{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:07:29Z","timestamp":1725469649124},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/bicta.2010.5645230","type":"proceedings-article","created":{"date-parts":[[2010,12,9]],"date-time":"2010-12-09T10:33:18Z","timestamp":1291890798000},"page":"821-825","source":"Crossref","is-referenced-by-count":0,"title":["Scalable collusion secure fingerprinting for multimedia"],"prefix":"10.1109","author":[{"family":"Jingshen Zhang","sequence":"first","affiliation":[]},{"family":"Qiaoliang Li","sequence":"additional","affiliation":[]},{"family":"Hongjuan Liao","sequence":"additional","affiliation":[]},{"family":"Jun Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1117\/1.1287729"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"journal-title":"Combinatorial Theory","year":"1986","author":"marshall jr","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/49.668975"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1117\/12.632563"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809378"},{"key":"8","article-title":"Capacity of digital watermarks subjected to an optimal collusion attack","author":"su","year":"2000","journal-title":"Proc Eur Signal Process Conf"}],"event":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","start":{"date-parts":[[2010,9,23]]},"location":"Changsha, China","end":{"date-parts":[[2010,9,26]]}},"container-title":["2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629467\/5645057\/05645230.pdf?arnumber=5645230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:17:48Z","timestamp":1490080668000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5645230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/bicta.2010.5645230","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}