{"id":"https://openalex.org/W2800724391","doi":"https://doi.org/10.1109/isce.2017.8355535","title":"Analysis framework for H.264/AVC authentication","display_name":"Analysis framework for H.264/AVC authentication","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2800724391","doi":"https://doi.org/10.1109/isce.2017.8355535","mag":"2800724391"},"language":"en","primary_location":{"id":"doi:10.1109/isce.2017.8355535","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isce.2017.8355535","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Consumer Electronics (ISCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056142927","display_name":"Grace C.-W. Ting","orcid":"https://orcid.org/0000-0002-5147-7947"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Grace C.-W. Ting","raw_affiliation_strings":["Lee Kong Chian Faculty of Engineering & Science, Universiti Tunku Abdul Rahman (UTAR), Malaysia"],"affiliations":[{"raw_affiliation_string":"Lee Kong Chian Faculty of Engineering & Science, Universiti Tunku Abdul Rahman (UTAR), Malaysia","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059941043","display_name":"Bok\u2010Min Goi","orcid":"https://orcid.org/0000-0002-9854-7121"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Bok-Min Goi","raw_affiliation_strings":["Lee Kong Chian Faculty of Engineering & Science, Universiti Tunku Abdul Rahman (UTAR), Malaysia"],"affiliations":[{"raw_affiliation_string":"Lee Kong Chian Faculty of Engineering & Science, Universiti Tunku Abdul Rahman (UTAR), Malaysia","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076145586","display_name":"Sze Wei Lee","orcid":"https://orcid.org/0000-0001-7689-8521"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Sze-Wei Lee","raw_affiliation_strings":["Lee Kong Chian Faculty of Engineering & Science, Universiti Tunku Abdul Rahman (UTAR), Malaysia"],"affiliations":[{"raw_affiliation_string":"Lee Kong Chian Faculty of Engineering & Science, Universiti Tunku Abdul Rahman (UTAR), Malaysia","institution_ids":["https://openalex.org/I931681460"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056142927"],"corresponding_institution_ids":["https://openalex.org/I931681460"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23484335,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8350507616996765},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7244004607200623},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5564546585083008},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.534069836139679},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5250974893569946},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5000638961791992},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.43460002541542053},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.19424763321876526},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12888452410697937}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8350507616996765},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7244004607200623},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5564546585083008},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.534069836139679},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5250974893569946},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5000638961791992},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.43460002541542053},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.19424763321876526},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12888452410697937},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isce.2017.8355535","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isce.2017.8355535","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Consumer Electronics (ISCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1484983255","https://openalex.org/W2038385037","https://openalex.org/W2042599601","https://openalex.org/W6628913456"],"related_works":["https://openalex.org/W1512373895","https://openalex.org/W2359773540","https://openalex.org/W4327926797","https://openalex.org/W2141372244","https://openalex.org/W1669086842","https://openalex.org/W4294068482","https://openalex.org/W2795318091","https://openalex.org/W2062005526","https://openalex.org/W2546423525","https://openalex.org/W2517088709"],"abstract_inverted_index":{"We":[0,130],"focus":[1],"on":[2,32],"the":[3,33,80,105,114,125,133,146],"security":[4,81,106],"of":[5,42,82,107],"authenticating":[6],"H.264/AVC,":[7],"which":[8,93],"is":[9,36],"a":[10],"standard":[11],"for":[12],"high":[13,37],"definition":[14],"(HD)":[15],"video":[16,65,83,116,127],"in":[17],"many":[18],"consumer":[19],"applications":[20],"including":[21],"DVD":[22],"movies":[23],"as":[24,26],"well":[25],"HD":[27],"videos":[28,43],"shared":[29],"by":[30,145],"users":[31],"internet.":[34],"There":[35],"risk":[38],"that":[39,52,121],"these":[40],"kinds":[41],"could":[44],"be":[45,69,118,143],"modified":[46,119],"without":[47],"authorization,":[48],"to":[49,59,71,78,95],"reflect":[50],"situations":[51],"may":[53],"not":[54],"have":[55],"actually":[56],"happened,":[57],"leading":[58],"viral":[60],"videos.":[61],"To":[62],"prevent":[63],"this,":[64],"content":[66],"authentication":[67,98,128],"can":[68,117,140],"used":[70],"detect":[72],"any":[73],"such":[74,120],"changes.":[75],"In":[76],"order":[77],"analyze":[79,104],"authentication,":[84],"we":[85,103],"present":[86],"an":[87],"attack":[88,138],"strategy":[89],"based":[90,97],"analysis":[91],"framework":[92],"applies":[94],"watermarking":[96],"schemes.":[99],"With":[100],"this":[101],"strategy,":[102],"two":[108],"schemes":[109],"against":[110],"modification":[111],"attacks,":[112],"i.e.":[113],"watermarked":[115],"it":[122],"still":[123],"passes":[124],"recipient's":[126],"check.":[129],"then":[131],"discuss":[132],"reasons":[134],"behind":[135],"why":[136],"certain":[137],"steps":[139],"or":[141],"cannot":[142],"performed":[144],"attacker.":[147]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
