{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:21:35Z","timestamp":1745986895395,"version":"3.40.4"},"reference-count":23,"publisher":"International Academy Publishing (IAP)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.8.2.533-538","type":"journal-article","created":{"date-parts":[[2013,1,29]],"date-time":"2013-01-29T23:31:38Z","timestamp":1359502298000},"source":"Crossref","is-referenced-by-count":3,"title":["Recoverable Video Watermark in DCT Domain"],"prefix":"10.17706","volume":"8","author":[{"given":"Mingzhi","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Minchao","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Kaiguo","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Min","family":"Lei","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,2,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(02)00144-3"},{"issue":"12","key":"ref2","first-page":"6963","article-title":"V. RADHA, Survey on Digital Video Watermarking Techniques and Attacks on Watermarks","volume":"2","year":"2010","unstructured":"[2]T.JAYAMALAR, V. RADHA, Survey on Digital Video Watermarking Techniques and Attacks on Watermarks, International Journal of Engineering Science and Technology, Vol. 2(12), 2010, 6963-6967.","journal-title":"Int J Eng Sci Technol","ISSN":"https:\/\/id.crossref.org\/issn\/0975-5462","issn-type":"print"},{"issue":"7","key":"ref3","first-page":"2549","article-title":"A Robust Watermarking Against Shearing Based on Improved S-Radon Transformation.","volume":"10","author":"Minghui","year":"2012","unstructured":"[3]Deng Minghui, Zeng Qingshuang, Zhou Xiuli. A Robust Watermarking Against Shearing Based on Improved S-Radon Transformation. Journal of Computers, 2012, 10(7): 2549-2556.","journal-title":"Journal of Computers"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.C1100338"},{"key":"ref6","first-page":"1549","article-title":"Prediction-error based reversible watermarking","volume-title":"Proceedings of the ICIP International Conference on Image Processing","volume":"3","author":"Thodi","year":"2004","unstructured":"[8]D. M. Thodi and J. J. Rodriguez, \"Prediction-error based reversible watermarking,\" in Proceedings of the ICIP International Conference on Image Processing, vol. 3, pp. 1549\u20131552, Genova, Oct. 2004."},{"key":"ref7","first-page":"345","article-title":"Circular interpretation of histogram for reversible watermarking","volume-title":"Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing","author":"Vleeschouwer","year":"2001","unstructured":"[10]C. D. Vleeschouwer, J. E. Delaigle, and B. Macq, \"Circular interpretation of histogram for reversible watermarking,\" in Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing, pp. 345\u2013350, France, Oct. 2001."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.809729"},{"issue":"5","key":"ref9","first-page":"1933","article-title":"Attack Model and Performance Evaluation of Text Digital Watermarking.","volume":"12","author":"Xinmin","year":"2010","unstructured":"[12]Zhou Xinmin, Yu Jianping. Attack Model and Performance Evaluation of Text Digital Watermarking. Journal of Computers, 2010, 12(5): 1933-1941.","journal-title":"Journal of Computers"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095533"},{"issue":"9","key":"ref11","first-page":"1805","article-title":"A geometric distortion resilient image watermark algorithm based on DWT-DFT.","volume":"6","author":"Yuping","year":"2011","unstructured":"[15]Hu Yuping, Wang Zhijian, Liu Hui, Guo Guangjun. A geometric distortion resilient image watermark algorithm based on DWT-DFT. Journal of Software, 2011, 6(9): 1805-1812.","journal-title":"J Softw","ISSN":"https:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref12","first-page":"207","article-title":"Modulation and information hiding in images","volume-title":"Proc of the First Int Workshop in Information Hiding Lecture Notes in Computer Science","author":"Smith","year":"1996","unstructured":"[16]J. Smith, B. Comiskey, Modulation and information hiding in images, in: Ross Anderson (Ed.), Proc. of the First Int. Workshop in Information Hiding, Lecture Notes in Computer Science, Cambridge, UK, Springer, New York, May\/June 1996, pp. 207-226."},{"issue":"1","key":"ref13","first-page":"169","article-title":"New Public-Key Cryptosystem Based on Two-Dimension DLP.","volume":"7","author":"Xiaoqiang","year":"2012","unstructured":"[21]Zhang Xiaoqiang, Zhu Guiliang, Wang Weiping, Wang Mengmeng. New Public-Key Cryptosystem Based on Two-Dimension DLP. Journal of Computers, 2012, 7(1): 169-178.","journal-title":"Journal of Computers"},{"key":"ref14","first-page":"399","volume-title":"W Wolf et al Video browsing using clustering and scene transitions on compressed sequence","author":"Yeung","year":"1995","unstructured":"[22]M Yeung, B L Yeo, W Wolf et al. Video browsing using clustering and scene transitions on compressed sequence. IS&T\/SPIC Multimedia Computing and Networking, 1995: 399~413."},{"issue":"11","key":"ref15","first-page":"2247","article-title":"A robust public-key watermarking algorithm based on contourlet ransform and its application.","volume":"6","author":"Yanjun","year":"2011","unstructured":"[23]Hu Yanjun, Wang Guanjun, Cao Xinde, Yang Lei. A robust public-key watermarking algorithm based on contourlet ransform and its application. Journal of Software, 2011, 6(11): 2247-2254.","journal-title":"J Softw","ISSN":"https:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref15","unstructured":"[4]Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, and Yen-Ping Chu, Reversible Watermarking: Current Status and Key Issues, International Journal of Network Security, Vol.2, No.3, PP.161\u2013171"},{"key":"ref15","unstructured":"[6]M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, \"Localized lossless authentication water-mark (LAW),\" in International Society for Optical Engineering, vol. 5020, pp. 689\u2013698, California, USA, Jan. 2003."},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"[9]J. Tian, \"High capacity reversible data embedding and content authentication,\" in IEEE Proceedings of International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. III\u2013517\u201320, Hong Kong, Apr. 2003.","DOI":"10.1109\/ICASSP.2003.1199525"},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"[14]J.J.K. O Ruanaidh, W.J. Dowling, F.M. Boland, Watermarking digital images for copyright protection, IEE Proc. on Vision, Image and Signal Processing, August 1996, 143 (4) 250\u00d0256. Invited paper, based on the paper of the same title at the IEE Conf. on Image Processing and Its Applications, Edinburgh, July 1995.","DOI":"10.1049\/ip-vis:19960711"},{"key":"ref15","unstructured":"[17]A.Z. Tirkel, G.A. Rankin, R.G. van Schyndel, W.J. Ho, N.R.A. Mee, C.F. Osborne, Electronic watermark, Dicta-93, Macquarie University, Sydney, December 1993, pp.666-672."},{"key":"ref15","unstructured":"[18]A.Z. Tirkel, R.G. van Schyndel, C.F. Osborne, A twodimensional digital watermark, ACCV\u00d595, University of Queensland, Brisbane, =December 1995, pp. 378-383."},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"[19]R.G. van Schyndel, A.Z. Tirkel, C.F. Osborne, A digital watermark, IEEE Int. Conf. on Image Processing ICIP-95, Austin, Texas, 1994, pp. 86-90.","DOI":"10.1109\/ICIP.1994.413536"},{"key":"ref15","unstructured":"[20]R.G. van Schyndel, A.Z. Tirkel, C.F. Osborne, Towards a robust digital watermark, Dicta-95, Nanyang Technological University, Singapore, December 1995, pp.504-508."}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T18:49:20Z","timestamp":1745952560000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/8886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,1]]},"references-count":23,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2013,2,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.8.2.533-538","relation":{},"ISSN":["1796-203X"],"issn-type":[{"type":"print","value":"1796-203X"}],"subject":[],"published":{"date-parts":[[2013,2,1]]}}}