{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T13:41:02Z","timestamp":1706190062879},"reference-count":0,"publisher":"International Academy Publishing (IAP)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.5.12.1933-1941","type":"journal-article","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:59:07Z","timestamp":1295110747000},"source":"Crossref","is-referenced-by-count":3,"title":["Attack Model and Performance Evaluation of Text Digital Watermarking"],"prefix":"10.17706","volume":"5","author":[{"given":"Xinmin","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Sichun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuchu","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Yu","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2010,12,1]]},"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:05:22Z","timestamp":1442329522000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/3473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,1]]},"references-count":0,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2010,12,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.5.12.1933-1941","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2010,12,1]]}}}