{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:08:09Z","timestamp":1725548889462},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248392"},{"type":"electronic","value":"9783540318057"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_23","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:26:13Z","timestamp":1267403173000},"page":"271-282","source":"Crossref","is-referenced-by-count":2,"title":["Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques"],"prefix":"10.1007","author":[{"given":"Chun-Hsiang","family":"Huang","sequence":"first","affiliation":[]},{"given":"Chih-Hao","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Ja-Ling","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2001","unstructured":"Cox, I.J., Bloom, J., Miller, M.L.: Digital Watermarking, 1st edn. Morgan Kaufmann Publishers, San Francisco (2001)","edition":"1"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1155\/S1110865702000525","volume":"2","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L.: The First 50 Years of Electronic Watermarking. Journal of Applied Signal Processing\u00a02, 126\u2013132 (2002)","journal-title":"Journal of Applied Signal Processing"},{"key":"23_CR3","volume-title":"Evolutionary Computation toward a New Philosophy of Machine Intelligence","author":"D.B. Fogel","year":"1995","unstructured":"Fogel, D.B.: Evolutionary Computation toward a New Philosophy of Machine Intelligence. IEEE Press, Los Alamitos (1995)"},{"key":"23_CR4","volume-title":"Genetic Algorithm in Search, Optimization & Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithm in Search, Optimization & Machine Learning. Addison Wesley, Reading (1989)"},{"doi-asserted-by":"crossref","unstructured":"Huang, C.H., Wu, J.L.: A Watermark Optimization Technique Based on Genetic Algorithms. In: SPIE Electronic Imaging 2000, San Jose (January 2000)","key":"23_CR5","DOI":"10.1117\/12.385007"},{"doi-asserted-by":"crossref","unstructured":"Hsu, C.T., Wu, J.L.: Hidden Digital Watermarks in Images. IEEE Transactions on Image Processing\u00a08(1) (January 1999)","key":"23_CR6","DOI":"10.1109\/83.736686"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/3-540-32367-8_12","volume-title":"Intelligent Multimedia Processing with Soft Computing","author":"J.L. Wu","year":"2005","unstructured":"Wu, J.L., Lin, C.H., Huang, C.H.: An Efficient Genetic Algorithm for Small Range Search Problem. In: Intelligent Multimedia Processing with Soft Computing, pp. 253\u2013280. Springer, Heidelberg (2005)"},{"unstructured":"Pan, J.S., Huang, H.-C., Wang, F.H.: Genetic Watermarking Techniques. In: The 5th Int\u2019l Conference on Knowledge-based Intelligent Information Engineering System & Allied Technologies","key":"23_CR8"},{"unstructured":"Huang, C.H., Wu, J.L.: A Blind Watermarking Algorithm with Semantic Meaningful Watermarks. In: 34th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove (October 2000)","key":"23_CR9"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T13:20:13Z","timestamp":1558876813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}