{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:10:09Z","timestamp":1763341809871,"version":"3.45.0"},"reference-count":49,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062469","type":"journal-article","created":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T04:19:16Z","timestamp":1742185156000},"page":"3135-3163","source":"Crossref","is-referenced-by-count":0,"title":["Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking"],"prefix":"10.32604","volume":"83","author":[{"given":"Shu-Chuan","family":"Chu","sequence":"first","affiliation":[]},{"given":"Libin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Xingsi","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Min","family":"Liu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"100224","article-title":"Study on artificial intelligence: the state of the art and future prospects","volume":"23","author":"Zhang","year":"2021","journal-title":"J Ind Inf Integr"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2","DOI":"10.58459\/rptel.2023.18002","article-title":"Fourth industrial revolution\u2014a review of applications, prospects, and challenges for artificial intelligence, robotics and blockchain in higher education","volume":"18","author":"Chaka","year":"2022","journal-title":"Res Pract Technol Enhanc Learn"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"5277","DOI":"10.1007\/s00500-020-05527-x","article-title":"An improved differential evolution algorithm and its application in optimization problem","volume":"25","author":"Deng","year":"2021","journal-title":"Soft Comput"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"110040","DOI":"10.1016\/j.asoc.2023.110040","article-title":"EGNN: graph structure learning based on evolutionary computation helps more in graph neural networks","volume":"135","author":"Liu","year":"2023","journal-title":"Appl Soft Comput"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1766","DOI":"10.1007\/s42235-023-00332-2","article-title":"Improved reptile search algorithm by salp swarm algorithm for medical image segmentation","volume":"20","author":"Abualigah","year":"2023","journal-title":"J Bionic Eng"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"105910","DOI":"10.1016\/j.compbiomed.2022.105910","article-title":"Multi-level thresholding segmentation for pathological images: optimal performance design of a new modified differential evolution","volume":"148","author":"Ren","year":"2022","journal-title":"Comput Biol Med"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s10462-024-10913-0","article-title":"Evolutionary computation for unmanned aerial vehicle path planning: a survey","volume":"57","author":"Jiang","year":"2024","journal-title":"Artif Intell Rev"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"106672","DOI":"10.1016\/j.engappai.2023.106672","article-title":"A Multi-strategy improved differential evolution algorithm for UAV 3D trajectory planning in complex mountainous environments","volume":"125","author":"Zhang","year":"2023","journal-title":"Eng Appl Artif Intell"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"9629","DOI":"10.1007\/s11071-023-08331-y","article-title":"An image encryption approach using tuned Henon chaotic map and evolutionary algorithm","volume":"111","author":"Rezaei","year":"2023","journal-title":"Nonlinear Dyn"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"104049","DOI":"10.1016\/j.engappai.2020.104049","article-title":"Digital watermarking with improved SMS applied for QR code","volume":"97","author":"Pan","year":"2021","journal-title":"Eng Appl Artif Intell"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.ins.2021.12.063","article-title":"A machine learning and genetic algorithm-based method for predicting width deviation of hot-rolled strip in steel production systems","volume":"589","author":"Ji","year":"2022","journal-title":"Inf Sci"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"427","DOI":"10.3390\/drones7070427","article-title":"Nature-inspired algorithms from oceans to space: a comprehensive review of heuristic and meta-heuristic optimization algorithms and their potential applications in drones","volume":"7","author":"Darvishpoor","year":"2023","journal-title":"Drones"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"8091","DOI":"10.1007\/s11042-020-10139-6","article-title":"A review on genetic algorithm: past, present, and future","volume":"80","author":"Katoch","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2531","DOI":"10.1007\/s11831-021-09694-4","article-title":"Particle swarm optimization algorithm and its applications: a systematic review","volume":"29","author":"Gad","year":"2022","journal-title":"Arch Comput Meth Eng"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"22991","DOI":"10.1109\/ACCESS.2023.3304889","article-title":"Recent advances in grey wolf optimizer, its versions and applications","volume":"12","author":"Makhadmeh","year":"2023","journal-title":"IEEE Access"},{"key":"ref16","series-title":"PRICAI 2006: Trends in Artificial Intelligence: 9th Pacific Rim International Conference on Artificial Intelligence","first-page":"854","article-title":"Cat swarm optimization","author":"Chu","year":"2006 Aug 7\u201311"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.ejor.2022.06.019","article-title":"Ant colony optimization for path planning in search and rescue operations","volume":"305","author":"Morin","year":"2023","journal-title":"Eur J Oper Res"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"162059","DOI":"10.1109\/ACCESS.2021.3133286","article-title":"Northern goshawk optimization: a new swarm-based algorithm for solving optimization problems","volume":"9","author":"Dehghani","year":"2021","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Adv Eng Softw"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.neucom.2018.06.076","article-title":"A survey of teaching-learning-based optimization","volume":"335","author":"Zou","year":"2019","journal-title":"Neurocomputing"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"12346","DOI":"10.1007\/s11227-024-05905-4","article-title":"Love evolution algorithm: a stimulus-value\u2013role theory-inspired evolutionary algorithm for global optimization","volume":"80","author":"Gao","year":"2024","journal-title":"J Supercomput"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.jmsy.2023.09.002","article-title":"A hybrid genetic tabu search algorithm for distributed flexible job shop scheduling problems","volume":"71","author":"Xie","year":"2023","journal-title":"J Manuf Syst"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1109\/TEVC.2022.3225509","article-title":"Explainable artificial intelligence by genetic programming: a survey","volume":"27","author":"Mei","year":"2023","journal-title":"IEEE Trans Evol Comput"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/TCYB.2022.3181461","article-title":"Semantic linear genetic programming for symbolic regression","volume":"54","author":"Huang","year":"2024","journal-title":"IEEE Trans Cybern"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/978-3-319-67669-2_2","author":"Joyce","year":"2018","journal-title":"Nature-inspired algorithms and applied optimization"},{"key":"ref26","series-title":"2013 3rd IEEE International Conference on Computer, Control and Communication (IC4)","first-page":"1","article-title":"Discrete binary cat swarm optimization algorithm","author":"Sharafi","year":"2013 Sep 25\u201326"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"2956","DOI":"10.1016\/j.eswa.2011.08.157","article-title":"Solving multiobjective problems using cat swarm optimization","volume":"39","author":"Pradhan","year":"2012","journal-title":"Expert Syst Appl"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-319-76451-1_4","author":"Zhao","year":"2018","journal-title":"Security with intelligent computing and big-data services"},{"key":"ref29","series-title":"2008 International Conference on Machine Learning and Cybernetics","first-page":"3328","article-title":"Parallel cat swarm optimization","author":"Tsai","year":"2008 Jul 12\u201315"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/978-3-642-17390-5_18","author":"Tsai","year":"2011","journal-title":"Handbook of swarm intelligence: concepts, principles and applications"},{"key":"ref31","series-title":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","first-page":"364","article-title":"A hybrid cat swarm optimization-crow search algorithm for vehicle routing problem with time windows","author":"Pratiwi","year":"2017 Nov 1\u20132"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"3225","DOI":"10.1007\/s11277-021-08177-w","article-title":"Robust digital watermarking techniques for copyright protection of digital data: a survey","volume":"118","author":"Kadian","year":"2021","journal-title":"Wirel Pers Commun"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","article-title":"A comprehensive survey on robust image watermarking","volume":"488","author":"Wan","year":"2022","journal-title":"Neurocomputing"},{"key":"ref34","first-page":"042014","article-title":"Analysis of image watermarking with a discrete wavelet transform for digital data security","volume":"1918","author":"Muslim","year":"2021","journal-title":"J Phys: Conf Ser"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSESD.315310","article-title":"Least significant bit-based image watermarking mechanism","volume":"13","author":"Singh","year":"2022","journal-title":"Int J Soc Ecol Sustain Dev"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1186\/s13677-023-00468-w","article-title":"Digital image watermarking using discrete cosine transformation based linear modulation","volume":"12","author":"Alomoush","year":"2023","journal-title":"J Cloud Comput"},{"key":"ref37","first-page":"58","article-title":"Frequency domain digital watermarking algorithm based on arnold transform and quaternion fourier transform","volume":"3","author":"Ma","year":"2022","journal-title":"Autom Mach Learn"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1504\/IJBIC.2013.057193","article-title":"Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search","volume":"5","author":"Dey","year":"2013","journal-title":"Int J Bio Inspired Comput"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"e0196306","DOI":"10.1371\/journal.pone.0196306","article-title":"An optimized digital watermarking algorithm in wavelet domain based on differential evolution for color image","volume":"13","author":"Cui","year":"2018","journal-title":"PLoS One"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"105696","DOI":"10.1016\/j.asoc.2019.105696","article-title":"An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization","volume":"84","author":"Sharma","year":"2019","journal-title":"Appl Soft Comput"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"28003","DOI":"10.1007\/s11042-019-07902-9","article-title":"Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"41267","DOI":"10.1007\/s11042-023-15158-7","article-title":"A novel robust blind medical image watermarking using GWO optimized DWT-DCT-SVD","volume":"82","author":"Devi","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"2255","DOI":"10.1007\/s11042-022-13173-8","article-title":"Optimization of MSFs for watermarking using DWT-DCT-SVD and fish migration optimization with QUATRE","volume":"82","author":"Sun","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"e0274456","DOI":"10.1371\/journal.pone.0274456","article-title":"Genetic algorithm with a new round-robin based tournament selection: statistical properties analysis","volume":"17","author":"Hussain","year":"2022","journal-title":"PLoS One"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s11128-020-02952-7","article-title":"Three-level quantum image encryption based on Arnold transform and logistic map","volume":"20","author":"Liu","year":"2021","journal-title":"Quantum Inf Process"},{"key":"ref46","series-title":"2014 International Conference on Advances in Electronics Computers and Communications","first-page":"1","article-title":"Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register","author":"Rohith","year":"2014 Oct 10\u201311"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"18829","DOI":"10.1007\/s11042-023-16202-2","article-title":"An attack resistant hybrid blind image watermarking scheme based on combination of DWT, DCT and PCA","volume":"83","author":"Hosseini","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"103887","DOI":"10.1016\/j.dsp.2022.103887","article-title":"QR code beautification by instance segmentation (IS-QR)","volume":"133","author":"Tsai","year":"2023","journal-title":"Digit Signal Process"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.knosys.2016.06.029","article-title":"QUasi-affine TRansformation evolutionary (QUATRE) algorithm: a cooperative swarm based algorithm for global optimization","volume":"109","author":"Meng","year":"2016","journal-title":"Knowl Based Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_62469\/TSP_CMC_62469.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:06:29Z","timestamp":1763341589000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60580"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":49,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062469","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}