{"id":"https://openalex.org/W2145520043","doi":"https://doi.org/10.1109/cit.2008.4594713","title":"Developing an effective watermarking algorithm for video retrieval","display_name":"Developing an effective watermarking algorithm for video retrieval","publication_year":2008,"publication_date":"2008-07-01","ids":{"openalex":"https://openalex.org/W2145520043","doi":"https://doi.org/10.1109/cit.2008.4594713","mag":"2145520043"},"language":"en","primary_location":{"id":"doi:10.1109/cit.2008.4594713","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cit.2008.4594713","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 8th IEEE International Conference on Computer and Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111828678","display_name":"Mohd Afizi Mohd Shukran","orcid":null},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]},{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]}],"countries":["AU","PK"],"is_corresponding":true,"raw_author_name":"Mohd Afizi Mohd Shukran","raw_affiliation_strings":["School of Information Technologies, University of Sydney, NSW, Australia","Sch. of Inf. Technol., Univ. of Sydney, Sydney, NSW"],"affiliations":[{"raw_affiliation_string":"School of Information Technologies, University of Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]},{"raw_affiliation_string":"Sch. of Inf. Technol., Univ. of Sydney, Sydney, NSW","institution_ids":["https://openalex.org/I1323252656"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5111828678"],"corresponding_institution_ids":["https://openalex.org/I129604602","https://openalex.org/I1323252656"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15253389,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3522","issue":null,"first_page":"426","last_page":"431"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11439","display_name":"Video Analysis and Summarization","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8910501003265381},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.823878288269043},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8125717639923096},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.6037361025810242},{"id":"https://openalex.org/keywords/video-quality","display_name":"Video quality","score":0.568025529384613},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5662466883659363},{"id":"https://openalex.org/keywords/video-compression-picture-types","display_name":"Video compression picture types","score":0.5612833499908447},{"id":"https://openalex.org/keywords/uncompressed-video","display_name":"Uncompressed video","score":0.5541577935218811},{"id":"https://openalex.org/keywords/video-tracking","display_name":"Video tracking","score":0.5436266660690308},{"id":"https://openalex.org/keywords/video-processing","display_name":"Video processing","score":0.5387400984764099},{"id":"https://openalex.org/keywords/smacker-video","display_name":"Smacker video","score":0.5070629119873047},{"id":"https://openalex.org/keywords/digital-video","display_name":"Digital video","score":0.5044726133346558},{"id":"https://openalex.org/keywords/multiview-video-coding","display_name":"Multiview Video Coding","score":0.4959433972835541},{"id":"https://openalex.org/keywords/block-matching-algorithm","display_name":"Block-matching algorithm","score":0.4865940809249878},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.47415250539779663},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46591782569885254},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.4259111285209656},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.33530688285827637},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.19981864094734192},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08510249853134155},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.07008424401283264}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8910501003265381},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.823878288269043},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8125717639923096},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.6037361025810242},{"id":"https://openalex.org/C103910844","wikidata":"https://www.wikidata.org/wiki/Q2631256","display_name":"Video quality","level":3,"score":0.568025529384613},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5662466883659363},{"id":"https://openalex.org/C106030495","wikidata":"https://www.wikidata.org/wiki/Q1797012","display_name":"Video compression picture types","level":4,"score":0.5612833499908447},{"id":"https://openalex.org/C162478608","wikidata":"https://www.wikidata.org/wiki/Q4011369","display_name":"Uncompressed video","level":4,"score":0.5541577935218811},{"id":"https://openalex.org/C202474056","wikidata":"https://www.wikidata.org/wiki/Q1931635","display_name":"Video tracking","level":3,"score":0.5436266660690308},{"id":"https://openalex.org/C65483669","wikidata":"https://www.wikidata.org/wiki/Q3536669","display_name":"Video processing","level":2,"score":0.5387400984764099},{"id":"https://openalex.org/C108803254","wikidata":"https://www.wikidata.org/wiki/Q857512","display_name":"Smacker video","level":4,"score":0.5070629119873047},{"id":"https://openalex.org/C2988454689","wikidata":"https://www.wikidata.org/wiki/Q173131","display_name":"Digital video","level":3,"score":0.5044726133346558},{"id":"https://openalex.org/C23431618","wikidata":"https://www.wikidata.org/wiki/Q1404672","display_name":"Multiview Video Coding","level":4,"score":0.4959433972835541},{"id":"https://openalex.org/C167510206","wikidata":"https://www.wikidata.org/wiki/Q2835824","display_name":"Block-matching algorithm","level":4,"score":0.4865940809249878},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.47415250539779663},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46591782569885254},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.4259111285209656},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.33530688285827637},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.19981864094734192},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08510249853134155},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.07008424401283264},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cit.2008.4594713","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cit.2008.4594713","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 8th IEEE International Conference on Computer and Information Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Clean water and sanitation","score":0.8600000143051147,"id":"https://metadata.un.org/sdg/6"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1517788997","https://openalex.org/W1520225145","https://openalex.org/W1550556648","https://openalex.org/W1904456205","https://openalex.org/W1978977266","https://openalex.org/W2005137112","https://openalex.org/W2024149414","https://openalex.org/W2034151064","https://openalex.org/W2046170126","https://openalex.org/W2073756930","https://openalex.org/W2098498971","https://openalex.org/W2110962145","https://openalex.org/W2113724275","https://openalex.org/W2140199336","https://openalex.org/W2156212930","https://openalex.org/W2159430622","https://openalex.org/W4242143856","https://openalex.org/W4244476312","https://openalex.org/W6631015902","https://openalex.org/W6661991153"],"related_works":["https://openalex.org/W3151658841","https://openalex.org/W2515642036","https://openalex.org/W2799447303","https://openalex.org/W2940411020","https://openalex.org/W1565555872","https://openalex.org/W2129919345","https://openalex.org/W2168087197","https://openalex.org/W2169150177","https://openalex.org/W2369074649","https://openalex.org/W2096736219"],"abstract_inverted_index":{"With":[0],"the":[1,20,29,53,62,66,107,118,164,171],"proliferation":[2],"of":[3,8,22,42,65,125,166],"digital":[4,23,49],"multimedia":[5],"content,":[6],"issues":[7],"copyright":[9,43,63,165],"protection":[10,44],"have":[11,154],"become":[12],"more":[13],"important":[14],"in":[15,28,31,151],"video":[16,24,37,54,67,76,85,93,100,120,169,172],"retrieval":[17,173],"system":[18],"because":[19],"copying":[21],"does":[25],"not":[26],"result":[27],"decrease":[30],"quality":[32],"that":[33,80,102,127],"occurs":[34],"when":[35],"analog":[36],"is":[38,45,106],"copied.":[39],"One":[40],"method":[41],"to":[46,157,162],"embed":[47],"a":[48,74,91,96,113],"code,":[50],"ldquowatermarkrdquo,":[51],"into":[52,84],"sequence.":[55,68],"The":[56,99,140,148],"watermark":[57,77],"can":[58,128],"then":[59],"unambiguously":[60],"identify":[61],"holder":[64],"In":[69],"this":[70,152],"paper":[71,153],"we":[72],"propose":[73],"new":[75],"embedding":[78],"algorithm":[79,142],"would":[81],"insert":[82],"watermarks":[83],"sequences":[86],"and":[87,136,160],"also":[88],"detect":[89],"if":[90],"given":[92,97],"sequence":[94],"contains":[95],"watermark.":[98],"standard":[101,109],"has":[103,143],"been":[104,155],"chosen":[105],"H.264":[108,167],"as":[110],"it":[111],"offers":[112],"significant":[114],"efficiency":[115],"improvement":[116],"over":[117],"previous":[119],"compression":[121],"standards.":[122],"A":[123],"couple":[124],"tests":[126],"be":[129,158],"considered":[130],"representative":[131],"for":[132],"most":[133],"image":[134],"manipulations":[135],"attacks":[137],"were":[138],"performed.":[139],"proposed":[141],"passed":[144],"all":[145],"attack":[146],"tests.":[147],"watermarking":[149],"mechanisms":[150],"proved":[156],"robust":[159],"efficient":[161],"protect":[163],"coded":[168],"within":[170],"system.":[174]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
