{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:24:26Z","timestamp":1759091066098,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/grc.2009.5255107","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T20:32:54Z","timestamp":1253910774000},"page":"322-325","source":"Crossref","is-referenced-by-count":2,"title":["HTML integrity authentication based on fragile digital watermarking"],"prefix":"10.1109","author":[{"given":"Bo","family":"Li","sequence":"first","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuan-Yuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dong-Dong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Ying-Zhi","family":"Cui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"genetic algorithms in search","author":"goldberg","year":"1922","journal-title":"Optimization and Machine Leaning [M]"},{"key":"14","first-page":"231","article-title":"seeking of tissue image digging point method based on genetic arithmetic","volume":"13","author":"wang","year":"2005","journal-title":"Optics and Precision Engineering"},{"key":"11","first-page":"653","article-title":"wavelet domain semi-fragile watermarking algorithm for image authentication","volume":"34","author":"hu","year":"2006","journal-title":"Acta Electronica Sinica"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803260.010"},{"key":"3","first-page":"136","volume":"31","year":"2005","journal-title":"Eng Comput"},{"key":"2","first-page":"25","volume":"2","year":"2002","journal-title":"Application Research of Computers"},{"key":"1","first-page":"113","volume":"30","year":"2004","journal-title":"Eng Comput"},{"key":"10","article-title":"embedding robust labels into images for copyright protection","author":"korch","year":"2003","journal-title":"Proc IEEE Int Symp Multimedia Software Engineering"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MMSE.2003.1254426"},{"key":"6","article-title":"document making and identification using both line and word shifting","author":"low","year":"1995","journal-title":"Information 95"},{"journal-title":"Wiley Publishing Inc","year":"2003","key":"5"},{"key":"4","first-page":"147","volume":"12","year":"2004","journal-title":"Application Research of Computers"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1333901"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2004.830814"}],"event":{"name":"2009 IEEE International Conference on Granular Computing (GrC 2009)","start":{"date-parts":[[2009,8,17]]},"location":"Nanchang","end":{"date-parts":[[2009,8,19]]}},"container-title":["2009 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5234367\/5254998\/05255107.pdf?arnumber=5255107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T21:20:57Z","timestamp":1599859257000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5255107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/grc.2009.5255107","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}