{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:12:09Z","timestamp":1766733129561,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319201245"},{"type":"electronic","value":"9783319201252"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20125-2_10","type":"book-chapter","created":{"date-parts":[[2015,6,26]],"date-time":"2015-06-26T14:22:20Z","timestamp":1435328540000},"page":"104-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["When Document Security Brings New Challenges to Document Analysis"],"prefix":"10.1007","author":[{"given":"S\u00e9bastien","family":"Eskenazi","sequence":"first","affiliation":[]},{"given":"Petra","family":"Gomez-Kr\u00e4mer","sequence":"additional","affiliation":[]},{"given":"Jean-Marc","family":"Ogier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,27]]},"reference":[{"key":"10_CR1","unstructured":"Smith, A.: Identity fraud: a study. Technical Report July, Economic and Domestic Secretariat Cabinet Office (2002)"},{"key":"10_CR2","unstructured":"Baras, C., Cayre, F.: Vers un mod\u00e8le de canal r\u00e9aliste pour l\u2019analyse de la s\u00e9curit\u00e9 du processus d\u2019authentification par code matriciel 2D. In: XXIV\u00e8me Colloque GRETSI, pp. 2\u20135 (2013)"},{"key":"10_CR3","unstructured":"Zauner, C.: Implementation and benchmarking of perceptual image hash functions. Ph.D. thesis, University of Applied Sciences Hagenberg (2010)"},{"key":"10_CR4","unstructured":"Bryson, J., Gallagher, P.: Secure Hash Standard (SHS) (2012)"},{"key":"10_CR5","unstructured":"Kerry, C.F., Gallagher, P.: Digital Signature Standard (DSS) (2013)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24654-1_13","volume-title":"Selected Areas in Cryptography","author":"H Gilbert","year":"2004","unstructured":"Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, Mitsuru, Zuccherato, Robert J. (eds.) SAC 2003. LNCS, vol. 3006. Springer, Heidelberg (2004)"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.diin.2006.06.015","volume":"3","author":"J Kornblum","year":"2006","unstructured":"Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. Digital Invest. 3, 91\u201397 (2006)","journal-title":"Digital Invest."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Hadmi, A., Puech, W., Said, B.A.E., Ouahman, A.A.: Perceptual image hashing. In: Das Gupta, M. (ed.) Watermarking - Volume 2. InTech, pp. 17\u201342 (2012)","DOI":"10.5772\/37435"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jda.2012.07.005","volume":"18","author":"D Belazzougui","year":"2013","unstructured":"Belazzougui, D., Navarro, G., Valenzuela, D.: Improved compressed indexes for full-text document retrieval. J. Discrete Algorithms 18, 3\u201313 (2013)","journal-title":"J. Discrete Algorithms"},{"key":"10_CR10","first-page":"1","volume":"XXX","author":"C Winter","year":"2013","unstructured":"Winter, C., Schneider, M., Yannikos, Y.: F2S2: Fast forensic similarity search through indexing piecewise hash signatures. Digital Invest. XXX, 1\u201311 (2013)","journal-title":"Digital Invest."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Koval, O., Voloshynovskiy, S., Beekhof, F., Pun, T.: Security analysis of robust perceptual hashing. In: Delp III, E.J., Wong, P.W., Dittmann, J., Memon, N.D. (eds.) Proceedings of SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, SPIE, pp. 1\u201310, February 2008","DOI":"10.1117\/12.764846"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Vill\u00e1n, R., Voloshynovskiy, S., Koval, O., Deguillaume, F., Pun, T.: Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of Security, Steganography, and Watermarking of Multimedia Contents IX, pp. 65051T\u201365051T-12, February 2007","DOI":"10.1117\/12.704097"},{"issue":"8","key":"10_CR13","first-page":"1","volume":"3","author":"L Tan","year":"2011","unstructured":"Tan, L., Sun, X., Zhou, Z., Zhang, W.: Perceptual text image hashing based on shape recognition. Adv. Inf. Sci. Serv. Sci. (AISS) 3(8), 1\u20137 (2011)","journal-title":"Adv. Inf. Sci. Serv. Sci. (AISS)"},{"key":"10_CR14","unstructured":"Baras, C., Cayre, F.: 2D bar-codes for authentication: a security approach. In: Proceedings of 20th European Signal Processing Conference (EUSIPCO), pp. 1760\u20131766. IEEE Computer Society Press (2012)"},{"key":"10_CR15","unstructured":"Malvido Garci\u00e0, A.: Secure Imprint Generated for Paper Documents (SIGNED). Technical Report, December 2010, Bit Oceans (2013)"},{"issue":"3","key":"10_CR16","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/BF01456326","volume":"69","author":"A Haar","year":"1910","unstructured":"Haar, A.: On the theory of orthogonal function systems. Math. Ann. 69(3), 331\u2013371 (1910)","journal-title":"Math. Ann."},{"key":"10_CR17","unstructured":"Google: Tesseract (2013)"},{"key":"10_CR18","unstructured":"Rice, S., Jenkins, F., Nartker, T.: The fifth annual test of OCR accuracy. Technical Report April, Information Science Research Institute (1996)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kae, A., Huang, G., Doersch, C., Learned-Miller, E.: Improving state-of-the-art OCR through high-precision document specific modeling. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1935\u20131942. IEEE Computer Society Press (2010)","DOI":"10.1109\/CVPR.2010.5539867"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-78135-6_53","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"M Reynaert","year":"2008","unstructured":"Reynaert, M.: Non-interactive OCR Post-correction for Giga-scale digitization projects. In: Gelbukh, A. (ed.) CICLing 2008. LNCS, vol. 4919, pp. 617\u2013630. Springer, Heidelberg (2008)"},{"issue":"2","key":"10_CR21","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s10032-010-0133-5","volume":"14","author":"MWC Reynaert","year":"2010","unstructured":"Reynaert, M.W.C.: Character confusion versus focus word-based correction of spelling and OCR variants in corpora. Int. J. Doc. Anal. Recogn. (IJDAR) 14(2), 173\u2013187 (2010)","journal-title":"Int. J. Doc. Anal. Recogn. (IJDAR)"},{"key":"10_CR22","unstructured":"Niklas, K.: Unsupervised post-correction of OCR errors. Ph.D. thesis, Leibniz Universit\u00e4t Hannover (2010)"}],"container-title":["Lecture Notes in Computer Science","Computational Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20125-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T15:18:03Z","timestamp":1674227883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-20125-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319201245","9783319201252"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20125-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"27 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}