{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:51:29Z","timestamp":1761947489986},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,5,31]],"date-time":"2008-05-31T00:00:00Z","timestamp":1212192000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s00500-008-0329-5","type":"journal-article","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T06:59:24Z","timestamp":1212130764000},"page":"361-373","source":"Crossref","is-referenced-by-count":21,"title":["Genetic algorithms for optimality of data hiding in digital images"],"prefix":"10.1007","volume":"13","author":[{"given":"Santi P.","family":"Maity","sequence":"first","affiliation":[]},{"given":"Malay K.","family":"Kundu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,31]]},"reference":[{"key":"329_CR1","doi-asserted-by":"crossref","unstructured":"Cachin C (1998) An information theoretic model for steganography. In: Proceedings of 2nd workshop on information hiding. Aucsmith D (eds) Lecture Notes in Computer Sciences, Springer, Heidelberg, p 1525","DOI":"10.1007\/3-540-49380-8_21"},{"key":"329_CR2","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1049\/el:20010714","volume":"37","author":"CK Chan","year":"2001","unstructured":"Chan CK, Cheng LM (2001) Improved hiding data in images by optimal moderately significant-bit replacement. IEE Electron Lett 37: 1017\u20131018","journal-title":"IEE Electron Lett"},{"key":"329_CR3","unstructured":"Chang CC, Lin IC (2004) Robust image watermarking system using neural network, intelligent watermarking techniques. World Scientific, Singapore, pp 395\u2013427"},{"key":"329_CR4","unstructured":"Chang CC, Lin IC (2004) A perceptually tuned watermarking scheme for digital images using supprot vector machines, intelligent watermarking techniques. World Scientific, Singapore, pp 429\u2013457"},{"key":"329_CR5","unstructured":"Farid H (2001) Detecting Steganographic Message in Digital Images, Dartmouth College, Computer Science, (TR2001, 2001)"},{"key":"329_CR6","volume-title":"Genetic algorithms: Search, optimization and machine learning","author":"D Goldberg","year":"1989","unstructured":"Goldberg D (1989) Genetic algorithms: Search, optimization and machine learning. Addison-Wesley, Reading"},{"key":"329_CR7","volume-title":"Coding and information theory","author":"RH Hamming","year":"1980","unstructured":"Hamming RH (1980) Coding and information theory. Prentice-Hall, Inc., Englewood Cliffs"},{"key":"329_CR8","first-page":"58","volume":"8","author":"H-C Huang","year":"2007","unstructured":"Huang H-C, Pan JS, Huang YH, Huang K-C (2007) Progressive watermarking techniques using genetic algorithms. Circ Syst Signal Process 8: 58\u201368","journal-title":"Circ Syst Signal Process"},{"key":"329_CR9","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1117\/1.1289357","volume":"9","author":"MS Hwang","year":"2000","unstructured":"Hwang MS, Chang CC, Hwang KF (2000) Digital watermarking of images using neural networks. J Electron Imgag 9: 548\u2013555","journal-title":"J Electron Imgag"},{"key":"329_CR10","unstructured":"Kundur D (1999) Multiresolution digital watermarking: algorithms and implications for multimedia signals. PhD Thesis, Department of Electrical and Computer Engineering, University of Toronto, Canada"},{"key":"329_CR11","doi-asserted-by":"crossref","unstructured":"Maity SP, Kundu MK, Nandi PK (2004) Genetic algorithm for optimal imperceptibility in image communication through noisy channel. 11th international conference on neural information processing ICONIP 2004, (LNCS, Springer, 2004) 700\u2013705","DOI":"10.1007\/978-3-540-30499-9_107"},{"key":"329_CR12","unstructured":"Maity SP, Nandi PK, Kundu MK (2007) Genetic Algorithm for improvement in detection of hidden data in digital images. In: 6th international conference on advances in pattern recognition. World Scientific, Singapore, pp 164\u2013169"},{"key":"329_CR13","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/0167-8655(94)90058-2","volume":"15","author":"SK Pal","year":"1994","unstructured":"Pal SK, Bhandari D, Kundu MK (1994) Genetic algorithms for image enhancement. Pattern Recogn Lett 15: 261\u2013271","journal-title":"Pattern Recogn Lett"},{"key":"329_CR14","doi-asserted-by":"crossref","unstructured":"Pal SK, Ghosh A, Kundu MK (eds) (2000) Soft computing for image processing. Physica, Heidelberg","DOI":"10.1007\/978-3-7908-1858-1"},{"key":"329_CR15","doi-asserted-by":"crossref","unstructured":"Pan JS, Huang HC, Jain LC (eds) (2004) Intelligent watermarking techniques. World Scientific, Singapore","DOI":"10.1142\/5471"},{"key":"329_CR16","first-page":"1839","volume":"E-87","author":"JS Pan","year":"2004","unstructured":"Pan JS, Sung MT, Huang H-C, Liao BY (2004) Robust VQ-based digital watermarking for the memoryless binary symmetric channel. IEICE Trans Fundam Electron Commun Comput Sci E-87: 1839\u20131841","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"329_CR17","doi-asserted-by":"crossref","unstructured":"Pan JS, Huang H-C, Jain LC, Fang WC (eds) (2007) Intelligent multimedia data hiding: new directions. Springer, Berlin","DOI":"10.1007\/978-3-540-71169-8"},{"key":"329_CR18","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","volume":"37","author":"CS Shieh","year":"2004","unstructured":"Shieh CS, Huang H-C, Wang FH, Pan JS (2004) Genetic watermarking based on transform domain techniques. Pattern Recogn 37: 555\u2013565","journal-title":"Pattern Recogn"},{"key":"329_CR19","unstructured":"Special issue on copyright and privacy protection (1998) IEEE J Select Areas Commun (JSCA) 16"},{"key":"329_CR20","doi-asserted-by":"crossref","unstructured":"Special issue on enabling security technologies for digital right management (2004) Proc IEEE 92","DOI":"10.1109\/JPROC.2004.827336"},{"key":"329_CR21","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/5.982406","volume":"90","author":"CD Vleeschouwer","year":"2002","unstructured":"Vleeschouwer CD, Delaigle JF, Macq B (2002) Invisibility and application functionalities in perceptual watermarking\u2014an overview. Proc IEEE 90: 64\u201377","journal-title":"Proc IEEE"},{"key":"329_CR22","doi-asserted-by":"crossref","first-page":"2069","DOI":"10.1049\/el:20001429","volume":"36","author":"RZ Wang","year":"2000","unstructured":"Wang RZ, Lin CF, Lin JC (2000) Hiding data in images by optimal moderately significant-bit replacement. IEE Electron Lett 36: 2069\u20132070","journal-title":"IEE Electron Lett"},{"key":"329_CR23","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"RZ Wang","year":"2001","unstructured":"Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn Lett 34: 671\u2013683","journal-title":"Pattern Recogn Lett"},{"key":"329_CR24","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1142\/9789812562524_0013","volume-title":"Genetic watermarking on spatial domain, intelligent watermarking techniques","author":"FH Wang","year":"2004","unstructured":"Wang FH, Jain LC, Pan JS (2004) Genetic watermarking on spatial domain, intelligent watermarking techniques. World Scientific, Singapore, pp 377\u2013393"},{"key":"329_CR25","volume-title":"Multimedia data hiding","author":"M Wu","year":"2002","unstructured":"Wu M, Liu B (2002) Multimedia data hiding. Springer, NewYork"},{"key":"329_CR26","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1016\/S0165-1684(00)00239-5","volume":"81","author":"PT Yu","year":"2001","unstructured":"Yu PT, Tsai HH, Lin JS (2001) Digital watermarking based on neural networks for color images. Signal process 81: 663\u2013671","journal-title":"Signal process"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-008-0329-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-008-0329-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-008-0329-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T21:39:54Z","timestamp":1559079594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-008-0329-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,31]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["329"],"URL":"https:\/\/doi.org\/10.1007\/s00500-008-0329-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,5,31]]}}}