{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:42:54Z","timestamp":1744148574003},"reference-count":41,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1587\/transinf.2019mui0001","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T22:06:49Z","timestamp":1577830009000},"page":"2-10","source":"Crossref","is-referenced-by-count":5,"title":["Lightweight Authentication for MP4 Format Container Using Subtitle Track"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"KokSheik","family":"WONG","sequence":"first","affiliation":[{"name":"School of Information Technology, Monash University Malaysia"}]},{"given":"ChuanSheng","family":"CHAN","sequence":"additional","affiliation":[{"name":"School of Information Technology, Monash University Malaysia"}]},{"given":"AprilPyone","family":"MAUNGMAUNG","sequence":"additional","affiliation":[{"name":"Graduate School of System Design, Tokyo Metropolitan University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] K. Smith, \u201c52 fascinating and incredible youtube statistics,\u201d https:\/\/www.brandwatch.com\/blog\/youtube-stats\/, 2019."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M. Steinebach and J. Dittmann, \u201cWatermarking-based digital audio data authentication,\u201d EURASIP Journal on Advances in Signal Processing, vol.2003, no.10, 252490, Sept. 2003. 10.1155\/s1110865703304081","DOI":"10.1155\/S1110865703304081"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] Y. Tew and K. Wong, \u201cAn overview of information hiding in H.264\/AVC compressed video,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.24, no.2, pp.305-319, 2014. 10.1109\/tcsvt.2013.2276710","DOI":"10.1109\/TCSVT.2013.2276710"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] Y. Tew, K. Wong, R.C.-W. Phan, and K.N. Ngan, \u201cMulti-layer authentication scheme for HEVC video based on embedded statistics,\u201d J. Vis. Comun. Image Represent., vol.40, Part B, pp.502-515, Oct. 2016. 10.1016\/j.jvcir.2016.07.017","DOI":"10.1016\/j.jvcir.2016.07.017"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] I.M. Maung, Y. Tew, and K. Wong, \u201cAuthentication for AAC compressed audio using data hiding,\u201d 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), pp.1-2, May 2016. 10.1109\/icce-tw.2016.7520956","DOI":"10.1109\/ICCE-TW.2016.7520956"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] A.P.M. Maung, Y. Tew, and K. Wong, \u201cAuthentication of mp4 file by perceptual hash and data hiding,\u201d Malaysian Journal of Computer Science, vol.32, no.4, 2019. 10.22452\/mjcs.vol32no4.4","DOI":"10.22452\/mjcs.vol32no4.4"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] C. Chan, K. Wong, and I. Maungmaung, \u201cData hiding in MP4 video container based on subtitle track,\u201d APSIPA, pp.1128-1131, IEEE, 2018. 10.23919\/apsipa.2018.8659643","DOI":"10.23919\/APSIPA.2018.8659643"},{"key":"8","unstructured":"[8] ISO, \u201cInformation technology-coding of audio-visual objects-part 12: ISO base media file format,\u201d ISO 14496-12, International Organization for Standardization, Geneva, Switzerland, 2005. 10.3403\/02978584"},{"key":"9","unstructured":"[9] ISO, \u201cInformation technology-coding of audio-visual objects-part 14: Mp4 file format,\u201d ISO 14496-14, International Organization for Standardization, Geneva, Switzerland, 2003. 10.3403\/02983381"},{"key":"10","unstructured":"[10] Apple, \u201cIntroduction to quicktime file format specification,\u201d 2015."},{"key":"11","unstructured":"[11] S. Enamorado, \u201cHow to create an SRF file,\u201d https:\/\/www.3playmedia.com\/2017\/03\/08\/create-srt-file\/, 2017."},{"key":"12","unstructured":"[12] F.C. Pereira and T. Ebrahimi, The MPEG-4 Book, Prentice Hall Professional, 2002."},{"key":"13","unstructured":"[13] TED, \u201cInside the mind of a master procrastinator | Tim Urban,\u201d https:\/\/www.youtube.com\/watch?v=arj7oStGLkU, 2016."},{"key":"14","unstructured":"[14] Bloomberg, \u201cHow Masayoshi Son became an eccentric dealmaker,\u201d https:\/\/www.youtube.com\/watch?v=cDpTPrfw1mQ, 2018."},{"key":"15","unstructured":"[15] National Geographic, \u201cRe-envisioning reality-tech+art | genius: Picasso,\u201d https:\/\/www.youtube.com\/watch?v=T9chHEEp-0M, 2018."},{"key":"16","unstructured":"[16] Y. Li, \u201cA lecture on Fibonacci series,\u201d https:\/\/www.youtube.com\/watch?v=VCJsUYeuqaY, 2018."},{"key":"17","unstructured":"[17] Verge Science, \u201cWhat self-driving cars can learn from brainless slime mold,\u201d https:\/\/www.youtube.com\/watch?v=40f7_93NIgA, 2018."},{"key":"18","unstructured":"[18] M. Haapoja, \u201cFujifilm x-t3 review-4k 60p, 120p for $1500? yes please!,\u201d https:\/\/www.youtube.com\/watch?v=bZ-SvBfAFtM, 2018."},{"key":"19","unstructured":"[19] CNBC International, \u201cInside Chinese tech giant tencent&apos;s vertical campus | CNBC reports,\u201d https:\/\/www.youtube.com\/watch?v=Huju5McKgIU, 2018."},{"key":"20","unstructured":"[20] The School of Life, \u201cWhat to do if you hate small talk,\u201d https:\/\/www.youtube.com\/watch?v=SrK5NAgw_g4, 2018."},{"key":"21","unstructured":"[21] Kurzgesagt-In a Nutshell, \u201cThe origin of consciousness \u2014 How unaware things became aware,\u201d https:\/\/www.youtube.com\/watch?v=H6u0VBqNBQ8, 2019."},{"key":"22","unstructured":"[22] PolyMatter, \u201cThe true cost of the iphone,\u201d https:\/\/www.youtube.com\/watch?v=5kZRY5xlP6Y, 2019."},{"key":"23","unstructured":"[23] Half as Interesting, \u201cThe 30 year-old airline that&apos;s never flown,\u201d https:\/\/www.youtube.com\/watch?v=PB2RuEz2VV4, 2019."},{"key":"24","unstructured":"[24] Jimmy Kimmel Live, \u201cMarie Kondo helps Jimmy Kimmel tidy up,\u201d https:\/\/www.youtube.com\/watch?v=-3VCoY27fFI, 2019."},{"key":"25","unstructured":"[25] Vox, \u201cThe conflict in Kashmir, explained,\u201d https:\/\/www.youtube.com\/watch?v=cyayif_nla8, 2019."},{"key":"26","unstructured":"[26] D. Lee, \u201cThe alienware beast\u201d https:\/\/www.youtube.com\/watch?v=pAEVLUeYaf8, 2019."},{"key":"27","unstructured":"[27] Cheddar, \u201cThe unseen inefficiency of escalator etiquette-cheddar explains,\u201d https:\/\/www.youtube.com\/watch?v=vbsoO2c7gCM, 2019."},{"key":"28","unstructured":"[28] The HandBrake Team, Handbrake."},{"key":"29","unstructured":"[29] K. Wong, C.S. Chan, and I. Maungmaung, https:\/\/bit.ly\/2Zfpuxk"},{"key":"30","doi-asserted-by":"publisher","unstructured":"[30] V. Amanipour and S. Ghaemmaghami, \u201cVideo-tampering detection and content reconstruction via self-embedding,\u201d IEEE Trans. Instrum. Meas., vol.67, no.3, pp.505-515, March 2018. 10.1109\/tim.2017.2777620","DOI":"10.1109\/TIM.2017.2777620"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] K. Takagi, S. Sakazawa, and Y. Takishima, \u201cLight weight MP3 watermarking method for mobile terminals,\u201d IEICE Trans. Fundamentals, vol.E91-A, no.9, pp.2546-2554, Sept. 2008. 10.1093\/ietfec\/e91-a.9.2546","DOI":"10.1093\/ietfec\/e91-a.9.2546"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] L. Pang, K. Wong, and S.T. Liong, \u201cData embedding in scalable coded video,\u201d 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017, Kuala Lumpur, Malaysia, Dec. 12-15, 2017, pp.1190-1194, IEEE, 2017. 10.1109\/apsipa.2017.8282210","DOI":"10.1109\/APSIPA.2017.8282210"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] N. Mehmood and M. Mushtaq, \u201cA fragile watermarking scheme using prediction modes for H.264\/AVC content authentication,\u201d 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp.1014-1021, Oct. 2012. 10.1109\/lcnw.2012.6424038","DOI":"10.1109\/LCNW.2012.6424038"},{"key":"34","unstructured":"[34] J. Zhang and A.T.S. Ho, \u201cEfficient video authentication for H.264\/AVC,\u201d First International Conference on Innovative Computing, Information and Control-Volume I (ICICIC&apos;06), pp.46-49, Aug. 2006. 10.1109\/icicic.2006.448"},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] S. Acharjee, S. Chakraborty, S. Samanta, A.T. Azar, A.E. Hassanien, and N. Dey, \u201cHighly secured multilayered motion vector watermarking,\u201d Advanced Machine Learning Technologies and Applications, ed. A.E. Hassanien, M.F. Tolba, and A.T. Azar, Cham, pp.121-134, Springer International Publishing, 2014. 10.1007\/978-3-319-13461-1_13","DOI":"10.1007\/978-3-319-13461-1_13"},{"key":"36","doi-asserted-by":"publisher","unstructured":"[36] T. Shanableh, \u201cMatrix encoding for data hiding using multilayer video coding and transcoding solutions,\u201d Signal Processing: Image Communication, vol.27, no.9, pp.1025-1034, Oct. 2012. 10.1016\/j.image.2012.06.003","DOI":"10.1016\/j.image.2012.06.003"},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] Y. Kim, S. Han, S. Choi, and B. Jung, \u201cFile-based closed captioning system without captioning delay,\u201d SMPTE 2015 Annual Technical Conference and Exhibition, pp.1-8, Oct. 2015. 10.5594\/m001675","DOI":"10.5594\/M001675"},{"key":"38","doi-asserted-by":"publisher","unstructured":"[38] L.Y. Por, K. Wong, and K.O. Chee, \u201cUniSpaCh: A text-based data hiding method using unicode space characters,\u201d J. Syst. Softw., vol.85, no.5, pp.1075-1082, May 2012. 10.1016\/j.jss.2011.12.023","DOI":"10.1016\/j.jss.2011.12.023"},{"key":"39","unstructured":"[39] M. J\u00f3kay, \u201cThe design of a steganographic system based on the internal mp4 file structures,\u201d International Journal of Computers and Communications, vol.5, 2011."},{"key":"40","unstructured":"[40] C. Oliboni, \u201cOpenpuff v4.00 steganography and watermarking,\u201d July 2012."},{"key":"41","unstructured":"[41] M. Fiedler, \u201cReal steganography with truecrypt,\u201d http:\/\/keyj.emphy.de\/real-steganography-with-truecrypt, Feb. 2011."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/1\/E103.D_2019MUI0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T05:20:36Z","timestamp":1578288036000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/1\/E103.D_2019MUI0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019mui0001","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}