{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T02:08:43Z","timestamp":1774922923327,"version":"3.50.1"},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072251"],"award-info":[{"award-number":["62072251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2030"],"award-info":[{"award-number":["U22A2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1016\/j.jisa.2024.103868","type":"journal-article","created":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T15:19:35Z","timestamp":1724512775000},"page":"103868","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["A DNN robust video watermarking method in dual-tree complex wavelet transform domain"],"prefix":"10.1016","volume":"85","author":[{"given":"Xuanming","family":"Chang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-2506-0427","authenticated-orcid":false,"given":"Beijing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Weiping","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.jisa.2024.103868_bib0001","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1007\/s10462-020-09877-8","article-title":"February) A new chaotic complex map for robust video watermarking","volume":"54","author":"Ayubi","year":"2021","journal-title":"Artif Intell Rev"},{"issue":"9","key":"10.1016\/j.jisa.2024.103868_bib0002","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","article-title":"An overview of digital video watermarking","volume":"28","author":"Asikuzzaman","year":"2018","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"9","key":"10.1016\/j.jisa.2024.103868_bib0003","doi-asserted-by":"crossref","first-page":"1502","DOI":"10.1109\/TIFS.2014.2338274","article-title":"Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain","volume":"9","author":"Asikuzzaman","year":"2014","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"10.1016\/j.jisa.2024.103868_bib0004","series-title":"Proc 31st Pic Coding Symp (PCS 2015)","first-page":"1","article-title":"A blind and robust video watermarking scheme in the DT CWT and SVD domain","author":"Asikuzzaman","year":"2015"},{"issue":"9","key":"10.1016\/j.jisa.2024.103868_bib0005","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1109\/TMM.2016.2589208","article-title":"Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding","volume":"18","author":"Asikuzzaman","year":"2016","journal-title":"IEEE Trans Multimedia"},{"key":"10.1016\/j.jisa.2024.103868_bib0006","article-title":"Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF","volume":"59","author":"Agarwal","year":"2021","journal-title":"J Inf Secur Appl"},{"issue":"3.4","key":"10.1016\/j.jisa.2024.103868_bib0007","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"35","author":"Bender","year":"1996","journal-title":"IBM Syst J"},{"issue":"5","key":"10.1016\/j.jisa.2024.103868_bib0008","doi-asserted-by":"crossref","first-page":"1853","DOI":"10.1109\/TIM.2005.855084","article-title":"An adaptive compressed MPEG-2 video watermarking scheme","volume":"54","author":"Biswas","year":"2005","journal-title":"IEEE Trans Instrum Meas"},{"key":"10.1016\/j.jisa.2024.103868_bib0009","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TMM.2004.840594","article-title":"Watermarking of MPEG-4 video objects","volume":"7","author":"Barni","year":"2005","journal-title":"IEEE Trans Multimedia"},{"issue":"8","key":"10.1016\/j.jisa.2024.103868_bib0010","first-page":"5856","article-title":"A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition","volume":"34","author":"Begum","year":"2022","journal-title":"J King Saud Univ-Com"},{"key":"10.1016\/j.jisa.2024.103868_bib0011","article-title":"Secure sparse watermarking on DWT-SVD for digital images","volume":"68","author":"Bose","year":"2022","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"10.1016\/j.jisa.2024.103868_bib0012","first-page":"59","article-title":"Distinguishing between natural and GAN-generated face images by combining global and local features","volume":"31","author":"Chen","year":"2022","journal-title":"Chinese J Electron"},{"issue":"4","key":"10.1016\/j.jisa.2024.103868_bib0013","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","article-title":"Quantization index modulation: A class of provably good methods for digital watermarking and information embedding","volume":"47","author":"Chen","year":"2001","journal-title":"IEEE Trans Inform theory"},{"key":"10.1016\/j.jisa.2024.103868_bib0014","first-page":"40","volume":"97","author":"Cedillo-Hernandez","year":"2014"},{"key":"10.1016\/j.jisa.2024.103868_bib0015","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.jvcir.2018.02.007","article-title":"A spatiotemporal saliency-modulated JND profile applied to video watermarking","volume":"52","author":"Cedillo-Hernandez","year":"2018","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"10.1016\/j.jisa.2024.103868_bib0016","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1109\/TIFS.2008.927421","article-title":"A video watermarking scheme based on the dual-tree complex wavelet transform","volume":"3","author":"Coria","year":"2008","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"10.1016\/j.jisa.2024.103868_bib0017","series-title":"Proc IEEE Conf Comput Vis Pattern Recog","first-page":"6299","article-title":"Quo vadis, action recognition? a new model and the kinetics dataset","author":"Carreira","year":"2017"},{"key":"10.1016\/j.jisa.2024.103868_bib0018","series-title":"Proc 30th ACM Int Conf Multimedia","first-page":"2267","article-title":"PIMoG: An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network","author":"Fang","year":"2022"},{"issue":"1","key":"10.1016\/j.jisa.2024.103868_bib0019","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3009910","article-title":"Drift-compensated robust watermarking algorithm for H. 265\/HEVC video stream","volume":"13","author":"Gaj","year":"2017","journal-title":"ACM Trans Multim Comput"},{"issue":"4","key":"10.1016\/j.jisa.2024.103868_bib0020","doi-asserted-by":"crossref","first-page":"1955","DOI":"10.1109\/TCSVT.2021.3092004","article-title":"Exploring stable coefficients on joint sub-bands for robust video watermarking in DT CWT domain","volume":"32","author":"Huan","year":"2021","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"10.1016\/j.jisa.2024.103868_bib0021","series-title":"Proc 29th ACM Int Conf Multimedia","first-page":"41","article-title":"Mbrs: Enhancing robustness of dnn-based watermarking by mini-batch of real and simulated JPEG compression","author":"Jia","year":"2021"},{"issue":"3","key":"10.1016\/j.jisa.2024.103868_bib0022","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1109\/TCSVT.2008.918446","article-title":"Oblivious spatio-temporal watermarking of digital video by exploiting the human visual system","volume":"18","author":"Koz","year":"2008","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"10.1016\/j.jisa.2024.103868_bib0023","series-title":"Proc 8th IEEE DSP Workshop","first-page":"120","article-title":"The dual-tree complex wavelet transform: a new technique for shift invariance and directional filters","author":"Kingsbury","year":"1998"},{"key":"10.1016\/j.jisa.2024.103868_bib0024","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.apm.2020.04.015","article-title":"A discrete wavelet transform and singular value decomposition-based digital video watermark method","volume":"85","author":"Liu","year":"2020","journal-title":"Appl Math Model"},{"key":"10.1016\/j.jisa.2024.103868_bib0025","article-title":"DVMark: a deep multiscale framework for video watermarking","author":"Luo","year":"2023","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"10.1016\/j.jisa.2024.103868_bib0026","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/TIFS.2018.2879301","article-title":"A scalable architecture for uncompressed-domain watermarked videos","volume":"14","author":"Mareen","year":"2018","journal-title":"IEEE Trans Inf Foren Sec"},{"issue":"4","key":"10.1016\/j.jisa.2024.103868_bib0027","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TIFS.2010.2076280","article-title":"A low complexity video watermarking in H. 264 compressed domain","volume":"5","author":"Mansouri","year":"2010","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"10.1016\/j.jisa.2024.103868_bib0028","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.image.2018.06.015","article-title":"A multiplicative video watermarking robust to H. 264\/AVC compression standard","volume":"68","author":"Madine","year":"2018","journal-title":"Signal Process Image Commun"},{"key":"10.1016\/j.jisa.2024.103868_bib0029","series-title":"Proc IEEE Conf Comput Vis Pattern Recog","first-page":"2929","article-title":"Actions in context","author":"Marszalek","year":"2009"},{"issue":"3","key":"10.1016\/j.jisa.2024.103868_bib0030","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/TIFS.2008.923825","article-title":"Digital video watermarking in P-frames with controlled video bit-rate increase","volume":"3","author":"Noorkami","year":"2008","journal-title":"IEEE Trans Inf Foren Sec"},{"issue":"2","key":"10.1016\/j.jisa.2024.103868_bib0031","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TCSVT.2012.2203738","article-title":"Hardware implementation of a digital watermarking system for video authentication","volume":"23","author":"Roy","year":"2013","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"8-9","key":"10.1016\/j.jisa.2024.103868_bib0032","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.image.2011.07.004","article-title":"A practical design of digital video watermarking in H. 264\/AVC for content authentication","volume":"26","author":"Su","year":"2011","journal-title":"Signal Process Image Commun"},{"key":"10.1016\/j.jisa.2024.103868_bib0033","series-title":"Proc IEEE Int Conf Image Process","first-page":"1265","article-title":"HEVC video authentication using data embedding technique","author":"Tew","year":"2015"},{"issue":"4","key":"10.1016\/j.jisa.2024.103868_bib0034","first-page":"2021","article-title":"Convolutional neural network-based image watermarking using discrete wavelet transform","volume":"15","author":"Tavakoli","year":"2023","journal-title":"Int J Inf Technol"},{"key":"10.1016\/j.jisa.2024.103868_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2021.116593","article-title":"Imperceptible\u2013visible watermarking for copyright protection of digital videos based on temporal codes","volume":"102","author":"Velazquez-Garcia","year":"2022","journal-title":"Signal Process Image Commun"},{"issue":"6","key":"10.1016\/j.jisa.2024.103868_bib0036","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1109\/TIP.2006.873476","article-title":"Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain","volume":"15","author":"Wang","year":"2006","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.jisa.2024.103868_bib0037","series-title":"2022 International Conference on Culture-Oriented Science and Technology (CoST)","first-page":"36","article-title":"A DTCWT-SVD based video watermarking resistant to frame rate conversion","author":"Wang","year":"2022"},{"key":"10.1016\/j.jisa.2024.103868_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.170371","article-title":"Cross-scale feature fusion-based JND estimation for robust image watermarking in quaternion DWT domain","volume":"272","author":"Wang","year":"2023","journal-title":"Optik"},{"key":"10.1016\/j.jisa.2024.103868_bib0039","unstructured":"Zhang, K. A., Xu, L., Cuesta-Infante, A., & Veeramachaneni, K. (2019, September). Robust invisible video watermarking with attention. arXiv preprint arXiv:1909.01285."},{"key":"10.1016\/j.jisa.2024.103868_bib0040","series-title":"2022 IEEE 24th Int Workshop on Multim Signal Process (MMSP)","first-page":"1","article-title":"Robust watermarking for video forgery detection with improved imperceptibility and robustness","author":"Zhou","year":"2022"},{"issue":"2","key":"10.1016\/j.jisa.2024.103868_bib0041","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1109\/TCSVT.2022.3207310","article-title":"A local perturbation generation method for GAN-generated face anti-forensics","volume":"33","author":"Zhang","year":"2023","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"10.1016\/j.jisa.2024.103868_bib0042","series-title":"Proc 31st ACM Int Conf Multimedia","first-page":"8095","article-title":"A novel deep video watermarking framework with enhanced robustness to H. 264\/AVC compression","author":"Zhang","year":"2023"},{"key":"10.1016\/j.jisa.2024.103868_bib0043","series-title":"Proc of the IEEE\/CVF Conf Comput Vis Pattern Recog","first-page":"14821","article-title":"Multi-stage progressive image restoration","author":"Zamir","year":"2021"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S2214212624001704?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S2214212624001704?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:52:35Z","timestamp":1725846755000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212624001704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":43,"alternative-id":["S2214212624001704"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jisa.2024.103868","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A DNN robust video watermarking method in dual-tree complex wavelet transform domain","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jisa.2024.103868","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103868"}}