{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T05:46:11Z","timestamp":1744263971952},"reference-count":25,"publisher":"Elsevier BV","issue":"5-6","license":[{"start":{"date-parts":[[2003,6,1]],"date-time":"2003-06-01T00:00:00Z","timestamp":1054425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Networks"],"published-print":{"date-parts":[[2003,6]]},"DOI":"10.1016\/s0893-6080(03)00132-1","type":"journal-article","created":{"date-parts":[[2003,6,2]],"date-time":"2003-06-02T19:25:49Z","timestamp":1054581949000},"page":"907-914","source":"Crossref","is-referenced-by-count":11,"title":["Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination"],"prefix":"10.1016","volume":"16","author":[{"given":"Harold","family":"Szu","sequence":"first","affiliation":[]},{"given":"Steven","family":"Noel","sequence":"additional","affiliation":[]},{"given":"Seong-Bin","family":"Yim","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Willey","sequence":"additional","affiliation":[]},{"given":"Joe","family":"Landa","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0893-6080(03)00132-1_BIB1","article-title":"A new learning algorithm for blind signal separation","volume":"Vol. 8","author":"Amari","year":"1996"},{"issue":"4","key":"10.1016\/S0893-6080(03)00132-1_BIB2","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1049\/ecej:19990401","article-title":"Digital watermarking: applications, techniques, and challenges","volume":"11","author":"Barnett","year":"1999","journal-title":"Electronics and Communication Engineering Journal"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB3","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1162\/neco.1995.7.6.1129","article-title":"An information-maximization approach to blind separation and blind deconvolution","volume":"7","author":"Bell","year":"1995","journal-title":"Neural Computation"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB4","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1088\/0954-898X\/7\/2\/005","article-title":"Learning the higher-order structure of a natural sound","volume":"7","author":"Bell","year":"1996","journal-title":"Network: Computation in Neural Systems"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB5","article-title":"Are good computer viruses still a bad idea?","author":"Bontchev","year":"1994","journal-title":"Proceedings of EICAR, London"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB6","first-page":"1","article-title":"An introduction to MPEG Layer-3","author":"Brandenburg","year":"2000","journal-title":"EBU Technical Review"},{"issue":"1","key":"10.1016\/S0893-6080(03)00132-1_BIB7","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","article-title":"Computer viruses\u2014theory and experiments","volume":"6","author":"Cohen","year":"1984","journal-title":"Computers and Security"},{"issue":"3","key":"10.1016\/S0893-6080(03)00132-1_BIB8","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/0165-1684(94)90029-9","article-title":"Independent component analysis, a new concept?","volume":"36","author":"Comon","year":"1994","journal-title":"Signal Processing"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB9","first-page":"1997","article-title":"Independent component analysis applied to digital image watermarking","author":"Gonzalez-Serrano","year":"2001","journal-title":"Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing Salt Lake City"},{"issue":"7","key":"10.1016\/S0893-6080(03)00132-1_BIB10","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/5.771066","article-title":"Multimedia watermarking techniques","volume":"87","author":"Hartung","year":"1999","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB11","unstructured":"Hyv\u00e4rinen, A., & Oja, E (1999). Independent component analysis: a tutorial. Tutorial Notes, International Joint Conference on Neural Networks, Washington, DC."},{"key":"10.1016\/S0893-6080(03)00132-1_BIB12","first-page":"2074","article-title":"The business case for audio watermarking","author":"Jessop","year":"1999","journal-title":"Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing Phoenix"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB13","doi-asserted-by":"crossref","DOI":"10.1117\/12.501498","article-title":"Blind inversion in nonlinear space-variant imaging by using cauchy machine","author":"Kopriva","year":"2003","journal-title":"Proceedings of the SPIE Conference on Independent Component Analyses, Neural Nets and Wavelets, Orlando"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB14","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1117\/12.381712","article-title":"Multimedia authenticity with ICA watermarks","author":"Noel","year":"2000","journal-title":"Proceedings of Wavelet Applications VII Orlando"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB15","first-page":"417","article-title":"Signal separation by nonlinear hebbian learning","author":"Oja","year":"1995","journal-title":"Proceedings of the International Conference on Neural Networks Perth"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB16","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/93.388209","article-title":"A tutorial on MPEG\/audio compression","author":"Pan","year":"1995","journal-title":"IEEE Multimedia Journal"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB17","first-page":"539","article-title":"Local ICA for the most wanted face recognition","author":"Quan","year":"2000","journal-title":"Proceedings of Wavelet Applications VI Orlando"},{"issue":"1","key":"10.1016\/S0893-6080(03)00132-1_BIB18","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1049\/el:20010029","article-title":"Audio watermarking for copyright protection of digital audio data","volume":"37","author":"Seok","year":"2001","journal-title":"Electronics Letters"},{"issue":"6","key":"10.1016\/S0893-6080(03)00132-1_BIB19","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1109\/5.687830","article-title":"Multimedia data-embedding and watermarking technologies","volume":"86","author":"Swanson","year":"1998","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB20","unstructured":"Syntrillium Software Corporation (2003). Syntrillium software\u2014Home of Cool Edit 2000 and Cool Edit Pro. Web page, http:\/\/www.syntrillium.com\/. Last accessed March 21, 2003."},{"key":"10.1016\/S0893-6080(03)00132-1_BIB21","first-page":"14","article-title":"ICA-enabling techniques for intelligent sensory processing","author":"Szu","year":"1999","journal-title":"IEEE Circuits and Systems Newsletters"},{"issue":"2","key":"10.1016\/S0893-6080(03)00132-1_BIB22","first-page":"7","article-title":"Progress in unsupervised artificial neural networks for image demixing applications","volume":"46","author":"Szu","year":"1999","journal-title":"IEEE Industrial Electronics Society Newsletter"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB23","article-title":"Watermarking MP3 encoded music and ICA blind demixing","author":"Yim","year":"2003","journal-title":"Proceedings of the SPIE Conference on Independent Component Analyses, Neural Nets and Wavelets, Orlando"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB24","first-page":"4177","article-title":"Robust image watermarking based on independent component analysis","author":"Yu","year":"2002","journal-title":"Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing Orlando"},{"key":"10.1016\/S0893-6080(03)00132-1_BIB25","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1155\/S111086570200046X","article-title":"Watermark detection and extraction using ICA method","volume":"1","author":"Yu","year":"2002","journal-title":"EURASIP Journal on Applied Signal Processing"}],"container-title":["Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893608003001321?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893608003001321?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T20:27:08Z","timestamp":1553113628000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0893608003001321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,6]]},"references-count":25,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2003,6]]}},"alternative-id":["S0893608003001321"],"URL":"https:\/\/doi.org\/10.1016\/s0893-6080(03)00132-1","relation":{},"ISSN":["0893-6080"],"issn-type":[{"value":"0893-6080","type":"print"}],"subject":[],"published":{"date-parts":[[2003,6]]}}}