{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T06:02:16Z","timestamp":1746424936310},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/icmlc.2012.6359595","type":"proceedings-article","created":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T02:16:04Z","timestamp":1354328164000},"page":"1546-1551","source":"Crossref","is-referenced-by-count":1,"title":["An adaptive SVD-based watermarking scheme based on genetic algorithm"],"prefix":"10.1109","author":[{"family":"Chih-Chin Lai","sequence":"first","affiliation":[]},{"family":"Chung-Hung Ko","sequence":"additional","affiliation":[]},{"family":"Chih-Hsiang Yeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2008.05.003"},{"journal-title":"Multi-Objective Optimization Using Evolutionary Algorithms","year":"2001","author":"deb","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2008.10.004"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.09.117"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.01.004"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2010.03.010"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/6046.985560"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033229"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2009603"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2004288"},{"key":"10","first-page":"85","article-title":"An optimal watermarking scheme based on singular value decomposition","author":"ganic","year":"0","journal-title":"Proc IASTED Int'l Conf on Communication Network and Information Security 2003"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2007.894947"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873652"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/83.918570"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/5.771066"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2007.07.020"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918446"}],"event":{"name":"2012 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2012,7,15]]},"location":"Xian, Shaanxi, China","end":{"date-parts":[[2012,7,17]]}},"container-title":["2012 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6338447\/6359543\/06359595.pdf?arnumber=6359595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:36:12Z","timestamp":1490132172000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6359595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2012.6359595","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}