{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:46:31Z","timestamp":1770227191356,"version":"3.49.0"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"3s","license":[{"start":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T00:00:00Z","timestamp":1667174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020YFB1406902 and A12003"],"award-info":[{"award-number":["2020YFB1406902 and A12003"]}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["62101346"],"award-info":[{"award-number":["62101346"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100021171","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"crossref","award":["2021A1515011702"],"award-info":[{"award-number":["2021A1515011702"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Stable Support Plan for Shenzhen Higher Education Institutions","award":["20200812104316001"],"award-info":[{"award-number":["20200812104316001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2022,10,31]]},"abstract":"<jats:p>Video watermarking technology has attracted increasing attention in the past few years, and a great deal of traditional and deep learning-based methods have been proposed. However, these existing methods usually suffer from the following two challenges: First, most algorithms cannot resist camcorder recording attack, which limits their practical application. Second, watermark embedding may cause substantial degradation of video quality. Through analyzing the unique distortions presented in the camcorder recording process, including geometric distortion, temporal sampling distortion, sensor distortion and processing distortion, this paper proposes a novel spatio-temporal context based adaptive camcorder recording watermarking scheme STACR. In STACR, considering the geometric distortion and video visual quality, we embed the watermark by constructing a spatio-temporal histogram and incorporate a content features based adaptive locating algorithm to select embedding blocks and embedding strengths. As for the temporal sampling attack, we put forward a watermark correlation-based synchronization algorithm and combine it with cross-validation. Moreover, to resist the sensor distortion, we design a local matching-based algorithm to improve the extraction accuracy. In addition, grouped and repeated embedding strategies are combined to cope with the processing distortion. Experimental results compared with the state-of-the-art show that the proposed scheme achieves high video quality and is robust to geometric attacks, compression, scaling, transcoding, recoding, frame rate changes and especially for camcorder recording.<\/jats:p>","DOI":"10.1145\/3503160","type":"journal-article","created":{"date-parts":[[2022,3,12]],"date-time":"2022-03-12T11:50:20Z","timestamp":1647085820000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Spatio-Temporal Context Based Adaptive Camcorder Recording Watermarking"],"prefix":"10.1145","volume":"18","author":[{"given":"Chen","family":"Hui","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"}]},{"given":"Shaohui","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"}]},{"given":"Wuzhen","family":"Shi","sequence":"additional","affiliation":[{"name":"College of Electronics and Information Engineering, Shenzhen University, Nanhai Avenue, Shenzhen, China"}]},{"given":"Feng","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"}]},{"given":"Debin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2014.2338274"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2589208"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2712162"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2901877"},{"key":"e_1_3_1_6_2","article-title":"Methodology for the subjective assessment of the quality of television pictures","author":"BT RECOMMENDATION ITU-R","year":"2002","unstructured":"RECOMMENDATION ITU-R BT. 2002. Methodology for the subjective assessment of the quality of television pictures. International Telecommunication Union (2002).","journal-title":"International Telecommunication Union"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2573592"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2741472"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.10.009"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2008.4775680"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.833867"},{"key":"e_1_3_1_12_2","first-page":"116","article-title":"A robust discrete wavelet transform based adaptive watermarking scheme in YCbCr color space against camcorder recording in cinema\/movie theatres","volume":"15","author":"Dubey Nilesh","year":"2021","unstructured":"Nilesh Dubey and Hardik Modi. 2021. A robust discrete wavelet transform based adaptive watermarking scheme in YCbCr color space against camcorder recording in cinema\/movie theatres. Engineered Science 15 (2021), 116\u2013128.","journal-title":"Engineered Science"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2878541"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931078"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.801121"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012356022268"},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1117\/12.344665","volume-title":"Security and Watermarking of Multimedia Contents","author":"Hartung Frank H.","year":"1999","unstructured":"Frank H. Hartung, Jonathan K. Su, and Bernd Girod. 1999. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents, Vol. 3657. International Society for Optics and Photonics, 147\u2013158."},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1117\/12.384972","volume-title":"Security and Watermarking of Multimedia Contents II","author":"Holliman Matthew J.","year":"2000","unstructured":"Matthew J. Holliman, William W. Macy, and Minerva M. Yeung. 2000. Robust frame-dependent video watermarking. In Security and Watermarking of Multimedia Contents II, Vol. 3971. International Society for Optics and Photonics, 186\u2013197."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428143"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016MUP0008"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/DMDCM.2011.9"},{"key":"e_1_3_1_22_2","first-page":"106","volume-title":"Proc. Pacific-Rim Conf. Multimedia","author":"Kim Won-gyum","year":"2006","unstructured":"Won-gyum Kim, Seon Hwa Lee, and Yong-seok Seo. 2006. Image fingerprinting scheme for print-and-capture model. In Proc. Pacific-Rim Conf. Multimedia. Springer, 106\u2013113."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.1999.0447"},{"key":"e_1_3_1_24_2","unstructured":"Nick Kingsbury. 2005. Human Vision. http:\/\/cnx.org\/content\/m11084\/latest\/."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/79.879337"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.08.009"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742667"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1117\/1.3529430"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3042882"},{"key":"e_1_3_1_30_2","first-page":"146","volume-title":"International Workshop on Information Hiding","author":"Miller Matt L.","year":"1999","unstructured":"Matt L. Miller and Jeffrey A. Bloom. 1999. Computing the probability of false watermark detection. In International Workshop on Information Hiding. Springer, 146\u2013158."},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524512"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.15.000563"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPRIME.2013.6496482"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2700295"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2282121"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2221191"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"e_1_3_1_38_2","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1117\/12.384990","volume-title":"Security and Watermarking of Multimedia Contents II","author":"Voloshynovskiy Sviatoslav V.","year":"2000","unstructured":"Sviatoslav V. Voloshynovskiy, Shelby Pereira, Alexander Herrigel, Nazanin Baumgartner, and Thierry Pun. 2000. Generalized watermarking attack based on watermark estimation and perceptual remodulation. In Security and Watermarking of Multimedia Contents II, Vol. 3971. International Society for Optics and Photonics, 358\u2013370."},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/OSSC.2009.5416913"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1993.253132"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918843"},{"key":"e_1_3_1_42_2","first-page":"7","volume-title":"6th International Conference on Digital Content, Multimedia Technology and its Applications","author":"Yuan Yule","year":"2010","unstructured":"Yule Yuan, Yong Zhao, Kunpeng Wang, and Xuhui Bai. 2010. A robust video watermarking algorithm based on sliding window for AVS. In 6th International Conference on Digital Content, Multimedia Technology and its Applications. IEEE, 7\u201310."},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2363743"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503160","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,31]]},"references-count":43,"journal-issue":{"issue":"3s","published-print":{"date-parts":[[2022,10,31]]}},"alternative-id":["10.1145\/3503160"],"URL":"https:\/\/doi.org\/10.1145\/3503160","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,31]]},"assertion":[{"value":"2021-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}