{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:53Z","timestamp":1740099173679,"version":"3.37.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_17","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"195-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GA"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9139-0109","authenticated-orcid":false,"given":"Shiqin","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9167-3897","authenticated-orcid":false,"given":"Minjun","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7458-7412","authenticated-orcid":false,"given":"Jixin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jiangyuan","family":"Yao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8417-892X","authenticated-orcid":false,"given":"Yucong","family":"Duan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3777-9479","authenticated-orcid":false,"given":"Xiaoyi","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"99","key":"17_CR1","first-page":"1","volume":"PP","author":"CS Chang","year":"2017","unstructured":"Chang, C.S., Shen, J.J.: Features classification forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans. Image Process. PP(99), 1 (2017)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"17_CR2","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1016\/j.optcom.2008.11.024","volume":"282","author":"V Aslantas","year":"2009","unstructured":"Aslantas, V.: An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Optics Commun. 282(5), 769\u2013777 (2009)","journal-title":"Optics Commun."},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.aeue.2011.08.005","volume":"66","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar, G.: A new facet in robust digital watermarking framework. AEUE \u2013 Int. J. Electron. Commun. 66(4), 275\u2013285 (2012)","journal-title":"AEUE \u2013 Int. J. Electron. Commun."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., et al.: Index - digital watermarking and steganography. In: Digital Watermarking & Steganography, 2nd edn., pp. 183\u2013212 (2007)","DOI":"10.1016\/B978-012372585-1.50009-7"},{"key":"17_CR5","first-page":"1","volume":"16","author":"CT Yen","year":"2015","unstructured":"Yen, C.T., Huang, Y.J.: Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimedia Tools Appl. 16, 1\u201311 (2015)","journal-title":"Multimedia Tools Appl."},{"key":"17_CR6","unstructured":"Liu, Q., Jiang, X.: Design and realization of a meaningful digital watermarking algorithm based on RBF neural network. In: The Sixth World Congress on Intelligent Control and Automation, WCICA 2006, pp. 214\u2013218. IEEE (2006)"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.10.016","volume":"426","author":"T Huynh-The","year":"2018","unstructured":"Huynh-The, T., Hua, C.H., Tu, N.A., et al.: Selective bit embedding scheme for robust blind color image watermarking. Inf. Sci. 426, 1\u201318 (2018)","journal-title":"Inf. Sci."},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.asoc.2016.11.044","volume":"51","author":"M Arsalan","year":"2017","unstructured":"Arsalan, M., Qureshi, A.S., Khan, A., et al.: Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Appl. Soft Comput. 51, 168\u2013179 (2017)","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"17_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.engappai.2013.10.008","volume":"31","author":"SP Maity","year":"2014","unstructured":"Maity, S.P., Maity, S., Sil, J., et al.: Perceptually adaptive MC-SS image watermarking using GA-NN hybridization in fading gain. Eng. Appl. Artif. Intell. 31(5), 3\u201314 (2014)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"7","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/j.jvcir.2013.07.007","volume":"24","author":"C Agarwal","year":"2013","unstructured":"Agarwal, C., Mishra, A., Sharma, A.: Gray-scale image watermarking using GA-BPN hybrid network. J. Vis. Commun. Image Representation 24(7), 1135\u20131146 (2013)","journal-title":"J. Vis. Commun. Image Representation"},{"issue":"11","key":"17_CR11","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.1016\/j.jss.2013.06.023","volume":"86","author":"K Jawad","year":"2013","unstructured":"Jawad, K., Khan, A.: Genetic algorithm and difference expansion based reversible watermarking for relational databases. J. Syst. Softw. 86(11), 2742\u20132753 (2013)","journal-title":"J. Syst. Softw."},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. In: Conference on Artificial Intelligence, pp. 988\u2013999. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/978-1-4757-3264-1","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: The Workshop on Computational Learning Theory, pp. 144\u2013152 (1992)","DOI":"10.1145\/130385.130401"},{"issue":"2","key":"17_CR14","first-page":"126","volume":"6","author":"JH Holland","year":"1992","unstructured":"Holland, J.H.: Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. Q. Rev. Biol. 6(2), 126\u2013137 (1992)","journal-title":"Q. Rev. Biol."},{"key":"17_CR15","first-page":"1","volume":"21","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Zhou, L.: Digital image embedding and extracting method based on wavelet transform domain. J. Shenyang Univ. Technol. 21, 1\u20136 (2018)","journal-title":"J. Shenyang Univ. Technol."},{"issue":"02","key":"17_CR16","first-page":"131","volume":"37","author":"XD Jiang","year":"2018","unstructured":"Jiang, X.D., Fan, H.Y., Lu, Z.M.: Blind robust watermarking algorithm based on logistic chaotic mapping and IWT-SVD quantization. Transducer Microsyst. Technol. 37(02), 131\u2013135 (2018)","journal-title":"Transducer Microsyst. Technol."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jin, W.: A robust digital image multi-watermarking scheme in the DWT domain. In: International Conference on Systems and Informatics, Cairo, pp. 1851\u20131854 (2012)","DOI":"10.1109\/ICSAI.2012.6223407"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.10.016","volume":"426","author":"T Huynh-The","year":"2018","unstructured":"Huynh-The, T., Hua, C.H., Tu, N.A., et al.: Selective bit embedding scheme for robust blind color image watermarking. Inf. Sci. 426, 1\u201318 (2018)","journal-title":"Inf. Sci."},{"key":"17_CR19","first-page":"71","volume":"38","author":"A Mishra","year":"2018","unstructured":"Mishra, A., Rajpal, A., Bala, R.: Bi-directional extreme learning machine for semi-blind watermarking of compressed images. J. Inf. Secur. Appl. 38, 71\u201384 (2018)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"17_CR20","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/TIFS.2009.2025849","volume":"4","author":"BH Cha","year":"2009","unstructured":"Cha, B.H., Kuo, C.C.J.: Robust MC-CDMA-based fingerprinting against time-varying collusion attacks. IEEE Trans. Inf. Forensics Secur. 4(3), 302\u2013317 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:50:07Z","timestamp":1571874607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}