{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:52:33Z","timestamp":1770137553223,"version":"3.49.0"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"vor","delay-in-days":235,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/100014103","name":"Key Technology Research and Development Program of Shandong Province","doi-asserted-by":"publisher","award":["2019GGX101008"],"award-info":[{"award-number":["2019GGX101008"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014103","name":"Key Technology Research and Development Program of Shandong Province","doi-asserted-by":"publisher","award":["2016GGX105013"],"award-info":[{"award-number":["2016GGX105013"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p>In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. In view of this need, this paper proposes a zero\u2010watermarking algorithm for audio and video matching based on NSCT. The algorithm uses NSCT, DCT, SVD, and Schur decomposition to extract video features and audio features and generates zero\u2010watermark stream through synthesis, which is stored in a third\u2010party organization for detection and identification. The detection algorithm can obtain zero watermark from the audio and video to be tested and judge and locate tampering by comparing with the zero watermark of the third party. From the experimental results, this algorithm can not only detect whether the audio and video are mismatched due to tampering attacks but also locate the mismatched audio and video segments and protect the copyright.<\/jats:p>","DOI":"10.1155\/2022\/3445583","type":"journal-article","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T17:35:07Z","timestamp":1661362507000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Audio and Video Matching Zero\u2010Watermarking Algorithm Based on NSCT"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6470-315X","authenticated-orcid":false,"given":"Di","family":"Fan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3913-1203","authenticated-orcid":false,"given":"Wenxue","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1013-6003","authenticated-orcid":false,"given":"Huiyuan","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4017-6313","authenticated-orcid":false,"given":"Wenshuo","family":"Kang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2489-5702","authenticated-orcid":false,"given":"Changzhi","family":"Lv","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.12.004"},{"key":"e_1_2_10_2_2","article-title":"A novel zero watermark optimization algorithm based on Gabor transform and discrete cosine transform","volume":"2020","author":"Fan D.","year":"2020","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.05.011"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4912"},{"key":"e_1_2_10_5_2","doi-asserted-by":"crossref","unstructured":"NarasimhuluC. V. A robust hybrid video watermarking algorithm using NSCT and SVD Proceedings of the IEEE International Conference on Power Control Signals and Instrumentation Engineering September 2017 New York NY USA 1495\u20131501.","DOI":"10.1109\/ICPCSI.2017.8391961"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2021.110691"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7559084"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijics.2021.112207"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-020-01585-6"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5340-3"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijics.2019.103065"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8848553"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.06.015"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12253"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1049\/el.2015.1508"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05389-2"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08023-z"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2128\/1\/012019"},{"key":"e_1_2_10_19_2","unstructured":"DittmannJ. SteinmetzA. andSteinmetzR. Content-based digital signature for motion pictures authentication and content-fragile watermarking Proceedings of the IEEE International Conference of the Multimedia Systems Multimedia Computing and Systems June 1999 Florence Italy 574\u2013579."},{"key":"e_1_2_10_20_2","first-page":"112","article-title":"Audio and video cross watermarking algorithm based on visual saliency model","volume":"40","author":"Wang X.","year":"2017","journal-title":"Electronic Measuremeent Technology"},{"key":"e_1_2_10_21_2","doi-asserted-by":"crossref","unstructured":"EsmaeilbeigZ.andGhaemmaghamiS. Compressed video watermarking for authentication and reconstruction of the audio part Proceedings of the 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) August 2018 Tehran Iran IEEE 1\u20136.","DOI":"10.1109\/ISCISC.2018.8546897"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.3934\/math.2022468"},{"key":"e_1_2_10_23_2","first-page":"469","article-title":"A study on optimum classification character based on the distributive entropy of euclidian distance","volume":"2","author":"Bao M.","year":"2007","journal-title":"Journal of Optoelectronics - Laser"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-018-1332-0"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.3778\/j.issn.1673-9418.1712040"},{"key":"e_1_2_10_26_2","first-page":"770","article-title":"Watermarking algorithm of audio signal based on discrete wavelet transform and singular value decomposition","volume":"37","author":"Feng X.","year":"2016","journal-title":"Journal of Huaqiao University"},{"key":"e_1_2_10_27_2","first-page":"1015","article-title":"A robust audio watermarking algorithm based on DWT-DCT-SVD","volume":"32","author":"Liu S.","year":"2021","journal-title":"Journal of Optoelectronics - Laser"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/3445583","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/2022\/3445583","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/3445583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:06:36Z","timestamp":1769115996000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2022\/3445583"}},"subtitle":[],"editor":[{"given":"Wenjie","family":"Lu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1155\/2022\/3445583"],"URL":"https:\/\/doi.org\/10.1155\/2022\/3445583","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"2022-04-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3445583"}}