{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:24:14Z","timestamp":1743013454999,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811022593"},{"type":"electronic","value":"9789811022609"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2260-9_22","type":"book-chapter","created":{"date-parts":[[2016,8,8]],"date-time":"2016-08-08T09:30:28Z","timestamp":1470648628000},"page":"192-199","source":"Crossref","is-referenced-by-count":0,"title":["A Software Watermarking Algorithm Based on the Full Array of Expression Coefficients"],"prefix":"10.1007","author":[{"given":"Cheng","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Niande","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Huiyuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,9]]},"reference":[{"issue":"2","key":"22_CR1","first-page":"268","volume":"14","author":"L Zhang","year":"2003","unstructured":"Zhang, L., Yang, Y., Niu, X.: Overview of software watermarking. Softw. J. 14(2), 268\u2013277 (2003)","journal-title":"Softw. J."},{"key":"22_CR2","unstructured":"Akito, M., Hajimu, I., Ken-ichi M., et al.: A practical method for watermarking Java programs. In: Proceedings of the 24th Computer Software and Applications Conference (2000)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Patel, S.J., Pattewar, T.M.: Software birthmark based theft detection of Java Script programs using agglomerative clustering and frequent subgraph mining. In: 2014 International Conference on Embedded Systems (ICES) (2014)","DOI":"10.1109\/EmbeddedSys.2014.6953052"},{"issue":"06","key":"22_CR4","first-page":"3189","volume":"09","author":"J Hua","year":"2009","unstructured":"Hua, J., Sha, Z., Xuan, A.: Software watermarking algorithm based on inverse number of expression. Comput. Appl. 09(06), 3189\u20133190 (2009)","journal-title":"Comput. Appl."},{"key":"22_CR5","volume-title":"Evaluation of Software Watermarking Algorithm","author":"L Zhou","year":"2010","unstructured":"Zhou, L.: Evaluation of Software Watermarking Algorithm. Jilin Universiy, Ji Lin (2010)"},{"key":"22_CR6","first-page":"378","volume-title":"Software Encryption and Decryption","author":"X Cui","year":"2012","unstructured":"Cui, X.: Software Encryption and Decryption, pp. 378\u2013488. People\u2019s Posts and Telecommunications Press, Beijing (2012)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Chan, P.P.F., Hui, L.C.K., Yiu, S.M.: Heap graph based software theft detection. In: IEEE Transactions on Information Forensics and Security (2013)","DOI":"10.1109\/TIFS.2012.2223685"},{"issue":"7","key":"22_CR8","first-page":"599","volume":"41","author":"ZY Tang","year":"2011","unstructured":"Tang, Z.Y., Fang, D.Y., Shu, L.: A tamper resistant software watermarking scheme based on code encryption. J. Univ. Sci. Technol. China 41(7), 599\u2013606 (2011)","journal-title":"J. Univ. Sci. Technol. China"},{"issue":"1","key":"22_CR9","first-page":"78","volume":"32","author":"G Ying","year":"2013","unstructured":"Ying, G., Lu, L., Wang, L.: The research and practice of computer graphics teaching reform based on algorithm demonstration and algorithm training. J. East China Inst. Technol. (Soc. Sci.) 32(1), 78\u201380 (2013)","journal-title":"J. East China Inst. Technol. (Soc. Sci.)"}],"container-title":["Communications in Computer and Information Science","Advances in Image and Graphics Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2260-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T16:11:38Z","timestamp":1498320698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2260-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811022593","9789811022609"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2260-9_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}