{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T02:27:21Z","timestamp":1676773641551},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,6,4]],"date-time":"2008-06-04T00:00:00Z","timestamp":1212537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s00500-008-0326-8","type":"journal-article","created":{"date-parts":[[2008,6,3]],"date-time":"2008-06-03T08:05:47Z","timestamp":1212480347000},"page":"383-391","source":"Crossref","is-referenced-by-count":32,"title":["Genetic fingerprinting for copyright protection of multicast media"],"prefix":"10.1007","volume":"13","author":[{"given":"Hsiang-Cheh","family":"Huang","sequence":"first","affiliation":[]},{"given":"Yueh-Hong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,6,4]]},"reference":[{"key":"326_CR1","unstructured":"Bloom JA (2003) Security and rights management in digital cinema. In: 2003 International conference on multimedia and expo, pp 621\u2013624"},{"key":"326_CR2","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D Boneh","year":"1998","unstructured":"Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44: 1897\u20131905","journal-title":"IEEE Trans Inf Theory"},{"key":"326_CR3","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s11265-007-0095-0","volume":"49","author":"F-C Chang","year":"2007","unstructured":"Chang F-C, Huang H-C, Hang H-M (2007) Layered access control schemes on watermarked scalable media. J VLSI Signal Process Syst Signal Image Video Technol 49: 443\u2013455","journal-title":"J VLSI Signal Process Syst Signal Image Video Technol"},{"key":"326_CR4","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/568567.568570","volume":"32","author":"HH Chu","year":"2002","unstructured":"Chu HH, Qiao L, Nahrstedt K (2002) A secure multicast protocol with copyright protection. ACM Comput Commun Rev 32: 42\u201360","journal-title":"ACM Comput Commun Rev"},{"key":"326_CR5","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1023\/A:1016695006342","volume":"17","author":"JC-I Chuang","year":"2001","unstructured":"Chuang JC-I, Sirbu MA (2001) Pricing multicast communication: a cost-based approach. Telecommun Syst 17: 281\u2013297","journal-title":"Telecommun Syst"},{"key":"326_CR6","volume-title":"Digital watermarking: principles & practice","author":"IJ Cox","year":"2001","unstructured":"Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking: principles & practice. Morgan Kaufman, Los Altos"},{"key":"326_CR7","volume-title":"Genetic algorithms and engineering design","author":"M Gen","year":"1997","unstructured":"Gen M, Cheng R (1997) Genetic algorithms and engineering design. Wiley, New York"},{"key":"326_CR8","volume-title":"Genetic algorithms in search, optimization, and machine learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg DE (1989) Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, Reading"},{"key":"326_CR9","doi-asserted-by":"crossref","unstructured":"Hartung F, Girod B (1997) Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain. In: 1997 IEEE international conference on acoustics, speech, and signal processing, pp 2621\u20132624","DOI":"10.1109\/ICASSP.1997.595326"},{"key":"326_CR10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1090.001.0001","volume-title":"Adaptation in natural and artificial systems","author":"JH Holland","year":"1992","unstructured":"Holland JH (1992) Adaptation in natural and artificial systems. The MIT Press, Cambridge"},{"key":"326_CR11","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1007\/s00034-006-0104-z","volume":"26","author":"H-C Huang","year":"2007","unstructured":"Huang H-C, Pan JS, Huang YH, Wang FH, Huang K-C (2007) Progressive watermarking techniques using genetic algorithms. Circuits Syst Signal Process 26: 671\u2013687","journal-title":"Circuits Syst Signal Process"},{"key":"326_CR12","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1016\/S1389-1286(02)00227-X","volume":"39","author":"P Judge","year":"2002","unstructured":"Judge P, Ammar M (2002) WHIM: watermarking multicast video with a hierarchy of intermediaries. Comput Netw 39: 699\u2013712","journal-title":"Comput Netw"},{"key":"326_CR13","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","volume":"92","author":"D Kunder","year":"2004","unstructured":"Kunder D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92: 918\u2013932","journal-title":"Proc IEEE"},{"key":"326_CR14","volume-title":"Digital media fingerprinting: techniques and trends, Chap. 19, Multimedia Security Handbook","author":"W Luh","year":"2004","unstructured":"Luh W, Kundur D (2004) Digital media fingerprinting: techniques and trends, Chap. 19, Multimedia Security Handbook. CRC, Boca Raton"},{"key":"326_CR15","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1109\/5.387094","volume":"83","author":"BM Macq","year":"1995","unstructured":"Macq BM, Quisquater J-J (1995) Cryptology for digital TV broadcasting. Proc IEEE 83: 944\u2013957","journal-title":"Proc IEEE"},{"key":"326_CR16","volume-title":"Intelligent watermarking techniques","year":"2004","unstructured":"Pan, JS, Huang, H-C, Jain, LC (eds) (2004) Intelligent watermarking techniques. World Scientific Publishing Company, Singapore"},{"key":"326_CR17","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.1049\/el:20046454","volume":"40","author":"JS Pan","year":"2004","unstructured":"Pan JS, Hsin YC, Huang H-C, Huang KC (2004) Robust image watermarking based on multiple description vector quantisation. Electron Lett 40: 1409\u20131410","journal-title":"Electron Lett"},{"key":"326_CR18","first-page":"1839","volume":"E-87","author":"JS Pan","year":"2004","unstructured":"Pan JS, Sung MT, Huang H-C, Liao BY (2004) Robust VQ-based digital watermarking for the memoryless binary symmetric channel. IEICE Trans Fund Electron Commun Comput Sci E-87: 1839\u20131841","journal-title":"IEICE Trans Fund Electron Commun Comput Sci"},{"key":"326_CR19","volume-title":"Intelligent multimedia data hiding","year":"2007","unstructured":"Pan, JS, Huang, H-C, Jain, LC, Fang, WC (eds) (2007) Intelligent multimedia data hiding. Springer, Berlin"},{"key":"326_CR20","doi-asserted-by":"crossref","unstructured":"Parviainen R, Parnes P (2001) Large scale distributed watermarking of multicast media through encryption. In: IFIP conference proceedings on communications and multimedia security, pp 149\u2013158","DOI":"10.1007\/978-0-387-35413-2_14"},{"key":"326_CR21","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","volume":"37","author":"CS Shieh","year":"2004","unstructured":"Shieh CS, Huang H-C, Wang FH, Pan JS (2004) Genetic watermarking based on transform domain techniques. Pattern Recognit 37: 555\u2013565","journal-title":"Pattern Recognit"},{"key":"326_CR22","doi-asserted-by":"crossref","unstructured":"Thanos D (2001) COiN-Video: a model for the dissemination of copyrighted video streams over open networks. In: 4th International workshop on information hiding, pp 169\u2013184","DOI":"10.1007\/3-540-45496-9_13"},{"key":"326_CR23","unstructured":"Wu T-L, Wu SF (1997) Selective encryption and watermarking of MPEG video. In: International conference on image science, systems and technology, pp 261\u2013269"},{"key":"326_CR24","unstructured":"Zhao H, Liu KJR (2004) Bandwidth efficient fingerprint multicast for video streaming. In: 2004 IEEE international conference on acoustics, speech, and signal processing, pp 849\u2013852"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-008-0326-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-008-0326-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-008-0326-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T21:39:54Z","timestamp":1559079594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-008-0326-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,4]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["326"],"URL":"https:\/\/doi.org\/10.1007\/s00500-008-0326-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6,4]]}}}