{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:43:11Z","timestamp":1725518591331},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540877318"},{"type":"electronic","value":"9783540877325"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87732-5_93","type":"book-chapter","created":{"date-parts":[[2008,9,4]],"date-time":"2008-09-04T07:16:14Z","timestamp":1220512574000},"page":"845-853","source":"Crossref","is-referenced-by-count":3,"title":["Memetic Algorithm-Based Image Watermarking Scheme"],"prefix":"10.1007","author":[{"given":"Qingzhou","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ziqiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dexian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"93_CR1","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F. Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of IEEE\u00a087, 1079\u20131107 (1999)","journal-title":"Proceedings of IEEE"},{"key":"93_CR2","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1016\/S0165-1684(03)00171-3","volume":"83","author":"A.H. Paqueta","year":"2003","unstructured":"Paqueta, A.H., Wardb, R.K., Pitas, I.: Wavelet Packets-Based Digital Watermarking for Image Verification and Authentication. Signal Processing\u00a083, 2117\u20132132 (2003)","journal-title":"Signal Processing"},{"key":"93_CR3","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/5.241504","volume":"81","author":"N.J. Jayant","year":"1993","unstructured":"Jayant, N.J., Johnston, J., Safranek, R.: Signal Compression Based on Models of the Human Perception. Proceedings of IEEE\u00a081, 1385\u20131422 (1993)","journal-title":"Proceedings of IEEE"},{"unstructured":"Moscato, P.: On Evolution, Search, Optimization, Genetic Algorithms and Martial Arts: Towards Memetic Algorithms. Technical Report, Caltech Concurrent Computation Program (1989)","key":"93_CR4"},{"key":"93_CR5","volume-title":"Adaptation in Natural and Artificial Systems","author":"J. Holland","year":"1975","unstructured":"Holland, J.: Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor (1975)"},{"key":"93_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.aei.2005.01.004","volume":"19","author":"E. Elbeltagi","year":"2005","unstructured":"Elbeltagi, E., Hegazy, T., Grierson, D.: Comparison among Five Evolutionary-Based Optimization Algorithms. Advanced Engineering Informatics\u00a019, 43\u201353 (2005)","journal-title":"Advanced Engineering Informatics"},{"key":"93_CR7","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1006\/jath.1994.1085","volume":"78","author":"J.S. Geronimo","year":"1994","unstructured":"Geronimo, J.S., Hardin, D.P., Massopust, P.R.: Fractal Functions and Wavelet Expansions Based on Several Scaling Functions. Journal of Approximation Theory\u00a078, 373\u2013401 (1994)","journal-title":"Journal of Approximation Theory"},{"key":"93_CR8","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/83.951534","volume":"10","author":"K. Attakitmongcol","year":"2001","unstructured":"Attakitmongcol, K., Hardin, D.P., Wilkes, D.M.: Multiwavelet Prefilters II: Optimal Orthogonal Prefilters. IEEE Transactions on Image Processing\u00a010, 1476\u20131487 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"93_CR9","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M. Barni","year":"2001","unstructured":"Barni, M., Bartolini, F.: Improved Wavelet-Based Watermarking through Pixel-Wise Masking. IEEE Transactions on Image Processing\u00a010, 783\u2013791 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"93_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/ic:20000214","volume-title":"2000 IEE Seminar on Secure Images and Image Authentication","author":"R. Clark","year":"2000","unstructured":"Clark, R.: An Introduction to JPEG 2000 and Watermarking. In: 2000 IEE Seminar on Secure Images and Image Authentication, pp. 3\u20136. IEEE Press, New York (2000)"},{"key":"93_CR11","first-page":"661","volume-title":"2004 International Symposium on Computer","author":"S.-L. Hsieh","year":"2004","unstructured":"Hsieh, S.-L., Huang, B.-Y.: A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation. In: 2004 International Symposium on Computer, pp. 661\u2013666. IEEE Press, New York (2004)"},{"key":"93_CR12","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/S0167-8655(02)00023-5","volume":"23","author":"C.-C. Chang","year":"2002","unstructured":"Chang, C.-C., Chung, J.-C.: An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy. Pattern Recognition Letters\u00a023, 931\u2013941 (2002)","journal-title":"Pattern Recognition Letters"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87732-5_93.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:46:30Z","timestamp":1619523990000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87732-5_93"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540877318","9783540877325"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87732-5_93","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}