{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T13:34:24Z","timestamp":1775309664239,"version":"3.50.1"},"reference-count":52,"publisher":"Walter de Gruyter GmbH","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In this paper, an algorithm for multiple digital watermarking based on discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) was proposed for healthcare applications such as tele-ophthalmology, tele-medicine, tele-diagnosis, and tele-consultancy services. Multiple watermarks were used in this algorithm to reduce the consequences of medical identity thefts. In the embedding process, the cover medical image was decomposed into third-level DWT. Low-frequency bands (LH2 and LL3) were transformed by DCT, and then SVD was applied to DCT coefficients. Two watermarks in the form of images were also transformed by DCT and then SVD. The singular values of the watermark information were embedded in the singular value of the cover medical image. Watermarks were extracted using an extraction algorithm. In order to enhance the robustness performance of the image watermarks, back-propagation neural network was applied to the extracted watermarks to reduce the effects of different noise applied on the watermarked image. Results were obtained by varying the gain factor and the different cover image modalities. Experimental results were provided to illustrate that the proposed method is able to withstand a variety of signal processing attacks, and has been found to give excellent performance in terms of robustness and imperceptibility. The performance of the method was also compared with other reported techniques. Further, the visual quality of the proposed method was also evaluated by a subjective method.<\/jats:p>","DOI":"10.1515\/jisys-2016-0036","type":"journal-article","created":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T05:22:51Z","timestamp":1474608171000},"page":"5-18","source":"Crossref","is-referenced-by-count":31,"title":["Multiple Watermarking for Healthcare Applications"],"prefix":"10.1515","volume":"27","author":[{"given":"Aditi","family":"Zear","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering , Jaypee University of Information Technology , Waknaghat , Solan, Himachal Pradesh, India"}]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering , Jaypee University of Information Technology , Waknaghat , Solan, Himachal Pradesh, India"}]},{"given":"Pardeep","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering , Jaypee University of Information Technology , Waknaghat , Solan, Himachal Pradesh, India"}]}],"member":"374","published-online":{"date-parts":[[2016,9,23]]},"reference":[{"key":"2025120523302081201_j_jisys-2016-0036_ref_001_w2aab3b7b1b1b6b1ab1b8b1Aa","doi-asserted-by":"crossref","unstructured":"M. Agbaje, O. Awodele and C. Ogbonna, Applications of digital watermarking to cyber security (cyber watermarking), in: Proceedings of Informing Science & IT Education Conference (InSITE), Florida, USA, pp. 1\u201311, 2015.","DOI":"10.28945\/2138"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_002_w2aab3b7b1b1b6b1ab1b8b2Aa","doi-asserted-by":"crossref","unstructured":"K. A. Ahmed, H. A. Ahmad and P. Gaydecki, A blind block based DCT watermarking technique for gray level images using one dimensional Walsh coding, in: Current Trends in Information Technology (CTIT), Dubai, pp. 1\u20136, 2009.","DOI":"10.1109\/CTIT.2009.5423140"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_003_w2aab3b7b1b1b6b1ab1b8b3Aa","doi-asserted-by":"crossref","unstructured":"N. Ahmidi and R. Safabakhsh, A novel DCT-based approach for secure color image watermarking, in: IEEE Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC), Las Vegas, Nevada, USA, vol. 2, pp. 709\u2013713, 2004.","DOI":"10.1109\/ITCC.2004.1286738"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_004_w2aab3b7b1b1b6b1ab1b8b4Aa","doi-asserted-by":"crossref","unstructured":"M. Ali, C. W. Ahn and P. Siarry, Differential evolution algorithm for the selection of optimal scaling factors in image watermarking, Eng. Appl. Artif. Intell.31 (2014), 15\u201326.10.1016\/j.engappai.2013.07.009","DOI":"10.1016\/j.engappai.2013.07.009"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_005_w2aab3b7b1b1b6b1ab1b8b5Aa","doi-asserted-by":"crossref","unstructured":"V. Aslantas, An optimal robust digital image watermarking based on SVD using differential evolution algorithm, Optics Commun.282 (2009), 769\u2013777.10.1016\/j.optcom.2008.11.024","DOI":"10.1016\/j.optcom.2008.11.024"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_006_w2aab3b7b1b1b6b1ab1b8b6Aa","doi-asserted-by":"crossref","unstructured":"V. Aslantas, A. L. Dogan and S. Ozturk, DWT-SVD based image watermarking using Particle Swarm Optimizer, in: IEEE International Conference on Multimedia and Expo (ICME), Hannover, Germany, 978 1-4244-2571-6\/08, pp. 241\u2013244, 2008.","DOI":"10.1109\/ICME.2008.4607416"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_007_w2aab3b7b1b1b6b1ab1b8b7Aa","doi-asserted-by":"crossref","unstructured":"V. Aslantas, S. Ozer and S. Ozturk, Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms, Optics Commun.282 (2009), 2806\u20132817.10.1016\/j.optcom.2009.04.034","DOI":"10.1016\/j.optcom.2009.04.034"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_008_w2aab3b7b1b1b6b1ab1b8b8Aa","doi-asserted-by":"crossref","unstructured":"M. Barni and F. Bartolini, Improved wavelet-based watermarking through pixel-wise masking, IEEE Trans. Image Process.10 (2001), 783\u2013791.10.1109\/83.918570","DOI":"10.1109\/83.918570"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_009_w2aab3b7b1b1b6b1ab1b8b9Aa","doi-asserted-by":"crossref","unstructured":"W. Bender, D. Gruhl, N. Morimoto and A. Lu, Techniques for data hiding, IBM Syst. J.35 (1996), 313\u2013336.10.1147\/sj.353.0313","DOI":"10.1147\/sj.353.0313"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_010_w2aab3b7b1b1b6b1ab1b8c10Aa","unstructured":"D. Bowman, http:\/\/www.fiercehealthit.com\/story\/researchers-use-digital-watermarks-protect-medical-images, 2012. Accessed 8 August, 2012."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_011_w2aab3b7b1b1b6b1ab1b8c11Aa","doi-asserted-by":"crossref","unstructured":"C. C. Chang, P. Tsai and C. C. Lin, SVD-based digital image watermarking scheme, Pattern Recogn. Lett.26 (2005), 1577\u20131586.10.1016\/j.patrec.2005.01.004","DOI":"10.1016\/j.patrec.2005.01.004"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_012_w2aab3b7b1b1b6b1ab1b8c12Aa","doi-asserted-by":"crossref","unstructured":"A. Cheddad, J. Condell, K. Curran and P. McKevitt, Digital image steganography: survey and analyses of current methods, Signal Process.90 (2010), 727\u2013752.10.1016\/j.sigpro.2009.08.010","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_013_w2aab3b7b1b1b6b1ab1b8c13Aa","doi-asserted-by":"crossref","unstructured":"K. L. Chung, W. N. Yang, Y. H. Huang, S. T. Wu and Y. C. Hsu, On SVD-based watermarking algorithm, Appl. Math. Comput.188 (2007), 54\u201357.","DOI":"10.1016\/j.amc.2006.09.117"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_014_w2aab3b7b1b1b6b1ab1b8c14Aa","doi-asserted-by":"crossref","unstructured":"K. Deb, Md. S. Al-Seraj, Md. M. Hoque and Md. I. H. Sarkar, Combined DWT-DCT based digital image watermarking technique for copyright protection, in: International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, pp. 20\u201322, 2012.","DOI":"10.1109\/ICECE.2012.6471586"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_015_w2aab3b7b1b1b6b1ab1b8c15Aa","unstructured":"Digital Watermarking Alliance, http:\/\/www.digitalwatermarkingalliance.org\/faqs.asp, Accessed 7 January, 2016."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_016_w2aab3b7b1b1b6b1ab1b8c16Aa","doi-asserted-by":"crossref","unstructured":"M. Q. Fan, H. X. Wang and S. K. Li, Restudy on SVD based watermarking scheme, Appl. Math. Comput.203 (2008), 926\u2013930.","DOI":"10.1016\/j.amc.2008.05.003"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_017_w2aab3b7b1b1b6b1ab1b8c17Aa","doi-asserted-by":"crossref","unstructured":"E. Ganic and A. M. Eskicioglu, Robust DWT-SVD domain image watermarking: embedding data in all frequencies, in: Workshop on Multimedia and Security, Magdeburg, Germany, ACM, pp. 166\u2013174, 2004.","DOI":"10.1145\/1022431.1022461"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_018_w2aab3b7b1b1b6b1ab1b8c18Aa","doi-asserted-by":"crossref","unstructured":"J. M. Guo and H. Prasetyo, False-positive-free SVD-based image watermarking, J. Visual Commun. Image Represent.25 (2014), 1149\u20131163.10.1016\/j.jvcir.2014.03.012","DOI":"10.1016\/j.jvcir.2014.03.012"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_019_w2aab3b7b1b1b6b1ab1b8c19Aa","doi-asserted-by":"crossref","unstructured":"M. T. Hagan and M. B. Menhaj, Training feed forward networks with the Marquardt algorithm, IEEE Trans. Neural Netw.5 (1994), 989\u2013993.10.1109\/72.329697","DOI":"10.1109\/72.329697"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_020_w2aab3b7b1b1b6b1ab1b8c20Aa","doi-asserted-by":"crossref","unstructured":"R. A. Jacobs, Increased rates of convergence through learning rate adaptation, Neural Netw.1 (1988), 295\u2013308.10.1016\/0893-6080(88)90003-2","DOI":"10.1016\/0893-6080(88)90003-2"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_021_w2aab3b7b1b1b6b1ab1b8c21Aa","doi-asserted-by":"crossref","unstructured":"N. Kashyap and G. R. Sinha, Image watermarking using 3-level discrete wavelet transform (DWT), Int. J. Modern Educ. Comput. Sci. (IJMECS)3 (2012), 50\u201356.","DOI":"10.5815\/ijmecs.2012.03.07"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_022_w2aab3b7b1b1b6b1ab1b8c22Aa","doi-asserted-by":"crossref","unstructured":"R. Kaur and S. Jindal, Semi-blind image watermarking using high frequency band based on DWT-SVD, in: IEEE 6th International Conference on Emerging Trends in Engineering and Technology (ICETET), Nagpur, India, pp. 19\u201324, 2013.","DOI":"10.1109\/ICETET.2013.5"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_023_w2aab3b7b1b1b6b1ab1b8c23Aa","doi-asserted-by":"crossref","unstructured":"R. Liu and T. Tan, An SVD-based watermarking scheme for protecting rightful ownership, IEEE Trans. Multimedia4 (2002), pp. 121\u2013128.10.1109\/6046.985560","DOI":"10.1109\/6046.985560"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_024_w2aab3b7b1b1b6b1ab1b8c24Aa","doi-asserted-by":"crossref","unstructured":"N. M. Makbol, B. E. Khoo and T. H. Rassem, Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics, Image Process.IET10.1 (2016), 34\u201352.","DOI":"10.1049\/iet-ipr.2014.0965"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_025_w2aab3b7b1b1b6b1ab1b8c25Aa","doi-asserted-by":"crossref","unstructured":"S. C. Mei, R. H. Li, H. M. Dang and Y. K. Wang, Decision of image watermarking strength based on artificial neural-networks, in: Proceedings of the 9th International Conference on Neural Information Processing (ICONIP) Singapore, IEEE, vol. 5, pp. 2430\u20132434, 2002.","DOI":"10.1109\/ICONIP.2002.1201930"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_026_w2aab3b7b1b1b6b1ab1b8c26Aa","unstructured":"N. Mohananthini and G. Yamuna, Watermarking for images using wavelet domain in Back-Propagation neural network, in: Advances in Engineering, Science and Management, pp. 100\u2013105, 2012."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_027_w2aab3b7b1b1b6b1ab1b8c27Aa","doi-asserted-by":"crossref","unstructured":"A. R. N. Nilchi and T. Ayoub, A new robust digital image watermarking technique based on the discrete cosine transformation and neural network, in: International Symposium on Biometrics and Security Technologies, Islamabad, pp. 1\u20137, 2008.","DOI":"10.1109\/ISBAST.2008.4547632"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_028_w2aab3b7b1b1b6b1ab1b8c28Aa","doi-asserted-by":"crossref","unstructured":"Y. Niu, X. Cui, Q. Li and J. Ding, A SVD-based color image watermark algorithm in DWT domain, in: Advanced Graphic Communications, Packaging Technology and Materials, pp. 303\u2013309, 2016.","DOI":"10.1007\/978-981-10-0072-0_39"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_029_w2aab3b7b1b1b6b1ab1b8c29Aa","unstructured":"M. Ollove, www.usatoday.com\/story\/...\/stateline-identity-thefts-medical...\/5279351, 2014, Accessed 7 February, 2014."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_030_w2aab3b7b1b1b6b1ab1b8c30Aa","doi-asserted-by":"crossref","unstructured":"R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, Multimed. Tools Appl. (2016), DOI: 10.1007\/s11042-016-3536-6.","DOI":"10.1007\/s11042-016-3536-6"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_031_w2aab3b7b1b1b6b1ab1b8c31Aa","doi-asserted-by":"crossref","unstructured":"P. Parashar and R. K. Singh, A survey: digital image watermarking techniques, Int. J. Signal Process. Image Process. Pattern Recognit.7 (2014), 111\u2013124.","DOI":"10.14257\/ijsip.2014.7.6.10"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_032_w2aab3b7b1b1b6b1ab1b8c32Aa","doi-asserted-by":"crossref","unstructured":"V. M. Potdar, S. Han and E. Chang, A survey of digital image watermarking techniques, in: \u2018INDIN 05\u2019 Industrial Informatics, 3rd IEEE International Conference, Vienna, Austria, pp. 709\u2013716, 2005.","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_033_w2aab3b7b1b1b6b1ab1b8c33Aa","doi-asserted-by":"crossref","unstructured":"N. Provos and P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security Privacy99 (2003), 32\u201344.","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_034_w2aab3b7b1b1b6b1ab1b8c34Aa","unstructured":"D. E. Rumelhart, G. E. Hinton and R. J. Williams, Learning internal representations by error propagation, in: Parallel Data Processing, D. Rumelhart, J. McClelland, eds., vol. 1, pp. 318\u2013362, chapter 8, MIT Press, Cambridge, 1986."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_035_w2aab3b7b1b1b6b1ab1b8c35Aa","doi-asserted-by":"crossref","unstructured":"S. Shrestha, Hybrid DWT-DCT algorithm for image and video compression applications, Master Thesis, Department of Electrical and Computer Engineering University of Saskatchewan Saskatoon, Saskatchewan, Canada, 2010.","DOI":"10.1109\/ISSPA.2010.5605474"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_036_w2aab3b7b1b1b6b1ab1b8c36Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl. (2016), 10.1007\/s11042-016-3514-z.","DOI":"10.1007\/s11042-016-3514-z"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_037_w2aab3b7b1b1b6b1ab1b8c37Aa","unstructured":"R. Singh, Digital image watermarking: an overview, Int. J. Res.2 (2015), 1087\u20131094."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_038_w2aab3b7b1b1b6b1ab1b8c38Aa","unstructured":"P. Singh and R. S. Chadha, A survey of digital watermarking techniques, applications and attacks, Int. J. Eng. Innov. Technol.2 (2013), 165\u2013175."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_039_w2aab3b7b1b1b6b1ab1b8c39Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain, Natl. Acad. Sci. Lett.37 (2014), 351\u2013358.10.1007\/s40009-014-0241-8","DOI":"10.1007\/s40009-014-0241-8"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_040_w2aab3b7b1b1b6b1ab1b8c40Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, J. Multimed. Tools Appl.75 (2015), 8381\u20138401.","DOI":"10.1007\/s11042-015-2754-7"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_041_w2aab3b7b1b1b6b1ab1b8c41Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Personal Commun.83 (2015), 2133\u20132150.10.1007\/s11277-015-2505-0","DOI":"10.1007\/s11277-015-2505-0"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_042_w2aab3b7b1b1b6b1ab1b8c42Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, B. Kumar, M. Dave and A. Mohan, Multiple watermarking on medical images using selective DWT coefficients, J. Med. Imaging Health Inform.5 (2015), 607\u2013614.10.1166\/jmihi.2015.1432","DOI":"10.1166\/jmihi.2015.1432"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_043_w2aab3b7b1b1b6b1ab1b8c43Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl.75 (2016), 8381\u20138401.10.1007\/s11042-015-2754-7","DOI":"10.1007\/s11042-015-2754-7"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_044_w2aab3b7b1b1b6b1ab1b8c44Aa","unstructured":"T. S. Tagare and S. Kuri, Digital image watermarking \u2013 an overview, Int. J. Comput. Sci. Inform. Eng. Technol.3 (2013), 2277\u20134408."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_045_w2aab3b7b1b1b6b1ab1b8c45Aa","doi-asserted-by":"crossref","unstructured":"M. Terry, Medical identity theft and telemedicine security, Telemed. e-Health15 (2009), 928\u2013932.10.1089\/tmj.2009.9932","DOI":"10.1089\/tmj.2009.9932"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_046_w2aab3b7b1b1b6b1ab1b8c46Aa","unstructured":"M. Vafaei, H. Mahdavi-Nasab and H. Pourghassem, A new robust blind watermarking method based on neural networks in wavelet transform domain, World Appl. Sci. J.22 (2013), 1572\u20131580."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_047_w2aab3b7b1b1b6b1ab1b8c47Aa","unstructured":"T. P. Vogl, J. K. Mangis, A. K. Zigler, W. T. Zink and D. L. Alkon, Accelerating the convergence of the backpropagation method, Biol. Cybern.59 (1998), 256\u2013264."},{"key":"2025120523302081201_j_jisys-2016-0036_ref_048_w2aab3b7b1b1b6b1ab1b8c48Aa","doi-asserted-by":"crossref","unstructured":"Q. T. Yang, T. G. Gao and L. Fan, A novel robust watermarking scheme based on neural network, in: International Conference on Intelligent Computing and Integrated Systems (ICISS), Guilin, China, IEEE, pp. 71\u201375, 2010.","DOI":"10.1109\/ICISS.2010.5655017"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_049_w2aab3b7b1b1b6b1ab1b8c49Aa","doi-asserted-by":"crossref","unstructured":"C. T. Yen and Y. J. Huang, Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network, Multimed. Tools Appl.75 (2016), 9745\u20139755.10.1007\/s11042-015-2718-y","DOI":"10.1007\/s11042-015-2718-y"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_050_w2aab3b7b1b1b6b1ab1b8c50Aa","doi-asserted-by":"crossref","unstructured":"P. T. Yu, H. H. Tsai and J. S. Lin, Digital watermarking based on neural networks for color images, Signal Process.81 (2001), 663\u2013671.10.1016\/S0165-1684(00)00239-5","DOI":"10.1016\/S0165-1684(00)00239-5"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_051_w2aab3b7b1b1b6b1ab1b8c51Aa","doi-asserted-by":"crossref","unstructured":"A. Zear, A. K. Singh and P. Kumar, Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications, A Special Issue on Recent Trends in Security of Mobile Cloud Computing and the Internet of Things, Int. J. Inform. Comput. Security, InderScience (2016), http:\/\/www.inderscience.com\/info\/ingeneral\/forthcoming.php?jcode=ijics. Accessed 9 August, 2016.","DOI":"10.1504\/IJICS.2017.082837"},{"key":"2025120523302081201_j_jisys-2016-0036_ref_052_w2aab3b7b1b1b6b1ab1b8c52Aa","doi-asserted-by":"crossref","unstructured":"W. Zhicheng, L. Hao, D. Jufeng and W. Sashuang, Image watermarking based on genetic algorithm, in: IEEE International Conference on Multimedia and Expo, ICME 1-4244-0367-7\/06, Toronto, ON, Canada, pp. 1117\u20131120, 2006.","DOI":"10.1109\/ICME.2006.262731"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jisys.2018.27.issue-1\/jisys-2016-0036\/jisys-2016-0036.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0036\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0036\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:30:33Z","timestamp":1764977433000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0036\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,23]]},"references-count":52,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2016,9,23]]},"published-print":{"date-parts":[[2018,1,26]]}},"alternative-id":["10.1515\/jisys-2016-0036"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2016-0036","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"value":"2191-026X","type":"electronic"},{"value":"0334-1860","type":"print"}],"subject":[],"published":{"date-parts":[[2016,9,23]]}}}