<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232010000300003</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cruz-Ramos]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Reyes-Reyes]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Nakano-Miyatake]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Perez-Meana]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,National Polytechnic Institute Culhuacan Campus D Mechanical and Engineering School]]></institution>
<addr-line><![CDATA[Mexico ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2010</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2010</year>
</pub-date>
<volume>8</volume>
<numero>3</numero>
<fpage>323</fpage>
<lpage>337</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232010000300003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232010000300003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232010000300003&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[In this paper, we propose a robust digital video watermarking scheme with completely blind extraction process where the original video data, original watermark or any other information derivative of them are not required in order to retrieve the embedded watermark. The proposed algorithm embeds 2D binary visually recognizable patterns such as company trademarks and owner's logotype, etc., in the DWT domain of the video frames for copyright protection. Before the embedding process, only two numerical keys are required to transform the watermark data into a noise-like pattern using the chaotic mixing method which helps to increase the security. The main advantages of the proposed scheme are its completely blind detection scheme, robustness against common video attacks, combined attacks and its low complexity implementation. The combined attacks consist of MPEG-2 compression and common video attacks such as noise contamination, collusion attacks, frame dropping and swapping. Extensive simulation results also show that the watermark imperceptibility and robustness outperform other previously reported methods. The extracted watermark data from the watermarked video sequences is clear enough even after the watermarked video had suffered from several attacks.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En este artículo se propone un sistema de marca de agua robusto para la protección de derechos de autor en video digital donde el proceso de extracción de la marca de agua es completamente a ciegas, ya que no requiere ninguna información directa o derivada del video original ni de la marca de agua original. El algoritmo inserta patrones binarios bidimensionales reconocibles visualmente, los cuales pueden ser logotipos de compañías o cualquier otra imagen en el dominio de la DWT de algunos cuadros de video seleccionados aleatoriamente. Antes del proceso de inserción, son necesarias únicamente dos llaves para desordenar los datos de la marca de agua mediante el método de mezclas caóticas, con la finalidad de incrementar la seguridad. Las ventajas principales del sistema propuesto son la extracción de la marca de agua es completamente a ciegas, su bajo costo computacional y su desempeño en contra de ataques combinados al video es mejor que otros métodos propuestos por diferentes autores. Resultados obtenidos demuestran la imperceptibilidad de la marca de agua y que la marca de agua extraída es suficientemente distinguible aún después de que la secuencia de video ha sido sometida a diversos ataques combinados.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Video watermarking]]></kwd>
<kwd lng="en"><![CDATA[blind detection method]]></kwd>
<kwd lng="en"><![CDATA[copyright protection]]></kwd>
<kwd lng="en"><![CDATA[combination attacks]]></kwd>
<kwd lng="en"><![CDATA[visually recognizable patterns]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="center"><font face="verdana" size="4"><b>A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>C. Cruz&#150;Ramos, R. Reyes&#150;Reyes, M. Nakano&#150;Miyatake*, H. Perez&#150;Meana</b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i>D Mechanical and Engineering School, Culhuacan Campus, National Polytechnic Institute, Av. Santa Ana no. 1000, Col. San Francisco Culhuacan, 04430 Mexico City, Mexico. *E&#150;mail:</i> <a href="mailto:mnakano@ipn.mx">mnakano@ipn.mx</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>     <p align="justify"><font face="verdana" size="2">In this paper, we propose a robust digital video watermarking scheme with completely blind extraction process where the original video data, original watermark or any other information derivative of them are not required in order to retrieve the embedded watermark. The proposed algorithm embeds 2D binary visually recognizable patterns such as company trademarks and owner's logotype, etc., in the DWT domain of the video frames for copyright protection. Before the embedding process, only two numerical keys are required to transform the watermark data into a noise&#150;like pattern using the chaotic mixing method which helps to increase the security. The main advantages of the proposed scheme are its completely blind detection scheme, robustness against common video attacks, combined attacks and its low complexity implementation. The combined attacks consist of MPEG&#150;2 compression and common video attacks such as noise contamination, collusion attacks, frame dropping and swapping. Extensive simulation results also show that the watermark imperceptibility and robustness outperform other previously reported methods. The extracted watermark data from the watermarked video sequences is clear enough even after the watermarked video had suffered from several attacks.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Video watermarking, blind detection method, copyright protection, combination attacks, visually recognizable patterns.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>RESUMEN</b></font></p>     <p align="justify"><font face="verdana" size="2">En este art&iacute;culo se propone un sistema de marca de agua robusto para la protecci&oacute;n de derechos de autor en video digital donde el proceso de extracci&oacute;n de la marca de agua es completamente a ciegas, ya que no requiere ninguna informaci&oacute;n directa o derivada del video original ni de la marca de agua original. El algoritmo inserta patrones binarios bidimensionales reconocibles visualmente, los cuales pueden ser logotipos de compa&ntilde;&iacute;as o cualquier otra imagen en el dominio de la DWT de algunos cuadros de video seleccionados aleatoriamente. Antes del proceso de inserci&oacute;n, son necesarias &uacute;nicamente dos llaves para desordenar los datos de la marca de agua mediante el m&eacute;todo de mezclas ca&oacute;ticas, con la finalidad de incrementar la seguridad. Las ventajas principales del sistema propuesto son la extracci&oacute;n de la marca de agua es completamente a ciegas, su bajo costo computacional y su desempe&ntilde;o en contra de ataques combinados al video es mejor que otros m&eacute;todos propuestos por diferentes autores. Resultados obtenidos demuestran la imperceptibilidad de la marca de agua y que la marca de agua extra&iacute;da es suficientemente distinguible a&uacute;n despu&eacute;s de que la secuencia de video ha sido sometida a diversos ataques combinados.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v8n3/v8n3a3.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b><i>References</i></b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; Lin E., Eskicioglu A., Lagendijk R. and Delp E., Advances in Digital Video Content Protection, <i>Proceedings of the IEEE, </i>Vol. 93, No. 1, January 2005, pp. 171&#150;183.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824555&pid=S1665-6423201000030000300001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; Swanson M. D., Zhu B., and Tewfik A. H., Multiresolution Scene&#150;Based Video Watermarking Using Perceptual Models, <i>IEEE Journal on Selected Areas in Communications, </i>Vol. 16, No. 4, 1998, pp. 540&#150;550.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824557&pid=S1665-6423201000030000300002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Wolgang R. B. , Podilchuk C. I., Delp E. J., Perceptual Watermarking for Digital Image and Video, <i>Proceeding of the IEEE, </i>Vol. 87, No. 7, 1999, pp. 1108-1126.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824559&pid=S1665-6423201000030000300003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; Cedillo&#150;Hern&aacute;ndez A., Nakano&#150;Miyatake M., Rojas&#150;Cardenas L., P&eacute;rez&#150;Meana H., Tecnica de Marca de Agua para Video MPEG usando Sensibilidad Visual y Vectores de Movimiento, <i>Revista Internacional Informaci&oacute;n Tecnol&oacute;gica </i>(Spanish), Vol. 19, No.2. 2008, pp. 81&#150;92.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824561&pid=S1665-6423201000030000300004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; Podilchuk C. I., Zeng W., Image&#150;Adaptive Watermarking Using Visual Models, <i>IEEE Journal on Selected Areas in Communications, </i>Vol. 16, No. 4, 1998, pp. 525&#150;539.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824563&pid=S1665-6423201000030000300005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; Barni M., Bartolini F., Piva A., Improved Wavelet&#150;based Watermarking through Pixel&#150;Wise Masking, <i>IEEE Trans. on Image Processing, </i>Vol. 10, No. 5, 2001, pp. 783&#150;791.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824565&pid=S1665-6423201000030000300006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Maes M., Kalker T., Linnartz J., Talstra J., Depovere G. and Haitsma J., Digital watermarking for DVD video copy protection, <i>IEEE Signal Processing Magazine, </i>Vol. 17, No. 5, 2000, pp. 47&#150;57.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824567&pid=S1665-6423201000030000300007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; Zhuang H., Li Y. and Wu C., A Blind Spatial&#150;temporal Algorithm Based on 3D Wavelet for Video Watermarking, <i>Proc. of IEEE International Conference on Multimedia and Expo, </i>Taipei, Taiwan, June, Vol 3, No. 1, 2004, pp. 1727&#150;1730.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824569&pid=S1665-6423201000030000300008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; Biswas S., Das S. and Petriu E., An Adaptive Compressed MPEG&#150;2 Video Watermarking Scheme, <i>IEEE Trans. on Instrumentation and Measurement. </i>Vol. 54, No. 5, 2005, pp. 1853&#150;1861.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824571&pid=S1665-6423201000030000300009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Li X. and Wang R.. A Video Watermarking Scheme based on 3D&#150;DWT and Neural Network. <i>Ninth IEEE International Symposium on Multimedia </i>2007, Taichung, Taiwan, December, pp. 110&#150;115.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824573&pid=S1665-6423201000030000300010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; Fan L. and Yanmei F., A DWT&#150;Based Video Watermarking Algorithm Applying DS&#150;CDMA, <i>IEEE Proc. of TENCON, </i>Hong Kong, November, Vol. 1, No. 1, 2006, pp. 1&#150;4.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824575&pid=S1665-6423201000030000300011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; H. Khalilian, S. Ghaemmaghami and M. Omidyeganeh., Digital Video Watermarking in 3&#150;D Ridgelet Domain, <i>11t<sup>h</sup> Int. Conf. on Advanced Communication Technology, ICACT </i>2009, 15&#150;18 Feb, Gangwon&#150;Do, Korea, Vol. 3, 2009, pp. 1643&#150;1646.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824577&pid=S1665-6423201000030000300012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; Convert Direct, Moyea Software &#91;Online&#93;. Available: <a href="http://www.convertdirect.com/" target="_blank">http://www.convertdirect.com</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824579&pid=S1665-6423201000030000300013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; Vixy Project,  Farside  Inc.  &#91;Online&#93;. Available: <a href="http://vixy.net/" target="_blank">http://vixy.net</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824580&pid=S1665-6423201000030000300014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Media Convert, &#91;Online&#93;. Available: http://media&#150;convert.com</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824581&pid=S1665-6423201000030000300015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; Hern&aacute;ndez V., Nakano M., P&eacute;rez H., A Robust DWT&#150;Based Image Watermarking Algorithm, <i>WSEAS Trans. on Communications, </i>No. 10, Vol. 4,  2005, pp. 1048&#150;1057.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824582&pid=S1665-6423201000030000300016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; Corona B., Nakano M., P&eacute;rez H., Adaptive Watermarking Algorithm for binary Image Watermarks, <i>Lecture Notes in Computer Science, </i>2004, pp. 207&#150;215.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824584&pid=S1665-6423201000030000300017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; Reddy A. A. and Chatterji B. N., A New Wavelet Based Logo&#150;Watermarking Scheme, <i>Pattern Recognition Letter, </i>Vol. 26, No. 7, 2005, pp. 1010&#150;1027.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824586&pid=S1665-6423201000030000300018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;19&#93; First E., Xiaojun Q., A Composite Approach for Blind Grayscale Logo Watermarking, <i>IEEE Int. Conf. on Image Processing, </i>Vol. 3, 2007, pp. 265&#150;268.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824588&pid=S1665-6423201000030000300019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;20&#93; Shapiro J. M., Embedded Image Coding Using Zero Tree of Wavelet Coefficients, <i>IEEE Trans. on Signal Processing, </i>Vol. 41, No. 12, 1993, pp. 3445&#150;3462.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824590&pid=S1665-6423201000030000300020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;21&#93; Voyatzis G. and Pitas I., Embedding Robust Watermarks by Chaotic Mixing, <i>Proceedings of Conf. Int. Digital Signal Processing, </i>Santorini, Greece, July, Vol. 1, No. 1, 1997, pp. 213&#150;216.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824592&pid=S1665-6423201000030000300021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;22&#93; Plataniotis K. and Venetsanopoulos A., Color Image Processing and Applications, Springer&#150;Verlag, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824594&pid=S1665-6423201000030000300022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;23&#93; Olsson S., Stroppiana M. and Ba&iacute;na J., Objective Methods for Assessment of Video Quality: State of the Art, <i>IEEE Trans. on Broadcasting, </i>Vol. 43, No. 4, 1997, pp. 487&#150;495.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824596&pid=S1665-6423201000030000300023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;24&#93; Su K., Kundur D. and Hatzinakos D.. Statistical Invisibility for Collusion&#150;Resistant Digital Video Watermarking. <i>IEEE Transactions on Multimedia, </i>Vol. 7, No. 1, February 2005. pp. 43&#150;51.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824598&pid=S1665-6423201000030000300024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b><a href="/img/revistas/jart/v8n3/html/a3a1.htm" target="_blank">Appendix</a></b></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Eskicioglu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lagendijk]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Delp]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Advances in Digital Video Content Protection]]></article-title>
<source><![CDATA[Proceedings of the IEEE]]></source>
<year>Janu</year>
<month>ar</month>
<day>y </day>
<volume>93</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>171-183</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Swanson]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Tewfik]]></surname>
<given-names><![CDATA[A. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Multiresolution Scene-Based Video Watermarking Using Perceptual Models]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>1998</year>
<volume>16</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>540-550</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolgang]]></surname>
<given-names><![CDATA[R. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Podilchuk]]></surname>
<given-names><![CDATA[C. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Delp]]></surname>
<given-names><![CDATA[E. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Perceptual Watermarking for Digital Image and Video]]></article-title>
<source><![CDATA[Proceeding of the IEEE]]></source>
<year>1999</year>
<volume>87</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1108-1126</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cedillo-Hernández]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Nakano-Miyatake]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rojas-Cardenas]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez-Meana]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="es"><![CDATA[Tecnica de Marca de Agua para Video MPEG usando Sensibilidad Visual y Vectores de Movimiento]]></article-title>
<source><![CDATA[Revista Internacional Información Tecnológica]]></source>
<year>2008</year>
<volume>19</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>81-92</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Podilchuk]]></surname>
<given-names><![CDATA[C. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Image-Adaptive Watermarking Using Visual Models]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>1998</year>
<volume>16</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>525-539</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barni]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bartolini]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Piva]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Improved Wavelet-based Watermarking through Pixel-Wise Masking]]></article-title>
<source><![CDATA[IEEE Trans. on Image Processing]]></source>
<year>2001</year>
<volume>10</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>783-791</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maes]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kalker]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Linnartz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Talstra]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Depovere]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Haitsma]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Digital watermarking for DVD video copy protection]]></article-title>
<source><![CDATA[IEEE Signal Processing Magazine]]></source>
<year>2000</year>
<volume>17</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>47-57</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhuang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Blind Spatial-temporal Algorithm Based on 3D Wavelet for Video Watermarking]]></article-title>
<source><![CDATA[]]></source>
<year>2004</year>
<volume>3</volume>
<conf-name><![CDATA[ Proc. of IEEE International Conference on Multimedia and Expo]]></conf-name>
<conf-loc>Taipei </conf-loc>
<page-range>1727-1730</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biswas]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Petriu]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An Adaptive Compressed MPEG-2 Video Watermarking Scheme]]></article-title>
<source><![CDATA[IEEE Trans. on Instrumentation and Measurement]]></source>
<year>2005</year>
<volume>54</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1853-1861</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Video Watermarking Scheme based on 3D-DWT and Neural Network]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[Ninth IEEE International Symposium on Multimedia]]></conf-name>
<conf-date>2007</conf-date>
<conf-loc>Taichung </conf-loc>
<page-range>110-115</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yanmei]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A DWT-Based Video Watermarking Algorithm Applying DS-CDMA]]></article-title>
<source><![CDATA[IEEE Proc. of TENCON]]></source>
<year>2006</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-4</page-range><publisher-loc><![CDATA[Hong Kong ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khalilian]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghaemmaghami]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Omidyeganeh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Video Watermarking in 3-D Ridgelet Domain]]></source>
<year>2009</year>
<volume>3</volume>
<conf-name><![CDATA[11 Int. Conf. on Advanced Communication Technology]]></conf-name>
<conf-date>2009, 15-18 Feb</conf-date>
<conf-loc>Gangwon-Do </conf-loc>
<page-range>1643-1646</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<collab>Convert Direct</collab>
<source><![CDATA[Moyea Software]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<collab>Vixy Project</collab>
<source><![CDATA[]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="">
<collab>Media Convert</collab>
<source><![CDATA[]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Nakano]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Robust DWT-Based Image Watermarking Algorithm]]></article-title>
<source><![CDATA[WSEAS Trans. on Communications]]></source>
<year></year>
<volume>4</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1048-1057</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Corona]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Nakano]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Adaptive Watermarking Algorithm for binary Image Watermarks]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2004</year>
<page-range>207-215</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reddy]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Chatterji]]></surname>
<given-names><![CDATA[B. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A New Wavelet Based Logo-Watermarking Scheme]]></article-title>
<source><![CDATA[Pattern Recognition Letter]]></source>
<year>2005</year>
<volume>26</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1010-1027</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[First]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiaojun]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Composite Approach for Blind Grayscale Logo Watermarking]]></article-title>
<source><![CDATA[IEEE Int. Conf. on Image Processing]]></source>
<year>2007</year>
<volume>3</volume>
<page-range>265-268</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shapiro]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Embedded Image Coding Using Zero Tree of Wavelet Coefficients]]></article-title>
<source><![CDATA[IEEE Trans. on Signal Processing]]></source>
<year>1993</year>
<volume>41</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>3445-3462</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Voyatzis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Pitas]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Embedding Robust Watermarks by Chaotic Mixing]]></source>
<year>1997</year>
<volume>1</volume>
<conf-name><![CDATA[ Conf. Int. Digital Signal Processing]]></conf-name>
<conf-loc>Santorini </conf-loc>
<page-range>213-216</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Plataniotis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Venetsanopoulos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Color Image Processing and Applications]]></source>
<year>2000</year>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olsson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Stroppiana]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Baína]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Objective Methods for Assessment of Video Quality: State of the Art]]></source>
<year>1997</year>
<volume>43</volume>
<conf-name><![CDATA[ IEEE Trans. on Broadcasting]]></conf-name>
<conf-loc> </conf-loc>
<page-range>487-495</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kundur]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Hatzinakos]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Statistical Invisibility for Collusion-Resistant Digital Video Watermarking]]></article-title>
<source><![CDATA[IEEE Transactions on Multimedia]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>43-</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
