{"id":"https://openalex.org/W2997580645","doi":"https://doi.org/10.1587/transinf.2019mui0001","title":"Lightweight Authentication for MP4 Format Container Using Subtitle Track","display_name":"Lightweight Authentication for MP4 Format Container Using Subtitle Track","publication_year":2019,"publication_date":"2019-12-31","ids":{"openalex":"https://openalex.org/W2997580645","doi":"https://doi.org/10.1587/transinf.2019mui0001","mag":"2997580645"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2019mui0001","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019mui0001","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/1/E103.D_2019MUI0001/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/1/E103.D_2019MUI0001/_pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069916756","display_name":"KokSheik Wong","orcid":"https://orcid.org/0000-0002-4893-2291"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"KokSheik WONG","raw_affiliation_strings":["School of Information Technology, Monash University Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023856838","display_name":"ChuanSheng CHAN","orcid":null},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"ChuanSheng CHAN","raw_affiliation_strings":["School of Information Technology, Monash University Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055600379","display_name":"AprilPyone MAUNGMAUNG","orcid":null},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"AprilPyone MAUNGMAUNG","raw_affiliation_strings":["Graduate School of System Design, Tokyo Metropolitan University"],"affiliations":[{"raw_affiliation_string":"Graduate School of System Design, Tokyo Metropolitan University","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069916756"],"corresponding_institution_ids":["https://openalex.org/I11662577"],"apc_list":null,"apc_paid":null,"fwci":0.3067,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.62461965,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"E103.D","issue":"1","first_page":"2","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8983599543571472},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7124752998352051},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.6019585132598877},{"id":"https://openalex.org/keywords/subtitle","display_name":"Subtitle","score":0.5742625594139099},{"id":"https://openalex.org/keywords/timestamp","display_name":"Timestamp","score":0.44931501150131226},{"id":"https://openalex.org/keywords/data-stream","display_name":"Data stream","score":0.41146349906921387},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3877469301223755},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14920154213905334},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11519643664360046}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8983599543571472},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7124752998352051},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.6019585132598877},{"id":"https://openalex.org/C2780364048","wikidata":"https://www.wikidata.org/wiki/Q204028","display_name":"Subtitle","level":2,"score":0.5742625594139099},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.44931501150131226},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.41146349906921387},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3877469301223755},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14920154213905334},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11519643664360046},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1587/transinf.2019mui0001","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019mui0001","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/1/E103.D_2019MUI0001/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},{"id":"pmh:oai:monash.edu:publications/c4c28581-e8f8-4396-9736-12f221d26b2f","is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/c4c28581-e8f8-4396-9736-12f221d26b2f","pdf_url":null,"source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wong , K S , Chan , C S &amp; Maungmaung , A P 2020 , ' Lightweight authentication for MP4 format container using subtitle track ' , IEICE Transactions on Information and Systems , vol. E103D , no. 1 , pp. 2-10 . https://doi.org/10.1587/transinf.2019MUI0001","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2019mui0001","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019mui0001","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/1/E103.D_2019MUI0001/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2997580645.pdf","grobid_xml":"https://content.openalex.org/works/W2997580645.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W23362155","https://openalex.org/W1974098164","https://openalex.org/W2037530184","https://openalex.org/W2038356306","https://openalex.org/W2069994443","https://openalex.org/W2099278641","https://openalex.org/W2114854443","https://openalex.org/W2142899829","https://openalex.org/W2335596077","https://openalex.org/W2486763437","https://openalex.org/W2502483166","https://openalex.org/W2779084106","https://openalex.org/W2787793183","https://openalex.org/W2921296604","https://openalex.org/W2984236534"],"related_works":["https://openalex.org/W2060561905","https://openalex.org/W1417711376","https://openalex.org/W1950334511","https://openalex.org/W3119551990","https://openalex.org/W2351264416","https://openalex.org/W3004133161","https://openalex.org/W4309267392","https://openalex.org/W3003960098","https://openalex.org/W2149577166","https://openalex.org/W3174057973"],"abstract_inverted_index":{"With":[0],"massive":[1],"utilization":[2,176],"of":[3,8,21,79,214],"video":[4,84,117,185],"in":[5,28,46],"every":[6],"aspect":[7],"our":[9],"daily":[10],"lives,":[11],"managing":[12,29],"videos":[13,34],"is":[14,66,122],"crucial":[15],"and":[16,35,58,83,86,105,116,129,158,199],"demanding.":[17],"The":[18,119,166],"rich":[19],"literature":[20],"data":[22,73,92,101,148,160],"embedding":[23],"has":[24],"proven":[25],"its":[26],"viability":[27],"as":[30,32,89,138,186,188,218],"well":[31],"enriching":[33],"other":[36],"multimedia":[37],"contents,":[38],"but":[39],"conventional":[40,144],"methods":[41],"are":[42,74,136,206],"designed":[43],"to":[44,68,209],"operate":[45],"the":[47,53,56,72,77,80,90,98,108,112,132,139,151,163,211,215],"media/compression":[48],"layer.":[49],"In":[50],"this":[51],"work,":[52],"synchronization":[54],"between":[55],"audio-video":[57],"subtitle":[59],"tracks":[60],"within":[61,201],"an":[62,202,219],"MP4":[63,145,203],"format":[64],"container":[65,146],"manipulated":[67],"insert":[69],"data.":[70,141],"Specifically,":[71],"derived":[75],"from":[76,111],"statistics":[78],"audio":[81,114,183],"samples":[82,115],"frames,":[85],"it":[87],"serves":[88],"authentication":[91,100,140,168,180,220],"for":[93,174,182],"verification":[94],"purpose.":[95],"When":[96],"needed,":[97],"inserted":[99],"can":[102,170,191],"be":[103,172,192],"extracted":[104],"compared":[106],"against":[107],"information":[109],"computed":[110],"received":[113],"frames.":[118],"proposed":[120,164,167,216],"method":[121,169],"lightweight":[123],"because":[124],"simple":[125],"statistics,":[126],"i.e.,":[127],"\u20180\u2019":[128],"\u20181\u2019":[130],"at":[131],"bit":[133,152,197],"stream":[134,153,198],"level,":[135],"treated":[137],"Furthermore,":[142],"unlike":[143],"format-based":[147],"insertion":[149,161],"technique,":[150],"size":[154],"remains":[155],"unchanged":[156],"before":[157],"after":[159],"using":[162],"method.":[165,221],"also":[171],"deployed":[173],"joint":[175],"with":[177],"any":[178],"existing":[179],"technique":[181,217],"/":[184],"long":[187],"these":[189],"media":[190],"multiplexed":[193],"into":[194],"a":[195],"single":[196],"contained":[200],"container.":[204],"Experiments":[205],"carried":[207],"out":[208],"verify":[210],"basic":[212],"functionality":[213]},"counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
