{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:48:04Z","timestamp":1761662884753},"reference-count":18,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1016\/j.ins.2010.07.011","type":"journal-article","created":{"date-parts":[[2010,7,24]],"date-time":"2010-07-24T06:12:29Z","timestamp":1279951949000},"page":"98-108","source":"Crossref","is-referenced-by-count":70,"special_numbering":"C","title":["Optimizing least-significant-bit substitution using cat swarm optimization strategy"],"prefix":"10.1016","volume":"192","author":[{"given":"Zhi-Hui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Ming-Chu","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2010.07.011_b0005","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","article-title":"Picture data encryption using scan pattern","volume":"25","author":"Bourbakis","year":"1992","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.ins.2010.07.011_b0010","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1049\/ip-vis:20050153","article-title":"Hiding secret data adaptively in vector quantisation index, tables","volume":"153","author":"Chang","year":"2006","journal-title":"IEE Proceedings on Vision, Image and Signal Processing"},{"key":"10.1016\/j.ins.2010.07.011_b0015","first-page":"163","article-title":"Computational intelligence based on the behavior of cats","volume":"3","author":"Chu","year":"2007","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"10.1016\/j.ins.2010.07.011_b0020","series-title":"Digital Watermarking and Steganography","author":"Cox","year":"2007"},{"key":"10.1016\/j.ins.2010.07.011_b0025","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/MCOM.1978.1089771","article-title":"The data encryption standard in perspective","volume":"16","author":"Davis","year":"1978","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/j.ins.2010.07.011_b0030","doi-asserted-by":"crossref","first-page":"1248","DOI":"10.1016\/j.ins.2006.09.016","article-title":"Exchange strategies for multiple ant colony system","volume":"177","author":"Ellabib","year":"2007","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2010.07.011_b0035","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/S0167-4048(97)82243-2","article-title":"Data encryption: a non-mathematical approach","volume":"16","author":"Highland","year":"1997","journal-title":"Computer Security"},{"key":"10.1016\/j.ins.2010.07.011_b0040","doi-asserted-by":"crossref","first-page":"1552","DOI":"10.1016\/j.ins.2008.09.024","article-title":"A genetic algorithm approach to determine the sample size for attribute control charts","volume":"179","author":"Kaya","year":"2009","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2010.07.011_b0045","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.1049\/el:20046454","article-title":"Robust image watermarking based on multiple description vector quantisation","volume":"40","author":"Pan","year":"2004","journal-title":"Electronics Letters"},{"key":"10.1016\/j.ins.2010.07.011_b0050","first-page":"1839","article-title":"Robust VQ-based digital watermarking for the memoryless binary symmetric channel","volume":"E-87A","author":"Pan","year":"2004","journal-title":"IEICE Transactions on Fundamentals"},{"key":"10.1016\/j.ins.2010.07.011_b0055","series-title":"Cryptography and Secure Communication","author":"Rhee","year":"1994"},{"key":"10.1016\/j.ins.2010.07.011_b0060","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.ins.2010.07.011_b0065","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1016\/j.ins.2007.10.015","article-title":"Improving inductive logic programming by using simulated annealing","volume":"178","author":"Serrurier","year":"2008","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2010.07.011_b0070","unstructured":"L.F. Turner, Digital data security system, Patent IPN, WO 89\/08915, 1989."},{"key":"10.1016\/j.ins.2010.07.011_b0075","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","article-title":"Image hiding by optimal LSB substitution and genetic algorithm","volume":"34","author":"Wang","year":"2001","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.ins.2010.07.011_b0080","doi-asserted-by":"crossref","first-page":"1944","DOI":"10.1016\/j.ins.2009.01.005","article-title":"Particle swarm optimization with preference order ranking for multi-objective optimization","volume":"179","author":"Wang","year":"2009","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2010.07.011_b0085","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s00034-008-9021-3","article-title":"Reversible data hiding based on companding technique and improved DE method","volume":"27","author":"Weng","year":"2008","journal-title":"Circuits Systems and Signal Processing"},{"key":"10.1016\/j.ins.2010.07.011_b0090","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/LSP.2008.2001984","article-title":"Reversible watermarking based on invariability of the sum of pixel pairs and PMO","volume":"15","author":"Weng","year":"2008","journal-title":"IEEE Signal Processing Letters"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025510003294?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025510003294?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,9]],"date-time":"2018-12-09T04:26:48Z","timestamp":1544329608000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025510003294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":18,"alternative-id":["S0020025510003294"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2010.07.011","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2012,6]]}}}