{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:38:33Z","timestamp":1742913513451,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319224244"},{"type":"electronic","value":"9783319224251"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22425-1_20","type":"book-chapter","created":{"date-parts":[[2015,8,19]],"date-time":"2015-08-19T14:42:31Z","timestamp":1439995351000},"page":"335-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)"],"prefix":"10.1007","author":[{"given":"Reina","family":"Yagasaki","sequence":"first","affiliation":[]},{"given":"Kazuo","family":"Sakiyama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,20]]},"reference":[{"key":"20_CR1","unstructured":"The drinks business: FAKE WINE NOW ACCOUNTS FOR 20% OF MARKET. http:\/\/www.thedrinksbusiness.com\/. Accessed 2 Mar 2015"},{"key":"20_CR2","unstructured":"Matsumoto, H., Matsumoto, T.: Artifact-metric Systems. In: Workshop Record of ISEC, vol. 100, no. 323, pp. 7\u201314 (2000)"},{"key":"20_CR3","unstructured":"Fukuda, Y., Matsumoto, T.: An artifact-metric system which extracts values unique to individual paper. In: Workshop Record of ISEC, vol. 110, no. 113, pp. 41\u201346 (2010). (In Japanese)"},{"issue":"5589","key":"20_CR4","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Sci. AAAS 297(5589), 2026\u20132030 (2002)","journal-title":"Sci. AAAS"},{"key":"20_CR5","series-title":"Data-Centric Systems and Applications","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-69861-6_10","volume-title":"Security, Privacy, and Trust in Modern Data Management","author":"P Tuyls","year":"2007","unstructured":"Tuyls, P., \u0160kori\u0107, B.: Strong authentication with physical unclonable functions. In: Petkovi\u0107, M., Jonker, W. (eds.) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, pp. 133\u2013148. Springer, Heidelberg (2007)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/11496137_28","volume-title":"Applied Cryptography and Network Security","author":"B \u0160kori\u0107","year":"2005","unstructured":"\u0160kori\u0107, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407\u2013422. Springer, Heidelberg (2005)"},{"key":"20_CR7","unstructured":"Yagasaki, R., Sakiyama, K.: A study of artifact-metrics based on the transmitted light through wine bottles. In: Proceedings of the IEICE General Conference, A-7-9, p. 143 (2015). (In Japanese)"},{"key":"20_CR8","first-page":"682","volume":"E87A","author":"K Ito","year":"2004","unstructured":"Ito, K., Nakajima, H., Kobayashi, K., Aoki, T., Higuchi, T.: A fingerprint matching algorithm using phase-only correlation. IEICE Trans. Fundam. E87A, 682\u2013691 (2004)","journal-title":"IEICE Trans. Fundam."},{"key":"20_CR9","series-title":"Prentice Hall Information and System Science Series","volume-title":"Fundamentals of Digital Image Processing","author":"AK Jain","year":"1989","unstructured":"Jain, A.K.: Fundamentals of Digital Image Processing. Prentice Hall Information and System Science Series. Prentice Hall, Englewood Cliffs (1989)"},{"key":"20_CR10","volume-title":"The Fast Fourier Transform","author":"EO Brigham","year":"1974","unstructured":"Brigham, E.O.: The Fast Fourier Transform. Prentice Hall, Englewood Cliffs (1974)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22425-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:31:16Z","timestamp":1676471476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22425-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319224244","9783319224251"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22425-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}