{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:39:08Z","timestamp":1743093548523,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_23","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"294-307","source":"Crossref","is-referenced-by-count":4,"title":["GA-Based Robustness Evaluation Method for Digital Image Watermarking"],"prefix":"10.1007","author":[{"given":"G.","family":"Boato","sequence":"first","affiliation":[]},{"given":"V.","family":"Conotter","sequence":"additional","affiliation":[]},{"given":"F. G. B.","family":"De Natale","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing\u00a06, 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"key":"23_CR2","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Academic Press, London (2002)"},{"key":"23_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0951-6","volume-title":"Informed Watermarking","author":"J. Eggers","year":"2002","unstructured":"Eggers, J., Girod, B.: Informed Watermarking. Kluwer Academic Publishers, Norwell (2002)"},{"doi-asserted-by":"crossref","unstructured":"Barni, M., Bartolini, F.: Watermarking Systems Engineering. Enabling Digital Assets Security and Other Applications. Signal Processing and Communications Series (2004)","key":"23_CR4","DOI":"10.1201\/9780203913512"},{"unstructured":"http:\/\/www.petitcolas.net\/fabien\/watermarking\/stirmark\/","key":"23_CR5"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/S0165-1684(01)00039-1","volume":"81","author":"S. Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack Modelling: Towards a Second Generation Watermarking Benchmark. Signal Processing\u00a081, 1177\u20131214 (2001)","journal-title":"Signal Processing"},{"doi-asserted-by":"crossref","unstructured":"Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second Generation Benchmarking and Application Oriented Evaluation. In: Proceedings of the International Workshop on Information Hiding, pp. 340\u2013353 (2001)","key":"23_CR7","DOI":"10.1007\/3-540-45496-9_25"},{"unstructured":"http:\/\/watermarking.unige.ch\/Checkmark\/","key":"23_CR8"},{"unstructured":"http:\/\/www.certimark.org\/","key":"23_CR9"},{"key":"23_CR10","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"D.E. Goldberg","year":"1999","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley, Reading (1999)"},{"unstructured":"Tsoy, Y.R.: The Influence of Population Size and Search Time Limit on Genetic Algorithm. In: Proceedings of the 7th Korea-Russia International Symposium on Science and Technology, vol.\u00a03, pp. 181\u2013187 (2003)","key":"23_CR11"},{"doi-asserted-by":"crossref","unstructured":"Maity, S.P., Kundu, M.K., Nandi, P.K.: Genetic Algorithm for Optimal Imperceptibility in Image Communication through Noisy Channel. In: Proceedings of the International Conference on Neural Information Processing, pp. 700\u2013705 (2004)","key":"23_CR12","DOI":"10.1007\/978-3-540-30499-9_107"},{"doi-asserted-by":"crossref","unstructured":"Huang, C.H., Wu, J.L.: A watermark optimization technique based on genetic algorithms. In: Proceeding of SPIE - Visual Communications Image Processing, pp. 516\u2013523 (2000)","key":"23_CR13","DOI":"10.1117\/12.385007"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","volume":"37","author":"C.S. Shieh","year":"2004","unstructured":"Shieh, C.S., Huang, H.C., Wang, F.H., Pan, J.S.: Genetic watermarking based on transform-domain techniques. PElsevier Science Pattern Recognition\u00a037, 555\u2013565 (2004)","journal-title":"PElsevier Science Pattern Recognition"},{"unstructured":"Chang, Y.-L., Sun, K.-T., Chen, Y.-H.: ART2-Based Genetic Watermarking. In: Proceedings of the International Conference on Advanced Information Networking and Applications, pp. 729\u2013734 (2005)","key":"23_CR15"},{"unstructured":"Kumsawat, P., Attakitmongcol, K., Srikaew, A.: A New Approach for Optimization in Wavelet-based Image Watermarking by using Genetic Algorithm. In: Proceedings of the International Conference on Artificial Intelligence and Applications, pp. 328\u2013332 (2005)","key":"23_CR16"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"4707","DOI":"10.1109\/TSP.2005.859323","volume":"53","author":"P. Kumsawat","year":"2005","unstructured":"Kumsawat, P., Attakitmongcol, K., Srikaew, A.: A New Approach for Optimization in Image Watermarking by using Genetic Algorithm. IEEE Transactions on Image Processing\u00a053, 4707\u20134719 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/TSMCB.2005.852474","volume":"36","author":"Y.-T. Wu","year":"2006","unstructured":"Wu, Y.-T., Shih, F.Y.: Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Transactions on Systems, Man, and Cybernetics\u00a036, 24\u201331 (2006)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"23_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02238-8","volume-title":"Modern Image Quality Assessment","author":"Z. Wang","year":"2006","unstructured":"Wang, Z., Bovik, A.C.: Modern Image Quality Assessment. Morgan & Claypool, San Francisco (2006)"},{"doi-asserted-by":"crossref","unstructured":"Voloshynovskiy, S., Herrigel, A., Baumgaertner, N., Pun, T.: A Stochastic Approach to Content Adaptive Digital Image Watermarking. In: Proceedings of the International Workshop on Information Hiding, pp. 211\u2013236 (1999)","key":"23_CR20","DOI":"10.1007\/10719724_16"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M. Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., Piva, A.: Improved Wavelet-Based Watermarking Through Pixel-Wise Masking. IEEE Transactions on Image Processing\u00a010, 783\u2013791 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/TSP.2004.839921","volume":"53","author":"J. Tzeng","year":"2005","unstructured":"Tzeng, J., Hwang, W.-L., Chern, I.-L.: An asymmetric subspace watermarking method for copyright protection. IEEE Transactions on Signal Processing\u00a053, 784\u2013792 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1109\/TSP.2006.874411","volume":"54","author":"G. Boato","year":"2006","unstructured":"Boato, G., De Natale, F.G.B., Fontanari, C.: An Improved Asymmetric Watermarking Scheme Suitable for Copy Protection. IEEE Transactions on Signal Processing\u00a054, 2833\u20132834 (2006)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TMM.2007.893335","volume":"9","author":"G. Boato","year":"2007","unstructured":"Boato, G., De Natale, F.G.B., Fontanari, C.: Digital Image Tracing by Sequential Multiple Watermarking. IEEE Transactions on Multimedia\u00a09, 677\u2013686 (2007)","journal-title":"IEEE Transactions on Multimedia"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T23:37:46Z","timestamp":1684798666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}