{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T09:16:19Z","timestamp":1773566179948,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,12,11]],"date-time":"2014-12-11T00:00:00Z","timestamp":1418256000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11235-014-9928-x","type":"journal-article","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T22:28:59Z","timestamp":1418250539000},"page":"143-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["High security self-encoded spread spectrum watermarking using genetic algorithms"],"prefix":"10.1007","volume":"60","author":[{"given":"Kun","family":"Hua","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,11]]},"reference":[{"key":"9928_CR1","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Ray, P., Maity, S. P., & Rahaman, H. (2009). Spread spectrum image watermarking with digital deisign. IEEE International Advance Computing Conference 2009, Patiala, India.","DOI":"10.1109\/IADCC.2009.4809129"},{"key":"9928_CR2","unstructured":"Asghari, V. R., & Ardebilipour, M. (2004). Spread spectrum code estimation by genetic algorithm. International Journal of signal processing, 1(4)."},{"key":"9928_CR3","unstructured":"Yen, K., & Hanzo, L. (2001). Genetic algorithm assisted joint multiuser symbol detection and fading channel estimation for synchronous CDMA systems. IEEE Transaction on Selected Areas in Communication, 19(6)."},{"issue":"4","key":"9928_CR4","first-page":"268","volume":"2","author":"VR Asghari","year":"2005","unstructured":"Asghari, V. R., & Ardebilipour, M. (2005). Spread spectrum code estimation by particle swarm algorithm. International Journal of Signal Processing, 2(4), 268\u2013272.","journal-title":"International Journal of Signal Processing"},{"key":"9928_CR5","first-page":"91","volume":"2","author":"K Hua","year":"2009","unstructured":"Hua, K., Jang, W. M., & Nguyen, L. (2009). Cooperative self encoded spread spectrum in fading channels. International Journal of Communication, Network and system, 2, 91\u201396.","journal-title":"International Journal of Communication, Network and system"},{"key":"9928_CR6","unstructured":"Maity, S., Maity, S. P., & Sil, J. (2009). Spread spectrum watermark embedder optimization using genetic algorithms, advances in pattern recognition 2009. Kolkata, India."},{"key":"9928_CR7","unstructured":"Sedghi, S., Mashhadi, H. R., & Khademi, M. (2006). Detecting hidden information from a spread spectrum watermarked signal by genetic algorithm 2006 IEEE congress on evolutionary computation Sheraton Vancouver Wall Centre Hotel. Vancouver, BC, Canada."},{"key":"9928_CR8","unstructured":"Gao, Q., Li, R., Wang, H., Dang, H., & Liu, L. (2004). Spread spectrum digital watermarking algorithm using gold codes. Journal of Xi\u2019an Jiaotong University, 28(2)."},{"key":"9928_CR9","unstructured":"Marvel, L. M., Retter, C. T., & Boncelet, C. G. J. (1998). Hiding information in images 1998 international conference on image processing, Chicago, USA."},{"key":"9928_CR10","doi-asserted-by":"crossref","unstructured":"Ruanaidh, J. J. K. O., & Csurka, G. (1999). A Bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries. IEEE computer society conference on computer vison and pattern recognition, Fort Collins, USA.","DOI":"10.1109\/CVPR.1999.786940"},{"issue":"8","key":"9928_CR11","first-page":"1646","volume":"19","author":"Z Shi","year":"2001","unstructured":"Shi, Z., & Schlegel, C. (2001). Joint iterative decoding of serially concatenated error control coded CDMA. IEEE JSAC, 19(8), 1646\u20131653.","journal-title":"IEEE JSAC"},{"key":"9928_CR12","unstructured":"Vassaux, B., Bas, P., & Chassery, J. M. (2001). A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness 2001 International Corrence on Image Processing. Thessaloniki, Greece."},{"issue":"3\u20134","key":"9928_CR13","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s11235-010-9339-6","volume":"48","author":"J Konorski","year":"2011","unstructured":"Konorski, J. (2011). Wireless and mobile networking (Foreword). Telecommunication Systems, 48(3\u20134), 233\u2013236.","journal-title":"Telecommunication Systems"},{"key":"9928_CR14","volume-title":"Spread spectrum system","author":"RC Dixon","year":"1984","unstructured":"Dixon, R. C. (1984). Spread spectrum system. New York, NY: Wiley."},{"key":"9928_CR15","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/PROC.1980.11697","volume":"68","author":"DV Sarwate","year":"1980","unstructured":"Sarwate, D. V., & Pursley, M. B. (1980). Crosscorrelation properties of pseudorandom and related sequences. Proceedings of IEEE, 68, 593\u2013619.","journal-title":"Proceedings of IEEE"},{"issue":"2","key":"9928_CR16","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/98.382531","volume":"2","author":"A Duel-Hallen","year":"1995","unstructured":"Duel-Hallen, A. (1995). Multi-user detection for CDMA systems. IEEE Personal Communications, 2(2), 46\u201358.","journal-title":"IEEE Personal Communications"},{"key":"9928_CR17","volume-title":"Multiuser detection","author":"S Verdu","year":"1998","unstructured":"Verdu, S. (1998). Multiuser detection. Cambridge: Cambridge University Press."},{"issue":"12","key":"9928_CR18","doi-asserted-by":"crossref","first-page":"3080","DOI":"10.1109\/26.477511","volume":"43","author":"SD Gray","year":"1995","unstructured":"Gray, S. D., Kocic, M., & Brady, D. (1995). Multi-user detection in mismatched multiple access channel. IEEE Transactions on Communications, 43(12), 3080\u20133099.","journal-title":"IEEE Transactions on Communications"},{"key":"9928_CR19","doi-asserted-by":"crossref","unstructured":"Holtzman, J. M. (1992). A simple, accurate method to calculate spread-spectrum multuple access error probabilities. IEEE Transactions on Communications, 40(4).","DOI":"10.1109\/26.135712"},{"issue":"3","key":"9928_CR20","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1109\/JSAC.2010.100412","volume":"28","author":"L Zhou","year":"2010","unstructured":"Zhou, L., Wang, X., Tu, W., Mutean, G., & Geller, B. (2010). Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE Journal on Selected Areas in Communications, 28(3), 409\u2013419.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"7","key":"9928_CR21","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1109\/JSAC.2011.110803","volume":"29","author":"L Zhou","year":"2011","unstructured":"Zhou, L., Chao, H.-C., & Vasilakos, A. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358\u20131367.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"9928_CR22","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1109\/TMM.2011.2160716","volume":"13","author":"L Zhou","year":"2011","unstructured":"Zhou, L., & Chen, H.-H. (2011). On multimedia scheduling with constrained control channels. IEEE Transactions on Multimedia, 13(5), 1040\u20131051.","journal-title":"IEEE Transactions on Multimedia"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-014-9928-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-014-9928-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-014-9928-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T09:47:51Z","timestamp":1566121671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-014-9928-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,11]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["9928"],"URL":"https:\/\/doi.org\/10.1007\/s11235-014-9928-x","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,11]]}}}