{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:52:22Z","timestamp":1725871942215},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504711"},{"type":"electronic","value":"9783319504728"}],"license":[{"start":{"date-parts":[[2016,11,26]],"date-time":"2016-11-26T00:00:00Z","timestamp":1480118400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50472-8_14","type":"book-chapter","created":{"date-parts":[[2016,11,25]],"date-time":"2016-11-25T11:17:15Z","timestamp":1480072635000},"page":"172-180","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Image Authentication Scheme Using Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Arjun","family":"Londhey","sequence":"first","affiliation":[]},{"given":"Manik Lal","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,26]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420038262","volume-title":"Multimedia Security Handbook","author":"B Furht","year":"2004","unstructured":"Furht, B., Kirovski, D.: Multimedia Security Handbook. CRC Press, Boca Raton (2004)"},{"issue":"3","key":"14_CR2","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"RZ Wan","year":"2001","unstructured":"Wan, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34(3), 671\u2013683 (2001)","journal-title":"Pattern Recogn."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Afarin, R., Mozaffari, S.: Image encryption using genetic algorithm. In: proceedings of the Conference of Machine Vision and Image Processing, pp. 441\u2013445 (2013)","DOI":"10.1109\/IranianMVIP.2013.6780026"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-642-13681-8_47","volume-title":"Image and Signal Processing","author":"M Khodaei","year":"2010","unstructured":"Khodaei, M., Faez, K.: Image hiding by using genetic algorithm and LSB substitution. In: Elmoataz, A., Lezoray, O., Nouboud, F., Mammass, D., Meunier, J. (eds.) ICISP 2010. LNCS, vol. 6134, pp. 404\u2013411. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13681-8_47"},{"issue":"7","key":"14_CR5","doi-asserted-by":"crossref","first-page":"1336","DOI":"10.1109\/TIFS.2015.2407698","volume":"10","author":"X Wang","year":"2014","unstructured":"Wang, X., Pang, K., Zhou, X., Zhou, Y.: A visual model-based perceptual image hash for content authentication. IEEE Trans. Inf. Forensics Secur. 10(7), 1336\u20131349 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Liu, F., Wang, H., Cheng, L.-M., Ho, A.T.S., Li, S.: Enhanced perceptual image authentication with tamper localization and self-restoration. In proceedings of IEEE International Conference on Multimedia and Expo, pp. 1\u20136 (2014)","DOI":"10.1109\/ICME.2014.6890128"},{"issue":"3","key":"14_CR7","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V Monga","year":"2007","unstructured":"Monga, V., Mhcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Secur. 2(3), 376\u2013390 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"14_CR8","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","volume":"1","author":"A Swaminathan","year":"2006","unstructured":"Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215\u2013230 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR9","unstructured":"Enayatifar, R., Abdullah,A.H.: Image security via genetic algorithm. In: proceedings of International Conference on Computer and Software Modeling, pp. 198\u2013203 (2011)"},{"issue":"1","key":"14_CR10","first-page":"1","volume":"11","author":"IA Ismail","year":"2010","unstructured":"Ismail, I.A., Amin, M., Diab, H.: A digital image encryption algorithm based a composition of two chaotic logistic maps. Int. J. Netw. Secur. 11(1), 1\u201310 (2010)","journal-title":"Int. J. Netw. Secur."},{"issue":"5","key":"14_CR11","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.patrec.2005.09.006","volume":"27","author":"CC Chang","year":"2006","unstructured":"Chang, C.C., Hu, Y.S., Lu, T.C.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439\u2013446 (2006)","journal-title":"Pattern Recogn. Lett."},{"issue":"5","key":"14_CR12","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1016\/j.sigpro.2009.05.024","volume":"90","author":"F Ahmed","year":"2010","unstructured":"Ahmed, F., Siyal, M.Y., Abbas, V.U.: A secure and robust hash-based scheme for image authentication. J. Signal Process. 90(5), 1456\u20131470 (2010)","journal-title":"J. Signal Process."},{"key":"14_CR13","volume-title":"Handbook of Applied Cryptography","author":"S Vanstone","year":"1996","unstructured":"Vanstone, S., van Oorschot, P., Menezes, A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"5","key":"14_CR14","doi-asserted-by":"crossref","first-page":"553","DOI":"10.3923\/jas.2002.553.557","volume":"2","author":"YL Tang","year":"2002","unstructured":"Tang, Y.L., Hwang, M.S., Yang, C.R.: An image authentication scheme based on digital signatures. Pak. J. Appl. Sci. 2(5), 553\u2013557 (2002)","journal-title":"Pak. J. Appl. Sci."},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Holland, J.H.: Genetic algorithms. Sci. Am., 66\u201372 (1992)","DOI":"10.1038\/scientificamerican0792-66"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50472-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:31:04Z","timestamp":1498350664000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50472-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,26]]},"ISBN":["9783319504711","9783319504728"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50472-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016,11,26]]}}}