{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:32:56Z","timestamp":1761708776810,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642285790"},{"type":"electronic","value":"9783642285806"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-28580-6_7","type":"book-chapter","created":{"date-parts":[[2012,7,28]],"date-time":"2012-07-28T06:51:13Z","timestamp":1343458273000},"page":"139-153","source":"Crossref","is-referenced-by-count":2,"title":["Application of Genetic-Based Wavelet Packet Watermarking for Copyright Protection"],"prefix":"10.1007","author":[{"given":"Hsiang-Cheh","family":"Huang","sequence":"first","affiliation":[]},{"given":"Yueh-Hong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jnca.2009.11.001","volume":"33","author":"E. Moschetta","year":"2010","unstructured":"Moschetta, E., Antunes, R.S., Barcellos, M.P.: Flexible and secure service discovery in ubiquitous computing. Journal of Network and Computer Applications\u00a033, 128\u2013140 (2010)","journal-title":"Journal of Network and Computer Applications"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding \u2014 A Survey. Proceedings of the IEEE\u00a087, 1062\u20131078 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s11235-009-9262-x","volume":"44","author":"H.C. Huang","year":"2010","unstructured":"Huang, H.C., Fang, W.C.: Techniques and applications of intelligent multimedia data hiding. Telecommunication Systems\u00a044, 241\u2013251 (2010)","journal-title":"Telecommunication Systems"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Nikolaidis, N., Pitas, I.: Copyright protection of images using robust digital signatures. In: IEEE Int\u2019l. Conf. on Acoustics, Speech, and Signal Processing, pp. 2168\u20132171 (1996)","DOI":"10.1109\/ICASSP.1996.545849"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"2718","DOI":"10.1109\/TIP.2009.2028367","volume":"18","author":"B. Oztan","year":"2009","unstructured":"Oztan, B., Sharma, G.: Continuous phase-modulated halftones. IEEE Trans. Image Processing\u00a018, 2718\u20132734 (2009)","journal-title":"IEEE Trans. Image Processing"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1049\/el:20046454","volume":"40","author":"J.S. Pan","year":"2004","unstructured":"Pan, J.S., Hsin, Y.C., Huang, H.C., Huang, K.C.: Robust image watermarking based on multiple description vector quantisation. Electronics Letters\u00a040, 1409\u20131410 (2004)","journal-title":"Electronics Letters"},{"key":"7_CR7","first-page":"381","volume":"19","author":"C.S. Shieh","year":"2003","unstructured":"Shieh, C.S., Huang, H.C., Wang, F.H., Pan, J.S.: An embedding algorithm for multiple watermarks. Journal of Information Science and Engineering\u00a019, 381\u2013395 (2003)","journal-title":"Journal of Information Science and Engineering"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s00034-006-0104-z","volume":"26","author":"H.C. Huang","year":"2007","unstructured":"Huang, H.C., Pan, J.S., Huang, Y.H., Wang, F.H., Huang, K.C.: Progressive watermarking techniques using genetic algorithms. Circuits, Systems, and Signal Processing\u00a026, 671\u2013687 (2007)","journal-title":"Circuits, Systems, and Signal Processing"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s00034-008-9025-z","volume":"27","author":"S.C. Chu","year":"2008","unstructured":"Chu, S.C., Huang, H.C., Shi, Y., Wu, S.Y., Shieh, C.S.: Genetic watermarking for zerotree-based applications. Circuits, Systems, and Signal Processing\u00a027, 171\u2013182 (2008)","journal-title":"Circuits, Systems, and Signal Processing"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s00500-008-0333-9","volume":"13","author":"H.C. Huang","year":"2009","unstructured":"Huang, H.C., Chu, C.M., Pan, J.S.: The optimized copyright protection system with genetic watermarking. Soft Computing\u00a013, 333\u2013343 (2009)","journal-title":"Soft Computing"},{"key":"7_CR11","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley Professional, Boston (1989)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"\u00d3 Ruanaidh, J.J.K., Dowling W.J., Boland F.M.: Phase watermarking of digital images. In: Proc. Int\u2019l Conf. on Image Processing, 239\u2013242 (1996)","DOI":"10.1049\/ip-vis:19960711"},{"key":"7_CR13","first-page":"435","volume":"18","author":"H.C. Huang","year":"2010","unstructured":"Huang, H.C., Fang, W.C.: Metadata-based image watermarking for copyright protection. Simulation Modelling Practice and Theory\u00a018, 435\u2013445 (2010)","journal-title":"Simulation Modelling Practice and Theory"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"1782","DOI":"10.1109\/TIP.2009.2021313","volume":"18","author":"S.M.M. Rahman","year":"2009","unstructured":"Rahman, S.M.M., Ahmad, M.O., Swamy, M.N.S.: A new statistical detector for dwt-based additive image watermarking using the Gauss-Hermite expansion. IEEE Trans. Image Processing\u00a018, 1782\u20131796 (2009)","journal-title":"IEEE Trans. Image Processing"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1109\/18.119732","volume":"38","author":"R.R. Coifman","year":"1992","unstructured":"Coifman, R.R., Wickerhauser, M.V.: Entropy-based algorithms for best basis selection. IEEE Trans. Information Theory\u00a038, 713\u2013718 (1992)","journal-title":"IEEE Trans. Information Theory"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"L\u00e9vy V\u00e9hel, J., Manoury, A.: Wavelet packet based digital watermarking. In: Proc. Int\u2019l. Conf. Pattern Recognition, pp. 413\u2013416 (2000)","DOI":"10.1109\/ICPR.2000.903572"},{"key":"7_CR17","volume-title":"Fundamentals of Multimedia","author":"Z.N. Li","year":"2003","unstructured":"Li, Z.N., Drew, M.S.: Fundamentals of Multimedia. Prentice-Hall, Upper Saddle River (2003)"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/TSP.2008.2007922","volume":"57","author":"T. Weickert","year":"2009","unstructured":"Weickert, T., Benjaminsen, C., Kiencke, U.: Analytic wavelet packets combining the dual-tree approach with wavelet packets for signal analysis and filtering. IEEE Trans. Signal Processing\u00a057, 493\u2013502 (2009)","journal-title":"IEEE Trans. Signal Processing"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-45184-6_18","volume-title":"Communications and Multimedia Security. Advanced Techniques for Network and Data Protection","author":"W. Dietl","year":"2003","unstructured":"Dietl, W., Uhl, A.: Watermark Security via Secret Wavelet Packet Subband Structures. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol.\u00a02828, pp. 214\u2013225. Springer, Heidelberg (2003)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Schwindt, S., Amornraksa, T.: Performance comparison of zerotrees based digital watermarking. In: Proc. IEEE Int\u2019l Conf. on Industrial Technology, pp. 78\u201381 (2002)","DOI":"10.1109\/ICIT.2002.1189866"},{"key":"7_CR21","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1090.001.0001","volume-title":"Adaptation in Natural and Artificial Systems","author":"J.H. Holland","year":"1992","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems. The MIT Press, Cambridge (1992)"},{"key":"7_CR22","unstructured":"Chen, Y.H., Su, J.M., Huang, H.C., Fu, H.C., Pao, H.T.: Adaptive watermarking using relationships between wavelet coefficients. In: Proc. IEEE Int\u2019l Symp. on Circuits and Systems, pp. 4979\u20134982 (2005)"}],"container-title":["Intelligent Systems Reference Library","Recent Advances in Information Hiding and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28580-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T17:00:42Z","timestamp":1743872442000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28580-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642285790","9783642285806"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28580-6_7","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2013]]}}}