145\/3204949.3204964","type":"proceedings-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T12:22:47Z","timestamp":1530102167000},"page":"76-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Watermarked video delivery"],"prefix":"10.1145","author":[{"given":"Kun","family":"He","sequence":"first","affiliation":[{"name":"IMT Atlantique, France"}]},{"given":"Patrick","family":"Maill\u00e9","sequence":"additional","affiliation":[{"name":"IMT Atlantique, France"}]},{"given":"Gwendal","family":"Simon","sequence":"additional","affiliation":[{"name":"IMT Atlantique, France"}]}],"member":"320","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647801.737144"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of IEEE EUSIPCO","author":"Kopilovic Ivan","year":"2007","unstructured":"Ivan Kopilovic , Virginie Drugeon , and Marcel Wagner . Video-dna : Large-scale server-side watermarking . In Proc. of IEEE EUSIPCO , 2007 . Ivan Kopilovic, Virginie Drugeon, and Marcel Wagner. Video-dna: Large-scale server-side watermarking. In Proc. of IEEE EUSIPCO, 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2251756"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2014.6776048"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2036996.2037006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3083165.3083174"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2713168.2713195"},{"key":"e_1_3_2_1_8_1","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"Katzenbeisser Stefan","year":"2000","unstructured":"Stefan Katzenbeisser and Fabien Petitcolas . Information hiding techniques for steganography and digital watermarking . Artech house, 2000 . Stefan Katzenbeisser and Fabien Petitcolas. Information hiding techniques for steganography and digital watermarking. Artech house, 2000."},{"key":"e_1_3_2_1_9_1","volume-title":"Intelligent Watermarking Techniques:(With CD-ROM). World scientific","author":"Pan Jeng-Shyang","year":"2004","unstructured":"Jeng-Shyang Pan , Hsiang-Cheh Huang , and Lakhmi C Jain . Intelligent Watermarking Techniques:(With CD-ROM). World scientific , 2004 . Jeng-Shyang Pan, Hsiang-Cheh Huang, and Lakhmi C Jain. Intelligent Watermarking Techniques:(With CD-ROM). World scientific, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943552.1943572"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700294"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228342"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.015"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2016.24"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/648088.747475"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2012.6463984"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00227-X"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346330.1346335"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496770.1496808"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-007-9142-x"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029146.1029160"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.43"}],"event":{"name":"MMSys '18: 9th ACM Multimedia Systems Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Amsterdam Netherlands","acronym":"MMSys '18"},"container-title":["Proceedings of the 9th ACM Multimedia Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3204949.3204964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3204949.3204964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:32Z","timestamp":1750208912000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3204949.3204964"}},"subtitle":["traffic reduction and CDN management"],"short-title":[],"issued":{"date-parts":[[2018,6,12]]},"references-count":22,"alternative-id":["10.1145\/3204949.3204964","10.1145\/3204949"],"URL":"https:\/\/doi.org\/10.1145\/3204949.3204964","relation":{},"subject":[],"published":{"date-parts":[[2018,6,12]]},"assertion":[{"value":"2018-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}