{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:46:41Z","timestamp":1729648001508,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/wifs.2013.6707819","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T15:09:25Z","timestamp":1389366565000},"page":"203-208","source":"Crossref","is-referenced-by-count":9,"title":["A GA optimization approach to HS based multiple reversible data hiding"],"prefix":"10.1109","author":[{"given":"Junxiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652566"},{"journal-title":"Genetic Algorithms in Search Optimization and Machine Learning","year":"1989","author":"goldberg","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01757-5_5"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2010.08.012"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2145372"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1073170.1073188"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2017409"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.015"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/11922841_26"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"9","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","article-title":"Reversible image watermarking using interpolation technique","volume":"5","author":"luo","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1117\/1.3532833"}],"event":{"name":"2013 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2013,11,18]]},"location":"Guangzhou, China","end":{"date-parts":[[2013,11,21]]}},"container-title":["2013 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693295\/6707777\/06707819.pdf?arnumber=6707819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:51:09Z","timestamp":1498096269000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6707819\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wifs.2013.6707819","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}