{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:30:04Z","timestamp":1730223004193,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/geoinformatics.2010.5567859","type":"proceedings-article","created":{"date-parts":[[2010,9,15]],"date-time":"2010-09-15T13:48:29Z","timestamp":1284558509000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["GIS vector data automatic watermark detection based on mobile agent technology"],"prefix":"10.1109","author":[{"given":"Chao","family":"Zuo","sequence":"first","affiliation":[]},{"given":"Anbo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Cuicui","family":"Meng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"19","article-title":"The overview of mobile agent","author":"zhou","year":"2003","journal-title":"Computer Applications and Software"},{"key":"ref3","article-title":"A WWW service to embed and prove digital copyright watermarks","author":"zhao","year":"1996","journal-title":"Proc of the European Conference on Multimedia Applications Services and Techniques"},{"key":"ref6","first-page":"23","article-title":"A research on the mechanism of Aglet programming","volume":"22","author":"liu","year":"2002","journal-title":"Journal of Guilin Institute of Electronic Technology"},{"key":"ref10","first-page":"140","article-title":"Technique and Application of Digital Watermark","author":"sun","year":"2004"},{"key":"ref5","first-page":"110","article-title":"Implementation of mobile agent in digital watermark","volume":"14","author":"wang","year":"2004","journal-title":"Microcomputer development"},{"key":"ref8","first-page":"17","article-title":"Programming and Deploying Java Mobile Agents with Aglets","author":"lange","year":"1998"},{"key":"ref7","first-page":"10","article-title":"Mobile Agent and Its Application","author":"zhang","year":"2002"},{"key":"ref2","first-page":"21","article-title":"A study of key security threats and countermeasures in mobile agent systems","volume":"32","author":"zhang","year":"2005","journal-title":"Computer Science"},{"article-title":"Research on key technique for copyright protection of GIS vector data","year":"0","author":"li","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8659.00412"}],"event":{"name":"2010 18th International Conference on Geoinformatics","start":{"date-parts":[[2010,6,18]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,20]]}},"container-title":["2010 18th International Conference on Geoinformatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5559273\/5567473\/05567859.pdf?arnumber=5567859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T20:13:13Z","timestamp":1489867993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5567859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/geoinformatics.2010.5567859","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}