{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:48:00Z","timestamp":1742939280109,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064296"},{"type":"electronic","value":"9789811064302"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6430-2_45","type":"book-chapter","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T15:29:35Z","timestamp":1506353375000},"page":"577-584","source":"Crossref","is-referenced-by-count":2,"title":["A Spatial Domain Image Authentication Technique Using Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Amrita","family":"Khamrui","sequence":"first","affiliation":[]},{"given":"Diotima Dutta","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"S.","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"S.","family":"Nandy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,26]]},"reference":[{"key":"45_CR1","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1016\/j.procs.2015.08.168","volume":"60","author":"R Roy","year":"2015","unstructured":"Roy, R., et al.: Optimization of stego image retaining information using genetic algorithm with 8-connected PSNR. Procedia Comput. Sci. 60, 468\u2013477 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"12","key":"45_CR2","doi-asserted-by":"publisher","first-page":"2324","DOI":"10.1016\/j.sigpro.2009.02.001","volume":"89","author":"A Cheddad","year":"2009","unstructured":"Cheddad, A., et al.: A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 89(12), 2324\u20132332 (2009)","journal-title":"Signal Process."},{"issue":"1","key":"45_CR3","first-page":"28","volume":"1","author":"S Wang","year":"2010","unstructured":"Wang, S., et al.: A secure steganography method based on genetic algorithm. J. Inf. Hiding Multimed. Signal Process. 1(1), 28\u201335 (2010). ISSN 2073-421","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"45_CR4","unstructured":"Begum, R., et al.: Best approach for LSB based steganography using genetic algorithm and visual cryptography for secured data hiding and transmission over networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(6) (2014)"},{"issue":"15","key":"45_CR5","doi-asserted-by":"publisher","first-page":"3099","DOI":"10.1016\/j.ins.2007.02.008","volume":"177","author":"X Li","year":"2007","unstructured":"Li, X., et al.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177(15), 3099\u20133109 (2007)","journal-title":"Inf. Sci."},{"key":"45_CR6","doi-asserted-by":"publisher","unstructured":"Fard, M.A., et al.: A new genetic algorithm approach for secure JPEG steganography. In: IEEE International Conference Engineering of Intelligent Systems (2006). doi:\n10.1109\/ICEIS.2006.1703168","DOI":"10.1109\/ICEIS.2006.1703168"},{"issue":"10","key":"45_CR7","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","volume":"41","author":"CC Chang","year":"2008","unstructured":"Chang, C.C., et al.: Sharing secrets in stego image with authentication. Sci. Direct Pattern Recogn. 41(10), 3130\u20133137 (2008)","journal-title":"Sci. Direct Pattern Recogn."},{"issue":"25","key":"45_CR8","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1049\/el:20001429","volume":"36","author":"RZ Wang","year":"2000","unstructured":"Wang, R.Z., et al.: Hiding data in images by optimal moderately significant bit-replacement. IEEE Electron. Lett. 36(25), 2069\u20132070 (2000)","journal-title":"IEEE Electron. Lett."},{"key":"45_CR9","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"RZ Wang","year":"2001","unstructured":"Wang, R.Z., et al.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34, 671\u2013683 (2001)","journal-title":"Pattern Recogn."},{"issue":"4","key":"45_CR10","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1179\/136821910X12651933390584","volume":"54","author":"KH Jung","year":"2010","unstructured":"Jung, K.H.: High-capacity steganographic method based on pixel value differencing and LSB replacement methods. Imaging Sci. J. 54(4), 213\u2013221 (2010)","journal-title":"Imaging Sci. J."},{"key":"45_CR11","isbn-type":"print","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison Wesley, Boston (1989). ISBN 0-201-15767-5","ISBN":"https:\/\/id.crossref.org\/isbn\/0201157675"},{"key":"45_CR12","isbn-type":"print","volume-title":"Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence","author":"JH Holland","year":"1998","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence. MIT Press, Cambridge (1998). (NB original printing 1975). ISBN 0-262-58111-6","ISBN":"https:\/\/id.crossref.org\/isbn\/0262581116"},{"key":"45_CR13","doi-asserted-by":"publisher","first-page":"1964","DOI":"10.1080\/00949655.2017.1300663","volume":"87","author":"T Vo-Van","year":"2017","unstructured":"Vo-Van, T., et al.: Modified genetic algorithm-based clustering for probability density functions. J. Stat. Comput. Simul. 87, 1964\u20131979 (2017)","journal-title":"J. Stat. Comput. Simul."},{"key":"45_CR14","doi-asserted-by":"publisher","unstructured":"Jiang, N., Zhao, N., Wang, L.: Int. J. Theor. Phys. 55: 107 (2016). doi:\n10.1007\/s10773-015-2640-0","DOI":"10.1007\/s10773-015-2640-0"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6430-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T01:41:21Z","timestamp":1517190081000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6430-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064296","9789811064302"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6430-2_45","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}