{"id":"https://openalex.org/W2119244616","doi":"https://doi.org/10.1109/icme.2002.1035845","title":"Compressed-domain video watermarking of MPEG streams","display_name":"Compressed-domain video watermarking of MPEG streams","publication_year":2003,"publication_date":"2003-06-25","ids":{"openalex":"https://openalex.org/W2119244616","doi":"https://doi.org/10.1109/icme.2002.1035845","mag":"2119244616"},"language":"en","primary_location":{"id":"doi:10.1109/icme.2002.1035845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2002.1035845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on Multimedia and Expo","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109880055","display_name":"D. Simitopoulos","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"D. Simitopoulos","raw_affiliation_strings":["Informatics and Telematics Institute, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Informatics and Telematics Institute, Thessaloniki, Greece","institution_ids":["https://openalex.org/I4210093649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054437456","display_name":"Sotirios A. Tsaftaris","orcid":"https://orcid.org/0000-0002-8795-9294"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S.A. Tsaftaris","raw_affiliation_strings":["Electrical and Computer Engineering Dept, NorthWestern University, Evanston, IL, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Dept, NorthWestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049494866","display_name":"Nikolaos V. Boulgouris","orcid":"https://orcid.org/0000-0002-5382-6856"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"N.V. Boulgouris","raw_affiliation_strings":["Informatics and Telematics Institute, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Informatics and Telematics Institute, Thessaloniki, Greece","institution_ids":["https://openalex.org/I4210093649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044696253","display_name":"M.G. Strintzis","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"M.G. Strintzis","raw_affiliation_strings":["Informatics and Telematics Institute, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Informatics and Telematics Institute, Thessaloniki, Greece","institution_ids":["https://openalex.org/I4210093649"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5109880055"],"corresponding_institution_ids":["https://openalex.org/I4210093649"],"apc_list":null,"apc_paid":null,"fwci":3.2322,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.92518301,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"569","last_page":"572"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.950724184513092},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8236639499664307},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8052593469619751},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.656002402305603},{"id":"https://openalex.org/keywords/mpeg-2","display_name":"MPEG-2","score":0.4962030053138733},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.483318567276001},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4657858908176422},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.45788848400115967},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4575336277484894},{"id":"https://openalex.org/keywords/mpeg-4","display_name":"MPEG-4","score":0.4509810209274292},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.41550856828689575},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36971187591552734},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3536206781864166},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3425208628177643},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3224186897277832},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.3204920291900635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21045589447021484},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.14196577668190002},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.07558342814445496}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.950724184513092},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8236639499664307},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8052593469619751},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.656002402305603},{"id":"https://openalex.org/C18446390","wikidata":"https://www.wikidata.org/wiki/Q273902","display_name":"MPEG-2","level":2,"score":0.4962030053138733},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.483318567276001},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4657858908176422},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.45788848400115967},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4575336277484894},{"id":"https://openalex.org/C97501218","wikidata":"https://www.wikidata.org/wiki/Q219763","display_name":"MPEG-4","level":3,"score":0.4509810209274292},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.41550856828689575},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36971187591552734},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3536206781864166},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3425208628177643},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3224186897277832},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.3204920291900635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21045589447021484},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.14196577668190002},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.07558342814445496},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icme.2002.1035845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2002.1035845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on Multimedia and Expo","raw_type":"proceedings-article"},{"id":"pmh:oai:kclpure.kcl.ac.uk:publications/961ef333-5db1-4f60-90e6-b3e3996d6b94","is_oa":false,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/961ef333-5db1-4f60-90e6-b3e3996d6b94","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Simitopoulos, D, Tsaftaris, S, Boulgouris, N V & Strintzis, M G 2002, Compressed-domain Video Watermarking of MPEG Streams. in Unknown.","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/6","score":0.5400000214576721,"display_name":"Clean water and sanitation"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1556611829","https://openalex.org/W2048872819","https://openalex.org/W2084112876","https://openalex.org/W2094235786","https://openalex.org/W2106809879","https://openalex.org/W2139519246","https://openalex.org/W2141852054","https://openalex.org/W2143330717","https://openalex.org/W2158438958"],"related_works":["https://openalex.org/W1967073369","https://openalex.org/W2281180546","https://openalex.org/W2094583657","https://openalex.org/W1594300462","https://openalex.org/W1537595800","https://openalex.org/W2158009109","https://openalex.org/W1606460848","https://openalex.org/W1706111048","https://openalex.org/W2129927873","https://openalex.org/W1915787826"],"abstract_inverted_index":{"A":[0],"new":[1],"technique":[2],"for":[3,84],"watermarking":[4,13,75],"of":[5,20,53,71],"MPEG":[6,21],"compressed":[7,45],"video":[8,37,56],"streams":[9],"is":[10,41,48,65,77,82],"proposed.":[11],"The":[12,39,73],"scheme":[14,64],"operates":[15],"directly":[16],"in":[17,32,43],"the":[18,29,36,44,51,54,62],"domain":[19,46],"program":[22],"streams.":[23],"Perceptual":[24],"models":[25],"are":[26],"used":[27],"during":[28],"embedding":[30],"process":[31],"order":[33],"to":[34,67],"preserve":[35],"quality.":[38],"watermark":[40],"embedded":[42],"and":[47,79,81,87],"detected":[49],"without":[50],"use":[52],"original":[55],"sequence.":[57],"Experimental":[58],"evaluation":[59],"demonstrates":[60],"that":[61],"proposed":[63],"able":[66],"withstand":[68],"a":[69],"variety":[70],"attacks.":[72],"resulting":[74],"system":[76],"fast":[78],"reliable,":[80],"suitable":[83],"copyright":[85],"protection":[86],"real-time":[88],"content":[89],"authentication":[90],"applications.":[91]},"counts_by_year":[{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
