{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:48:43Z","timestamp":1770137323127,"version":"3.49.0"},"reference-count":34,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T00:00:00Z","timestamp":1513641600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2018,3,10]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>Digital watermarking is a promising and efficient methodology for protecting the copyright of the transmitted multimedia data. Three\u2010dimensional videos (3DVs) are transmitted and stored in the form of compressed information. Thus, there is a great need for compressed 3DV watermarking. This paper presents 2 proposed hybrid watermarking schemes for securing the 3DV transmission. The first watermarking scheme is the homomorphic transform\u2013based singular value decomposition in discrete wavelet transform domain. The second scheme is the 3\u2010level discrete stationary wavelet transform in discrete cosine transform domain. The objective of the 2 proposed hybrid watermarking schemes is to increase the immunity of the watermarked 3DV to attacks and achieve adequate perceptual quality. The performances of the 2 proposed hybrid watermarking schemes are compared with those of the state\u2010of\u2010the\u2010art watermarking schemes. The comparisons depend on both of the subjective visual results and the objective results; the peak signal\u2010to\u2010noise ratios of the watermarked frames and the normalized correlation of the extracted watermark frames. Extensive simulation results on standard 3DV sequences have been conducted in the presence of attacks. The obtained results confirm that the 2 suggested hybrid watermarking schemes are robust in the presence of attacks. They achieve not only very good perceptual quality with appreciated peak signal\u2010to\u2010noise ratio values but also high correlation coefficient values in the presence of attacks.<\/jats:p>","DOI":"10.1002\/dac.3478","type":"journal-article","created":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T04:21:22Z","timestamp":1513743682000},"source":"Crossref","is-referenced-by-count":41,"title":["Efficient hybrid watermarking schemes for robust and secure<scp>3D\u2010MVC<\/scp>communication"],"prefix":"10.1002","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"W.","family":"El\u2010Shafai","sequence":"first","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt"}]},{"given":"S.","family":"El\u2010Rabaie","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt"}]},{"given":"M.M.","family":"El\u2010Halawany","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt"}]},{"given":"Fathi E.","family":"Abd El\u2010Samie","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt"}]}],"member":"311","published-online":{"date-parts":[[2017,12,19]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2013.2276710"},{"key":"e_1_2_6_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00011-5"},{"issue":"5","key":"e_1_2_6_4_1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MCOM.2013.6515052","article-title":"Adaptive multiview video streaming: challenges and opportunities","volume":"51","author":"Chakareski J","year":"2013","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"e_1_2_6_5_1","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1109\/JSTSP.2015.2407320","article-title":"Optimizing multiview video plus depth prediction structures for interactive multiview video streaming","volume":"9","author":"De Abreu A","year":"2015","journal-title":"IEEE J Sel Top Sign Proces"},{"key":"e_1_2_6_6_1","doi-asserted-by":"crossref","unstructured":"El Shafai W. Hru\u0161ovsk\u00fd B. El\u2010Khamy M. &El\u2010Sharkawy M.(2011 September).Joint space\u2010time\u2010view error concealment algorithms for 3D multi\u2010view video. In Image Processing (ICIP) 2011 18th IEEE International Conference on (pp.2201\u20102204).","DOI":"10.1109\/ICIP.2011.6116072"},{"key":"e_1_2_6_7_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.3009554"},{"key":"e_1_2_6_8_1","doi-asserted-by":"crossref","unstructured":"Niu Y. Souidene W. &Beghdadi A.(2011 July).A visual sensitivity model based stereo image watermarking scheme. In Visual Information Processing (EUVIP) 2011 3rd IEEE European Workshop on (pp.211\u2010215).","DOI":"10.1109\/EuVIP.2011.6045546"},{"key":"e_1_2_6_9_1","doi-asserted-by":"crossref","unstructured":"Lin Y. H. &Wu J. L.(2012 March).Unseen visible watermarking for color plus depth map 3D images. In Acoustics Speech and Signal Processing (ICASSP) 2012 IEEE International Conference on (pp.1801\u20101804).","DOI":"10.1109\/ICASSP.2012.6288250"},{"issue":"2","key":"e_1_2_6_10_1","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/TBC.2011.2131470","article-title":"A digital blind watermarking for depth\u2010image\u2010based rendering 3D images","volume":"57","author":"Lin YH","year":"2011","journal-title":"IEEE Trans Broadcast"},{"issue":"4","key":"e_1_2_6_11_1","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TBC.2012.2206851","article-title":"Robust DT\u2010CWT watermarking for DIBR 3D images","volume":"58","author":"Kim HD","year":"2012","journal-title":"IEEE Trans Broadcast"},{"key":"e_1_2_6_12_1","volume-title":"Utilization of watermarking schemes for securing digital images","author":"Khalid A","year":"2017"},{"key":"e_1_2_6_13_1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.measurement.2013.10.028","article-title":"Watermarking for DIBR 3D images based on SIFT feature points","volume":"48","author":"Wang S","year":"2014","journal-title":"Measurement"},{"key":"e_1_2_6_14_1","doi-asserted-by":"crossref","unstructured":"Franco\u2010Contreras J. Baudry S. &Do\u00ebrr G.(2011 September).Virtual view invariant domain for 3D video blind watermarking. In Image Processing (ICIP) 2011 18th IEEE International Conference on (pp.2761\u20102764).","DOI":"10.1109\/ICIP.2011.6116242"},{"key":"e_1_2_6_15_1","doi-asserted-by":"crossref","unstructured":"Lee M. J. Lee J. W. &Lee H. K.(2011 October).Perceptual watermarking for 3D stereoscopic video using depth information. In Intelligent Information Hiding and Multimedia Signal Processing (IIH\u2010MSP) 2011 Seventh International Conference on (pp.81\u201084).","DOI":"10.1109\/IIHMSP.2011.83"},{"issue":"8","key":"e_1_2_6_16_1","doi-asserted-by":"crossref","first-page":"e105613","DOI":"10.1371\/journal.pone.0105613","article-title":"A watermarking scheme for high efficiency video coding (HEVC)","volume":"9","author":"Swati S","year":"2014","journal-title":"PLoS One"},{"key":"e_1_2_6_17_1","doi-asserted-by":"crossref","unstructured":"Ogawa K. &Ohtake G.(2015 January).Watermarking for HEVC\/H. 265 stream. In Consumer Electronics (ICCE) 2015 IEEE International Conference on (pp.102\u2010103).","DOI":"10.1109\/ICCE.2015.7066337"},{"key":"e_1_2_6_18_1","doi-asserted-by":"crossref","unstructured":"Zhang J. &Ho A. T.(2006 August).Efficient video authentication for H. 264\/AVC. In Innovative Computing Information and Control 2006. ICICIC'06. First International Conference on (Vol.3 pp.46\u201049).","DOI":"10.1109\/ICICIC.2006.448"},{"issue":"2","key":"e_1_2_6_19_1","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TCSII.2006.886247","article-title":"Robust video watermarking of H.264\/AVC","volume":"54","author":"Zhang J","year":"2007","journal-title":"IEEE Trans Circuits Syst Express Briefs"},{"key":"e_1_2_6_20_1","doi-asserted-by":"crossref","unstructured":"Qiu G. Marziliano P. Ho A. T. He D. &Sun Q.(2004 August).A hybrid watermarking scheme for H. 264\/AVC video. In Pattern Recognition 2004. ICPR 2004. Proceedings of the 17th International Conference on (Vol.4 pp.865\u2010868).","DOI":"10.1109\/ICPR.2004.1333909"},{"key":"e_1_2_6_21_1","doi-asserted-by":"crossref","unstructured":"Kuo T. Y. &Lo Y. C.(2010 March).A hybrid scheme of robust and fragile watermarking for H. 264\/AVC video. In Broadband Multimedia Systems and Broadcasting (BMSB) 2010 IEEE International Symposium on (pp.1\u20106).","DOI":"10.1109\/ISBMSB.2010.5463151"},{"key":"e_1_2_6_22_1","doi-asserted-by":"crossref","unstructured":"Noorkami M. &Mersereau R. M.(2005 September).Compressed\u2010domain video watermarking for H. 264. In Image Processing 2005. ICIP 2005. IEEE International Conference on (Vol.2 pp.II\u2010890).","DOI":"10.1109\/ICIP.2005.1530199"},{"key":"e_1_2_6_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.890306"},{"key":"e_1_2_6_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.923825"},{"key":"e_1_2_6_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2134770"},{"issue":"6","key":"e_1_2_6_26_1","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.image.2011.04.008","article-title":"A novel watermarking scheme for H. 264\/AVC video authentication","volume":"26","author":"Xu D","year":"2011","journal-title":"Signal Process Image Commun"},{"key":"e_1_2_6_27_1","doi-asserted-by":"crossref","unstructured":"Dutta T. Sur A. &Nandi S.(2013 February).A robust compressed domain video watermarking in P\u2010frames with controlled bit rate increase. In Communications (NCC) 2013 National Conference on (pp.1\u20105).","DOI":"10.1109\/NCC.2013.6488015"},{"key":"e_1_2_6_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2310595"},{"issue":"8","key":"e_1_2_6_29_1","first-page":"413","article-title":"A practical design of digital video watermarking in H. 264\/AVC for content authentication","volume":"26","author":"Su PC","year":"2011","journal-title":"Signal Process Image Commun"},{"key":"e_1_2_6_30_1","unstructured":"Mueller K. &Vetro A.(2014).Common test conditions of 3D\u2010MVV core experiments. Joint Collaborative Team on 3D Video Coding Extensions JCT3V\u2010G1100 7th Meeting: San Jose USA."},{"key":"e_1_2_6_31_1","unstructured":"WD 4 reference software for multiview video coding (mvc);August 2015.http:\/\/wftp3.itu.int\/av\u2010arch\/jvt\u2010site\/2009_01_Geneva\/JVT\u2010AD207.zip."},{"key":"e_1_2_6_32_1","unstructured":"H.264\/AVC codec;September 2014.http:\/\/iphome.hhi.de\/suehring\/tml\/."},{"key":"e_1_2_6_33_1","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1016\/j.procs.2015.02.104","article-title":"A semi blind DWT\u2010SVD video watermarking","volume":"46","author":"Thind DK","year":"2015","journal-title":"Procedia Computer Science"},{"issue":"3","key":"e_1_2_6_34_1","first-page":"389","article-title":"Video watermarking algorithms using the SVD transform","volume":"30","author":"Rajab L","year":"2009","journal-title":"Eur J Sci Res"},{"issue":"5","key":"e_1_2_6_35_1","doi-asserted-by":"crossref","first-page":"42","DOI":"10.25046\/aj010508","article-title":"A comparative study for color systems used in the DCT\u2010DWT watermarking algorithm","volume":"1","author":"Khalid A","year":"2016","journal-title":"Adv Sci Technol Eng Sys J (ASTESJ)"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.3478","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.3478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T01:21:11Z","timestamp":1751160071000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.3478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,19]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,3,10]]}},"alternative-id":["10.1002\/dac.3478"],"URL":"https:\/\/doi.org\/10.1002\/dac.3478","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,19]]},"article-number":"e3478"}}