{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:40:05Z","timestamp":1748828405839,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_16","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"191-205","source":"Crossref","is-referenced-by-count":0,"title":["Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes"],"prefix":"10.1007","author":[{"given":"Takeru","family":"Maehara","sequence":"first","affiliation":[]},{"given":"Ryo","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Ono","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Anqiang, L., Jing, L.: A novel scheme for robust video watermark in the 3D-DWT domain. In: 2007 The First International Symposium on Data, Privacy, and E-Commerce, ISDPE 2007, pp. 514\u2013516. IEEE (2007)","DOI":"10.1109\/ISDPE.2007.24"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Chen, A.H.L., Chyu, C.C.: A memetic algorithm for maximizing net present value in resource-constrained project scheduling problem. In: Proceedings of IEEE World Congress on Computational Intelligence, pp. 2401\u20132408 (2008)","DOI":"10.1109\/CEC.2008.4631118"},{"issue":"4","key":"16_CR3","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"16_CR4","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s00034-008-9025-z","volume":"27","author":"SC Chu","year":"2008","unstructured":"Chu, S.C., Huang, H.C., Shi, Y., Wu, S.Y., Shieh, C.S.: Genetic watermarking for zerotree-based applications. Circ. Syst. Sig. Process. 27(2), 171\u2013182 (2008). http:\/\/dx.org\/10.1007\/s00034-008-9025-z","journal-title":"Circ. Syst. Sig. Process."},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TEVC.2010.2059031","volume":"15","author":"S Das","year":"2011","unstructured":"Das, S., Suganthan, P.N.: Differential evolution: a survey of the state-of-the-art. IEEE Trans. Evol. Comput. 15(1), 4\u201331 (2011)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"16","key":"16_CR6","doi-asserted-by":"publisher","first-page":"3379","DOI":"10.1016\/j.ins.2011.04.007","volume":"181","author":"HC Huang","year":"2011","unstructured":"Huang, H.C., Chu, S.C., Pan, J.S., Huang, C.Y., Liao, B.Y.: Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf. Sci. 181(16), 3379\u20133396 (2011). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025511001757","journal-title":"Inf. Sci."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Huang, H.Y., Yang, C.H., Hsu, W.H.: A video watermarking algorithm based on pseudo 3D DCT. In: 2009 IEEE Symposium on Computational Intelligence for Image Processing, CIIP 2009, pp. 76\u201381. IEEE (2009)","DOI":"10.1109\/CIIP.2009.4937884"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K., Ono, S.: Watermark design of two-dimensional barcodes on mobile phone display by evolutionary multi-objective optimization. In: Proceedings of Joint 7th International Conference on Soft Computing and Intelligent Systems and 15th International Symposium on Advanced Intelligent Systems, pp. 149\u2013154 (2014)","DOI":"10.1109\/SCIS-ISIS.2014.7044673"},{"key":"16_CR9","unstructured":"Mitrea, M., Hasnaoui, M.: Semi-fragile watermarking between theory and practice. In: Proceedings of the Romanian Academy, pp. 328\u2013327, October 2013. https:\/\/hal.archives-ouvertes.fr\/hal-00941082"},{"issue":"11","key":"16_CR10","first-page":"1778","volume":"60","author":"H Nakamura","year":"2006","unstructured":"Nakamura, H., Gohshi, S., Fujii, R., Ito, H., Suzuki, M., Takai, S., Tani, Y.: A digital watermark that survives after re-shooting the images displayed on a CRT screen. J. Inst. Image Inf. Telev. Eng. 60(11), 1778\u20131788 (2006)","journal-title":"J. Inst. Image Inf. Telev. Eng."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Ono, S., Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K.: Semi-fragile watermark design for detecting illegal two-dimensional barcodes by evolutionary multi-objective optimization. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO) (Companion), pp. 175\u2013176 (2014)","DOI":"10.1145\/2598394.2598456"},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"IS Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300\u2013304 (1960). http:\/\/www.jstor.org\/stable\/2098968","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn, R., Price, K.: Differential evolution a simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11, 341\u2013359 (1997). http:\/\/dl.acm.org\/citation.cfm?id=596061.596146","journal-title":"J. Global Optim."},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Tanabe, R., Fukunaga, A.: Success-history based parameter adaptation for differential evolution. In: 2013 IEEE Congress on Evolutionary Computation (CEC), pp. 71\u201378, June 2013","DOI":"10.1109\/CEC.2013.6557555"},{"key":"16_CR15","unstructured":"Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proceedings of the SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII. No. 607218 (2006). http:\/\/dx.org\/10.1117\/12.643053"},{"issue":"5","key":"16_CR16","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1109\/TEVC.2009.2014613","volume":"13","author":"J Zhang","year":"2009","unstructured":"Zhang, J., Sanderson, A.: JADE: adaptive differential evolution with optional external archive. IEEE Trans. Evol. Comput. 13(5), 945\u2013958 (2009)","journal-title":"IEEE Trans. Evol. Comput."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:49Z","timestamp":1748827129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}