{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:30:16Z","timestamp":1742913016264,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319534640"},{"type":"electronic","value":"9783319534657"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53465-7_7","type":"book-chapter","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T09:53:19Z","timestamp":1487152399000},"page":"88-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Using Benford\u2019s Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images"],"prefix":"10.1007","author":[{"given":"Aamo","family":"Iorliam","sequence":"first","affiliation":[]},{"given":"Anthony T. S.","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Waller","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"issue":"4","key":"7_CR1","first-page":"573","volume":"28","author":"WW Harper","year":"1937","unstructured":"Harper, W.W.: Fingerprint forgery transferred latent fingerprints. J. Crim. Law Criminol. 28(4), 573\u2013580 (1937)","journal-title":"J. Crim. Law Criminol."},{"key":"7_CR2","unstructured":"Iorliam, A., Ho, A.T.S., Poh, N.: Using Benford\u2019s Law to detect JPEG biometric data tampering. Biometrics 2014, London (2014)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M., Dittmann, J.: Benford\u2019s Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes. In: IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics, p. 94090A (2015)","DOI":"10.1117\/12.2077531"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Yan, Y., Osadciw, L.A.: Bridging biometrics and forensics. In: Electronic Imaging, International Society for Optics and Photonics, p. 68190Q (2008)","DOI":"10.1117\/12.766810"},{"issue":"9","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1109\/5.628674","volume":"85","author":"AK Jain","year":"1997","unstructured":"Jain, A.K., Hong, L., Pankanti, S., Bolle, R.: An identity-authentication system using fingerprints. Proc. IEEE 85(9), 1365\u20131388 (1997)","journal-title":"Proc. IEEE"},{"key":"7_CR6","unstructured":"Note on CASIA-IrisV1. Biometric Ideal Test. http:\/\/biometrics.idealtest.org\/dbDetailForUser.do?id=1"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Synthetic fingerprint generation. In: Handbook of fingerprint recognition, pp. 271\u2013302. Springer, London (2009)","DOI":"10.1007\/978-1-84882-254-2_6"},{"key":"7_CR8","unstructured":"Vein Dataset. PUT Vein Database Description. http:\/\/biometrics.put.poznan.pl\/vein-dataset\/"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-642-40779-6_19","volume-title":"Communications and Multimedia Security","author":"M Hildebrandt","year":"2013","unstructured":"Hildebrandt, M., Sturm, J., Dittmann, J., Vielhauer, C.: Creation of a Public Corpus of contact-less acquired latent fingerprints without privacy implications. In: Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 204\u2013206. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40779-6_19"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Identifying sensors from fingerprint images. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 78\u201384 (2009)","DOI":"10.1109\/CVPR.2009.5204312"},{"key":"7_CR11","unstructured":"FVC2000. Fingerprint Verification Competition Databases. http:\/\/bias.csr.unibo.it\/fvc2000\/databases.asp"},{"key":"7_CR12","unstructured":"CASIA-FACEV5. Biometric Ideal Test. http:\/\/www.idealtest.org\/dbDetailForUser.do?id=9"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, W.: A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: Electronic Imaging 2007, International Society for Optics and Photonics, p. 65051L (2007)","DOI":"10.1117\/12.704723"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-6180-2012-1","volume":"2012","author":"XH Li","year":"2012","unstructured":"Li, X.H., Zhao, Y.Q., Liao, M., Shih, F.Y., Shi, Y.Q.: Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP J. Adv. Sig. Process. 2012(1), 1\u201310 (2012)","journal-title":"EURASIP J. Adv. Sig. Process."},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s11767-011-0474-3","volume":"28","author":"B Xu","year":"2011","unstructured":"Xu, B., Wang, J., Liu, G., Dai, Y.: Photorealistic computer graphics forensics based on leading digit law. J. Electron. (China) 28(1), 95\u2013100 (2011)","journal-title":"J. Electron. (China)"},{"issue":"4","key":"7_CR16","first-page":"551","volume":"78","author":"F Benford","year":"1938","unstructured":"Benford, F.: The law of anomalous numbers. Proc. Am. Philosophical Soc. 78(4), 551\u2013572 (1938)","journal-title":"Proc. Am. Philosophical Soc."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Gon\u00e1lez, F., Heileman, G.L., Abdallah, C.T.: Benford\u2019s law in image processing. In: 2007 IEEE International Conference on Image Processing, ICIP 2007, vol. 1, pp. 1-405 (2007)","DOI":"10.1109\/ICIP.2007.4378977"},{"issue":"4","key":"7_CR18","first-page":"354","volume":"10","author":"TP Hill","year":"1995","unstructured":"Hill, T.P.: A statistical derivation of the significant-digit law. Stat. Sci. 10(4), 354\u2013363 (1995)","journal-title":"Stat. Sci."},{"issue":"1","key":"7_CR19","first-page":"17","volume":"5","author":"C Durtschi","year":"2004","unstructured":"Durtschi, C., Hillison, W., Pacini, C.: The effective use of Benford\u2019s law to assist in detecting fraud in accounting data. J. Forensic Account. 5(1), 17\u201334 (2004)","journal-title":"J. Forensic Account."},{"key":"7_CR20","unstructured":"Acebo, E., Sbert, M.: Benford\u2019s law for natural and synthetic images. In: Proceedings of the First Eurographics Conference on Computational Aesthetics in Graphics, Visualization and Imaging, Eurographics Association, pp. 169\u2013176 (2005)"},{"issue":"1","key":"7_CR21","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1023\/A:1008363415314","volume":"14","author":"JM Jolion","year":"2001","unstructured":"Jolion, J.M.: Images and Benford\u2019s law. J. Math. Imaging Vis. 14(1), 73\u201381 (2001)","journal-title":"J. Math. Imaging Vis."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Qadir, G., Zhao, X., Ho, A.T.: Estimating JPEG2000 compression for image forensics using Benford\u2019s law. In: SPIE Photonics Europe, International Society for Optics and Photonics, p. 77230J (2010)","DOI":"10.1117\/12.855085"},{"key":"7_CR23","unstructured":"Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730\u2013735 (2008)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Golik, P., Doetsch, P., Ney, H.: Cross-entropy vs. squared error training: a theoretical and experimental comparison. In: Interspeech, pp. 1756\u20131760 (2013)","DOI":"10.21437\/Interspeech.2013-436"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"332","DOI":"10.7763\/IJCTE.2011.V3.328","volume":"3","author":"G Panchal","year":"2011","unstructured":"Panchal, G., Ganatra, A., Kosta, Y.P., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theory Eng. 3(2), 332 (2011)","journal-title":"Int. J. Comput. Theory Eng."},{"key":"7_CR26","unstructured":"Othman, A.A.: Mixing Biometric Data For Generating Joint Identities and Preserving Privacy. Ph.D. Thesis, West Virginia University (2013)"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53465-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:24:51Z","timestamp":1709821491000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-53465-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319534640","9783319534657"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53465-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iwdw.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}