{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:29:08Z","timestamp":1744208948456},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747680"},{"type":"electronic","value":"9783540747697"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74769-7_34","type":"book-chapter","created":{"date-parts":[[2007,8,24]],"date-time":"2007-08-24T15:27:53Z","timestamp":1187969273000},"page":"307-314","source":"Crossref","is-referenced-by-count":23,"title":["A Novel Watermarking Scheme Based on PSO Algorithm"],"prefix":"10.1007","author":[{"given":"Ziqiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xia","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Dexian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F. Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proceedings of the IEEE\u00a087, 1079\u20131107 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Rongen, P.M.J., Maes, M.J., van Overveld, K.W.: Digital image watermarking by salient point modification: practical results. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, vol.\u00a03657, pp. 273\u2013282 (1999)","DOI":"10.1117\/12.344676"},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/5.241504","volume":"81","author":"N. Jayant","year":"1993","unstructured":"Jayant, N., Johnston, J., Safranek, R.: Signal compression based on models of human perception. Proceedings of the IEEE\u00a081, 1385\u20131422 (1993)","journal-title":"Proceedings of the IEEE"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, Nagoya, Japan, pp. 39\u201343 (1995)","DOI":"10.1109\/MHS.1995.494215"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/ICEC.1997.592326","volume-title":"Proceedings of 1997 IEEE International Conference on Evolutionary Computation","author":"J. Kennedy","year":"1997","unstructured":"Kennedy, J.: The particle swarm: social adaptation of knowledge. In: Proceedings of 1997 IEEE International Conference on Evolutionary Computation, Indianapolis, IN, USA, pp. 303\u2013308. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1006\/jath.1994.1085","volume":"78","author":"J.S. Geronimo","year":"1994","unstructured":"Geronimo, J.S., Hardin, D.P., Massopust, P.R.: Fractal functions and wavelet expansions based on several scaling functions. Journal of Approximation Theory\u00a078, 373\u2013401 (1994)","journal-title":"Journal of Approximation Theory"},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/83.951534","volume":"10","author":"K. Attakitmongcol","year":"2001","unstructured":"Attakitmongcol, K., Hardin, D.P., Wilkes, D.M.: Multiwavelet prefilters II: optimal orthogonal prefilters. IEEE Transactions on Image Processing\u00a010, 1476\u20131487 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Clark, R.: An introduction to JPEG 2000 and watermarking. In: IEE Seminar on Secure Images and Image Authentication, London, UK, pp. 3\u20136 (2000)","DOI":"10.1049\/ic:20000214"},{"key":"34_CR9","first-page":"69","volume-title":"Proceedings of the 1998 IEEE International Conference on Evolutionary Computation","author":"Y. Shi","year":"1998","unstructured":"Shi, Y., Eberhart, R.: A modified particle swarm optimizer. In: Proceedings of the 1998 IEEE International Conference on Evolutionary Computation, Anchorage, AK, USA, pp. 69\u201373. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"34_CR10","unstructured":"Hsieh, S.-L., Huang, B.-Y.: A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation. In: Proceedings of International Computer Symposium, pp. 661\u2013666 (2004)"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/S0167-8655(02)00023-5","volume":"23","author":"C.-C. Chang","year":"2002","unstructured":"Chang, C.-C., Chung, J.-C.: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognition Letters\u00a023, 931\u2013941 (2002)","journal-title":"Pattern Recognition Letters"}],"container-title":["Lecture Notes in Computer Science","Bio-Inspired Computational Intelligence and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74769-7_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:37:01Z","timestamp":1619519821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74769-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540747680","9783540747697"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74769-7_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}