{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:18:13Z","timestamp":1729610293312,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/nabic.2009.5393452","type":"proceedings-article","created":{"date-parts":[[2010,1,26]],"date-time":"2010-01-26T12:36:43Z","timestamp":1264509403000},"page":"660-665","source":"Crossref","is-referenced-by-count":0,"title":["Swarm intelligence approach of leaker identification in secure multicast"],"prefix":"10.1109","author":[{"given":"N.K","family":"Sreelaja","sequence":"first","affiliation":[]},{"given":"G.A.Vijayalakshmi","family":"Pai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232463"},{"key":"ref11","first-page":"452","article-title":"Towards robust and hidden image copyright labeling","author":"koch","year":"1995","journal-title":"Proc of 1995 IEEE Workshop on Nonlinear Signal and Image Processing"},{"journal-title":"Artificial Intelligence and Intelligent Systems","year":"2005","author":"padhy","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232467"},{"key":"ref14","article-title":"Platajanus: An audio annotation watermarking framework","author":"steinbach","year":"0","journal-title":"Proceeding of ACM Multimedia 2001 Workshops"},{"key":"ref15","article-title":"Watermarking security enhancement using filter parameterization in feature domain","author":"suhail","year":"2001","journal-title":"Proceeding of ACM Multimedia 2001 Workshops"},{"key":"ref16","article-title":"Fabio de Luigi","author":"maniezzo","year":"0","journal-title":"Ant Colony Optimization"},{"key":"ref17","article-title":"Swarm Intelligence","author":"liu","year":"2000","journal-title":"Literature Overview Dept of Electrical Engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.647972"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_25"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/978-3-540-46703-8_18","article-title":"Watercasting: Distributed Watermarking of Multicast Media","author":"brown","year":"1999","journal-title":"Proceedings of the First International Workshop on Networked Group Communication"},{"journal-title":"The Computational Beauty of Nature","year":"1999","author":"flake","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1117\/12.263419","article-title":"Can invisible watermarks resolve rightful ownerships?","volume":"3022","author":"craver","year":"1997","journal-title":"Proceedings of IS&T\/SPIE Storage and Retrieval for Image and Video Databases VII"},{"key":"ref8","first-page":"283","article-title":"Digital watermarking of uncompressed and compressed video","volume":"66","author":"hartung","year":"1998","journal-title":"Signal Processing (Special Issue on Watermarking)"},{"key":"ref7","volume":"32","author":"chu","year":"2002","journal-title":"A Secure Multicast Protocol with Copyright Protection ACM SIGCOMM Computer Communications Review"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"ref1","first-page":"46","article-title":"Robust watermarking of still images for copyright protection","volume":"3657","author":"barni","year":"1999","journal-title":"Proceedings of SPIE'99"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00227-X"}],"event":{"name":"2009 World Congress on Nature & Biologically Inspired Computing (NaBIC)","start":{"date-parts":[[2009,12,9]]},"location":"Coimbatore, India","end":{"date-parts":[[2009,12,11]]}},"container-title":["2009 World Congress on Nature &amp; Biologically Inspired Computing (NaBIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5377996\/5393306\/05393452.pdf?arnumber=5393452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T06:49:20Z","timestamp":1558766960000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5393452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/nabic.2009.5393452","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}