{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:10:09Z","timestamp":1750205409968,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T00:00:00Z","timestamp":1550966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MOHE","award":["FRGS\/1\/2016\/ICT04\/UTAR\/01\/1"],"award-info":[{"award-number":["FRGS\/1\/2016\/ICT04\/UTAR\/01\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,24]]},"DOI":"10.1145\/3316551.3316555","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"157-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Robustness Attacks on Video Watermarking Using Singular Value Decomposition"],"prefix":"10.1145","author":[{"given":"Grace C.-W.","family":"Ting","sequence":"first","affiliation":[{"name":"Universiti Tunku Abdul Rahman, Malaysia"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Bok-Min","family":"Goi","sequence":"additional","affiliation":[{"name":"Universiti Tunku Abdul Rahman, Malaysia"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Sze-Wei","family":"Lee","sequence":"additional","affiliation":[{"name":"Tunku Abdul Rahman University College, Malaysia"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE Internet Computing","volume":"19","author":"Miranda J.","unstructured":"Miranda , J. , Makitalo , N. , Garcia-Alonso , J. , Berrocal , J. , Mikkonen , T. , Canal , C. , and Murillo , JM . 2015. From the Internet of Things to the Internet of People , IEEE Internet Computing , Vol. 19 , No. 2, IEEE, 40--47. Miranda, J., Makitalo, N., Garcia-Alonso, J., Berrocal, J., Mikkonen, T., Canal, C., and Murillo, JM. 2015. From the Internet of Things to the Internet of People, IEEE Internet Computing, Vol. 19, No. 2, IEEE, 40--47."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.913598"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of Africon '17","author":"Adul V.","year":"2017","unstructured":"Adul , V. and Mwangi , E . 2017. A Robust Video Watermarking Approach based on a Hybrid SVD\/DWT Technique , In Proceedings of Africon '17 , 2017 . Adul, V. and Mwangi, E. 2017. A Robust Video Watermarking Approach based on a Hybrid SVD\/DWT Technique, In Proceedings of Africon '17, 2017."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4698-6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2029869"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Tabash F.K. and Izharuddin M. 2018. Efficient Encryption Technique for H.264\/AVCVideos based on CABAC and Logistic Map Multimedia Tools and Applications in press.  Tabash F.K. and Izharuddin M. 2018. Efficient Encryption Technique for H.264\/AVCVideos based on CABAC and Logistic Map Multimedia Tools and Applications in press.","DOI":"10.1109\/ICPCSI.2017.8392221"},{"key":"e_1_3_2_1_7_1","first-page":"185","article-title":"A Secure, Robust Watermark for Multimedia, In Proceedings of IH '96","volume":"1174","author":"Cox IJ.","year":"1996","unstructured":"Cox , IJ. , Kilian , J. , Leighton , T. , and Shamoon , T. 1996 . A Secure, Robust Watermark for Multimedia, In Proceedings of IH '96 , LNCS Vol. 1174 , Spring er, 185 -- 206 . Cox, IJ., Kilian, J., Leighton, T., and Shamoon, T. 1996. A Secure, Robust Watermark for Multimedia, In Proceedings of IH '96, LNCS Vol. 1174, Springer, 185--206.","journal-title":"LNCS"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.06.015"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1208-8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2422-3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905137"},{"key":"e_1_3_2_1_12_1","volume-title":"Available online at https:\/\/media.xiph.org\/video\/derf\/, last accessed","author":"Xiph","year":"2018","unstructured":"Xiph .org. 2004. Xiph.org Video Test Media {derf's collection}. Available online at https:\/\/media.xiph.org\/video\/derf\/, last accessed 17 August 2018 . Xiph.org. 2004. Xiph.org Video Test Media {derf's collection}. Available online at https:\/\/media.xiph.org\/video\/derf\/, last accessed 17 August 2018."}],"event":{"name":"ICDSP 2019: 2019 3rd International Conference on Digital Signal Processing","acronym":"ICDSP 2019","location":"Jeju Island Republic of Korea"},"container-title":["Proceedings of the 2019 3rd International Conference on Digital Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316551.3316555","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316551.3316555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:16Z","timestamp":1750204396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316551.3316555"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,24]]},"references-count":12,"alternative-id":["10.1145\/3316551.3316555","10.1145\/3316551"],"URL":"https:\/\/doi.org\/10.1145\/3316551.3316555","relation":{},"subject":[],"published":{"date-parts":[[2019,2,24]]},"assertion":[{"value":"2019-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}