{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T17:42:03Z","timestamp":1694367723942},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,5,27]],"date-time":"2008-05-27T00:00:00Z","timestamp":1211846400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s00500-008-0330-z","type":"journal-article","created":{"date-parts":[[2008,5,26]],"date-time":"2008-05-26T12:13:24Z","timestamp":1211804004000},"page":"345-353","source":"Crossref","is-referenced-by-count":11,"title":["A differential evolution based algorithm for breaking the visual steganalytic system"],"prefix":"10.1007","volume":"13","author":[{"given":"Frank Y.","family":"Shih","sequence":"first","affiliation":[]},{"given":"Venkata Gopal","family":"Edupuganti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,27]]},"reference":[{"issue":"2","key":"330_CR1","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2): 221\u2013229","journal-title":"IEEE Trans Image Process"},{"key":"330_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1023\/A:1015059928466","volume":"1","author":"H Beyer","year":"2004","unstructured":"Beyer H, Schwefel H (2004) Evolution strategies\u2014a comprehensive introduction. Nat Comput 1: 3\u201352","journal-title":"Nat Comput"},{"issue":"3","key":"330_CR3","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s11265-007-0095-0","volume":"49","author":"FC Chang","year":"2007","unstructured":"Chang FC, Huang HC, Hang HM (2007) Layered access control schemes on watermarked scalable media. J VLSI Signal Process Syst Signal Image Video Technol 49(3): 443\u2013455","journal-title":"J VLSI Signal Process Syst Signal Image Video Technol"},{"key":"330_CR4","volume-title":"Digital watermarking: principles & practice","author":"IJ Cox","year":"2001","unstructured":"Cox IJ, Miller M, Bloom J (2001) Digital watermarking: principles & practice. Morgan Kaufmann, Menlo Park"},{"key":"330_CR5","unstructured":"Fridrich J, Goljan M, Hogea D (2003) New methodology for breaking steganographic techniques for JPEGs. In: Proc. of SPIE Electronic Imaging, Santa Clara, CA, pp 143\u2013155"},{"key":"330_CR6","volume-title":"Adaptation in natural and artificial systems","author":"JH Holland","year":"1975","unstructured":"Holland JH (1975) Adaptation in natural and artificial systems. The University of Michigan Press, Ann Arbor"},{"issue":"1","key":"330_CR7","first-page":"53","volume":"12","author":"D Karboga","year":"2004","unstructured":"Karboga D, Okdem S (2004) A simple and global optimization algorithm for engineering problems: differential evolution algorithm. Turk J Electr Eng Comput Sci 12(1): 53\u201360","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"3","key":"330_CR8","first-page":"1","volume":"6","author":"GC Kessler","year":"2004","unstructured":"Kessler GC (2004) An overview of steganography for the computer forensics examiner. Forensic Sci Commun 6(3): 1\u201329","journal-title":"Forensic Sci Commun"},{"key":"330_CR9","volume-title":"Intelligent watermarking techniques","year":"2004","unstructured":"Pan JS, Huang HC, Jain LC (eds) (2004) Intelligent watermarking techniques. World Scientific Publishing Company, Singapore"},{"key":"330_CR10","volume-title":"Differential evolution: a practical approach to global optimization","author":"K Price","year":"2005","unstructured":"Price K, Storn R, Lampinen J (2005) Differential evolution: a practical approach to global optimization. Springer, Berlin"},{"issue":"3","key":"330_CR11","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv Mag 1(3): 32\u201344","journal-title":"IEEE Secur Priv Mag"},{"issue":"3","key":"330_CR12","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","volume":"37","author":"CS Shieh","year":"2004","unstructured":"Shieh CS, Huang HC, Wang FH, Pan JS (2004) Genetic watermarking based on transform domain techniques. Pattern Recognit 37(3): 555\u2013565","journal-title":"Pattern Recognit"},{"key":"330_CR13","volume-title":"Digital watermarking and steganography: fundamentals and techniques","author":"FY Shih","year":"2007","unstructured":"Shih FY (2007) Digital watermarking and steganography: fundamentals and techniques. CRC Press, Boca Raton"},{"key":"330_CR14","volume-title":"Disappearing cryptography: information hiding: steganography and watermarking, 2nd edn","author":"P Wayner","year":"2002","unstructured":"Wayner P (2002) Disappearing cryptography: information hiding: steganography and watermarking, 2nd edn. Morgan Kaufmann, San Francisco"},{"key":"330_CR15","doi-asserted-by":"crossref","unstructured":"Westfeld A, Pfitzmann A (1999a) Attacks on steganographic systems breaking the steganographic utilities Ezstego, Jsteg, Steganos and S-tools and some lessons learned. In: Proc. of Third Intl. Workshop on Information Hiding, Dresden, Germany, pp 61\u201376","DOI":"10.1007\/10719724_5"},{"key":"330_CR16","doi-asserted-by":"crossref","unstructured":"Westfeld A, Pfitzmann A (1999b) Attacks on steganographic systems. In: Proc. of Third Intl. Workshop on Information Hiding, Lecture Notes in Computer Science. Springer, Berlin, vol 1768, pp 61\u201376","DOI":"10.1007\/10719724_5"},{"issue":"1","key":"330_CR17","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/TSMCB.2005.852474","volume":"36","author":"Y Wu","year":"2006","unstructured":"Wu Y, Shih FY (2006) Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans Syst Man Cybern 36(1): 24\u201329","journal-title":"IEEE Trans Syst Man Cybern"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-008-0330-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-008-0330-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-008-0330-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T01:39:54Z","timestamp":1559093994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-008-0330-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,27]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["330"],"URL":"https:\/\/doi.org\/10.1007\/s00500-008-0330-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,5,27]]}}}