{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:29:31Z","timestamp":1725575371625},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213789"},{"type":"electronic","value":"9783540246534"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24653-4_35","type":"book-chapter","created":{"date-parts":[[2011,1,12]],"date-time":"2011-01-12T15:08:30Z","timestamp":1294844910000},"page":"339-348","source":"Crossref","is-referenced-by-count":2,"title":["A Watermark Sharing Scheme to High Quality Halftone Images with Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Emi","family":"Myodo","sequence":"first","affiliation":[]},{"given":"Kiyoshi","family":"Tanaka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Matsui, K.: Fundamentals of Digital Watermark. Morikita Publishing (1998) (in Japanese)"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding: Techniques for Steganography and Digital Watermarking, Artech House (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"35_CR3","volume-title":"Digital Watermarking","author":"J. Cox","year":"2000","unstructured":"Cox, J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2000)"},{"key":"35_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Noar","year":"1995","unstructured":"Noar, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"issue":"9","key":"35_CR5","first-page":"1624","volume":"J79-D-II","author":"K. Oka","year":"1996","unstructured":"Oka, K., Nakamura, Y., Matsui, K.: Embedding Signature into a Hardcopy Image Using a Micro-Patterns. IEICE Trans\u00a0J79-D-II(9), 1624\u20131626 (1996) (in Japanese)","journal-title":"IEICE Trans"},{"key":"35_CR6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2421.001.0001","volume-title":"Digital Halftoning","author":"R. Ulichney","year":"1987","unstructured":"Ulichney, R.: Digital Halftoning. MIT Press, Cambridge (1987)"},{"issue":"3","key":"35_CR7","first-page":"820","volume":"J80-D-II","author":"K. Oka","year":"1997","unstructured":"Oka, K., Nakamura, Y., Matsui, K.: Embedding Signature into a Hardcopy of Dithered Image. IEICE Trans.\u00a0J80-D-II(3), 820\u2013823 (1997) (in Japanese)","journal-title":"IEICE Trans."},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Kobayashi, N., Saito, H.: Halftoning Technique Using Genetic Algorithm. In: Proc. IEEE ICASSP 1994, vol.\u00a05, pp. 105\u2013108 (1994)","DOI":"10.1109\/ICASSP.1994.389556"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Aguirre, H., Tanaka, K., Sugimura, T.: Accelerated Halftoning Technique Using Improved Genetic Algorithm with Tiny Populations. In: Proc. IEEE Intl. Conf. Systems, Man, and Cybernetics, pp. 905\u2013910 (1999)","DOI":"10.1109\/ICSMC.1999.812530"},{"key":"35_CR10","series-title":"Lecture Notes in Computer Science","first-page":"2251","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"E. Myodo","year":"2003","unstructured":"Myodo, E., Aguirre, H., Tanaka, K.: Improved Image Halftoning Technique Using GAs with Concurrent Inter-block Evaluation. In: Cant\u00fa-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O\u2019Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol.\u00a02724, pp. 2251\u20132262. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24653-4_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:50:18Z","timestamp":1605761418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24653-4_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213789","9783540246534"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24653-4_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}