{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:14:28Z","timestamp":1776442468635,"version":"3.51.2"},"reference-count":40,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.056438","type":"journal-article","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T07:16:26Z","timestamp":1728717386000},"page":"2457-2492","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["Adaptive Video Dual Domain Watermarking Scheme Based on PHT Moment and Optimized Spread Transform Dither Modulation"],"prefix":"10.32604","volume":"81","author":[{"given":"Yucheng","family":"Liang","sequence":"first","affiliation":[]},{"given":"Ke","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yingnan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yifei","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Fangmeng","family":"Hu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","first-page":"1","article-title":"New fragile watermarking technique to identify inserted video objects using H.264 and color features","volume":"76","author":"Ogla","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref2","doi-asserted-by":"crossref","unstructured":"Y. Zhang, J. Ni, W. Su, and X. Liao, \u201cA novel deep video watermarking framework with enhanced robustness to H.264\/AVC compression,\u201d presented at the Proc. 31st ACM Int. Conf. Multimedia, Ottawa, ON, Canada, Oct. 29\u2013Nov. 3, 2023. doi: 10.1145\/3581783.3612270.","DOI":"10.1145\/3581783.3612270"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"15681","DOI":"10.1109\/ACCESS.2022.3146723","article-title":"Blind Camcording-resistant video watermarking in the DT CWT and SVD domain","volume":"10","author":"Asikuzzaman","year":"2022","journal-title":"IEEE Access"},{"key":"ref4","series-title":"Proc. 30th ACM Int. Conf. Multimedia","article-title":"Blind robust video watermarking based on adaptive region selection and channel reference","author":"Chang","year":"Oct. 10\u201314, 2022"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"4702","DOI":"10.1109\/TDSC.2022.3232484","article-title":"Robust blind video watermarking against geometric deformations and online video sharing platform processing","volume":"20","author":"He","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"ref6","first-page":"2799\u20131156","article-title":"DWT-PCA based video watermarking","author":"Takale","year":"2022","journal-title":"J. Electr., Comput. Network. Appl. Mathemat."},{"key":"ref7","series-title":"Proc. 31st ACM Int. Conf. Multimedia, MM","article-title":"Invisible video watermark method based on maximum voting and probabilistic superposition","author":"Guo","year":"Oct. 29\u2013Nov. 3, 2023"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3869","DOI":"10.1007\/s12652-021-03365-9","article-title":"A logistic map based blind and fragile watermarking for tamper detection and localization in images","volume":"13","author":"Sahu","year":"2022","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"D. Coltuc and J. M. Chassery, \u201cDistortion-free robust watermarking: A case study,\u201d presented at the Secur. Steganograp. Watermarking Multimedia Contents IX, San Jose, CA, USA, SPIE, Feb. 27, 2007.","DOI":"10.1117\/12.702445"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.ins.2019.09.062","article-title":"Robust reversible data hiding scheme based on two-layer embedding strategy","volume":"512","author":"Kumar","year":"2020","journal-title":"Inf. Sci."},{"key":"ref11","article-title":"Robust and reversible image watermarking in homomorphic encrypted domain","volume":"99","author":"Liang","year":"2021, Art. no. 116462","journal-title":"Signal Process.: Image Commun."},{"key":"ref12","series-title":"Proc. 11th Panhellenic Conf. Inform. (PCI 2007)","article-title":"Reversible image watermarking based on histogram modification","author":"Chrysochos","year":"May 18\u201320, 2007"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2283","DOI":"10.1016\/j.ins.2009.03.003","article-title":"Preserving robustness and removability for digital watermarks using subsampling and difference correlation","volume":"179","author":"Chang","year":"2009","journal-title":"Inf. Sci."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/TIP.2020.3036727","article-title":"Cover-lossless robust image watermarking against geometric deformations","volume":"30","author":"Hu","year":"2021","journal-title":"IEEE Trans. Image Process."},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107833","article-title":"Lossless robust image watermarking by using polar harmonic transform","volume":"179","author":"Hu","year":"2021, Art. no. 107833","journal-title":"Signal Process."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1109\/TCSVT.2022.3216849","article-title":"A highly robust reversible watermarking scheme using embedding optimization and rounded error compensation","volume":"33","author":"Tang","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"7310","DOI":"10.1109\/TCSVT.2023.3279116","article-title":"Robust reversible watermarking by fractional order zernike moments and pseudo-zernike moments","volume":"33","author":"Fu","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119786","article-title":"A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity","volume":"654","author":"Tang","year":"2024, Art. no. 119786","journal-title":"Inf. Sci."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TMM.2003.809729","article-title":"Circular interpretation of bijective transformations in lossless watermarking for media asset management","volume":"5","author":"De Vleeschouwer","year":"2003","journal-title":"IEEE Trans. Multimedia"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/TCSVT.2008.918761","article-title":"Robust lossless image data hiding designed for semi-fragile image authentication","volume":"18","author":"Ni","year":"2008","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1049\/iet-ipr.2017.0151","article-title":"Reversible data hiding scheme based on significant-bit-difference expansion","volume":"11","author":"Wang","year":"2017","journal-title":"IET Image Process"},{"key":"ref22","doi-asserted-by":"crossref","unstructured":"S. Xiang and Y. Wang, \u201cDistortion-free robust reversible watermarking by modifying and recording IWT means of image blocks,\u201d presented at the Dig.-Forens. Watermarking: 14th Int. Workshop, IWDW 2015, Tokyo, Japan, Oct. 7\u201310, 2016. doi: 10.1007\/978-3-319-31960-5_28.","DOI":"10.1007\/978-3-319-31960-5_28"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2391","DOI":"10.1109\/TCSVT.2020.2986782","article-title":"Separable robust reversible watermarking in encrypted 2D vector graphics","volume":"30","author":"Peng","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/TCSVT.2021.3055072","article-title":"Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography","volume":"32","author":"Xiong","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"4114","DOI":"10.1109\/TIFS.2024.3372811","article-title":"A robust reversible watermarking scheme using attack-simulation-based adaptive normalization and embedding","volume":"19","author":"Tang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"4115","DOI":"10.1109\/TII.2023.3321101","article-title":"Efficient robust reversible watermarking based on ZMs and integer wavelet transform","volume":"20","author":"Gao","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"7342","DOI":"10.1109\/TCSVT.2023.3281618","article-title":"A fast method for robust video watermarking based on zernike moments","volume":"33","author":"Chen","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref28","series-title":"2023 11th Int. Symp. Dig. Forens. Secur. (ISDFS)","article-title":"Improved ECC-based phase watermarking method for video copyright protection","author":"Shapiro","year":"2023"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"5536170:1\u20135536170:19","DOI":"10.1155\/2021\/5536170","article-title":"A secured frame selection based video watermarking technique to address quality loss of data: Combining graph based transform, singular valued decomposition, and hyperchaotic encryption","volume":"2021","author":"Sharma","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"5087","DOI":"10.1109\/TIP.2018.2851074","article-title":"Reversible data hiding under inconsistent distortion metrics","volume":"27","author":"Hou","year":"2018","journal-title":"IEEE Trans. Image Process."},{"key":"ref31","article-title":"Towards distortion-free robust image authentication","volume":"77","author":"Coltuc","year":"2007, Art. no. 012005","journal-title":"J. Phys."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"2406","DOI":"10.1109\/TCSVT.2019.2915116","article-title":"Independent embedding domain based two-stage robust reversible watermarking","volume":"30","author":"Wang","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref33","series-title":"2023 IEEE Int. Conf. Image Process. (ICIP)","article-title":"A contrario detection of H.264 video double compression","author":"Li","year":"2023"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TPAMI.2009.119","article-title":"Two-dimensional polar harmonic transforms for invariant image representation","volume":"32","author":"Yap","year":"2010","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","article-title":"Quantization index modulation: A class of provably good methods for digital watermarking and information embedding","volume":"47","author":"Chen","year":"2001","journal-title":"IEEE Trans. Inf. Theor."},{"key":"ref36","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jbusres.2022.01.076","article-title":"Overcoming the pitfalls and perils of algorithms: A classification of machine learning biases and mitigation methods","volume":"144","author":"Giffen","year":"2022","journal-title":"J. Bus. Res."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1016\/j.csda.2006.05.019","article-title":"Generating good pseudo-random numbers","volume":"51","author":"Wichmann","year":"2006","journal-title":"Comput. Stat. Data Anal."},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.3390\/math11132913","article-title":"Anti-recompression video watermarking algorithm based on H.264\/AVC","volume":"11","author":"Fan","year":"2023, Art. no. 2913","journal-title":"Mathematics"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1007\/s40747-021-00569-6","article-title":"Optimal keyframe selection-based lossless video-watermarking technique using IGSA in LWT domain for copyright protection","volume":"8","author":"Singh","year":"2022","journal-title":"Complex Intell. Syst."},{"key":"ref40","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1080\/03610927708827533","article-title":"Robust regression using iteratively reweighted least-squares","volume":"6","author":"Holland","year":"1977","journal-title":"Commun. Stat.-Theor. Methods"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_56438\/TSP_CMC_56438.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:16:34Z","timestamp":1741320994000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":40,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.056438","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}