{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:48:38Z","timestamp":1726037318448},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_13","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"157-165","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography"],"prefix":"10.1007","author":[{"given":"Fawad","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Lee-Ming","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, A.G.H., Shafait, F.: Forgery detection based on intrinsic document contents. In: 2014 11th IAPR International Workshop on Document Analysis Systems (DAS), pp. 252\u2013256. IEEE (2014)","DOI":"10.1109\/DAS.2014.26"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Eskenazi, S., Bodin, B., Gomez-Kr\u00e4mer, P., Ogier, J.M.: A perceptual image hashing algorithm for hybrid document security. In: 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol. 1, pp. 741\u2013746. IEEE (2017)","DOI":"10.1109\/ICDAR.2017.126"},{"key":"13_CR3","unstructured":"Warasart, M., Kuacharoen, P.: Paper-based document authentication using digital signature and QR code. In: 4th International Conference on Computer Engineering and Technology, pp. 94\u201398 (2012)"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-319-28658-7_46","volume-title":"Advances in Intelligent Systems and Computing","author":"Sajan Ambadiyil","year":"2015","unstructured":"Ambadiyil, S., Vibhath, V.B., Mahadevan Pillai, V.P.: On Paper Digital Signature (OPDS). In: Advances in Signal Processing and Intelligent Recognition Systems. AISC, vol. 425, pp. 547\u2013558. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-28658-7_46"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Ambadiyil, S., Vibhath, V. B., Pillai, V.M.: Performance analysis and security dependence of on paper digital signature using random and critical content. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 722\u2013725. IEEE (2016)","DOI":"10.1109\/SCOPES.2016.7955534"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Ahmad, F., Cheng, L.-M, Khan, A.: Lightweight and privacy-preserving template generation for palm-vein based human recognition. IEEE Trans. Inf. Forensics Secur. (2019). \n                    https:\/\/doi.org\/10.1109\/tifs.2019.2917156","DOI":"10.1109\/tifs.2019.2917156"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.sigpro.2018.02.029","volume":"148","author":"F Ahmad","year":"2018","unstructured":"Ahmad, F., Cheng, L.-M.: Authenticity and copyright verification of printed images. Sig. Process. 148, 322\u2013335 (2018)","journal-title":"Sig. Process."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Sharma, G.: Image-based data interfaces revisited: barcodes and watermarks for the mobile and digital worlds. In: 2016 8th International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/COMSNETS.2016.7440021"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Ahmad, F., Cheng, L.-M.: Watermark extraction under print-cam process using wave atoms based blind digital watermarking. In: Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, p. 59. ACM (2018)","DOI":"10.1145\/3271553.3271619"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Li, C.M., Hu, P., Lau, W.C.: AuthPaper: protecting paper-based documents and credentials using authenticated 2D barcodes. In: 2015 IEEE International Conference on Communications (ICC), pp. 7400\u20137406. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249509"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Klein, D., Kruse, J.: A comparative study on image hashing for document authentication. In: 2015 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/BIOSIG.2015.7314592"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.acha.2007.03.003","volume":"23","author":"L Demanet","year":"2007","unstructured":"Demanet, L., Ying, L.: Wave atoms and sparsity of oscillatory patterns. Appl. Comput. Harmonic Anal. 23, 368\u2013387 (2007)","journal-title":"Appl. Comput. Harmonic Anal."},{"key":"13_CR13","unstructured":"FEI face database. \n                    https:\/\/fei.edu.br\/~cet\/facedatabase.html\n                    \n                  . Accessed 28 Feb 2019"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:05:34Z","timestamp":1562771134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}