{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:21:54Z","timestamp":1738387314111,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540853022"},{"type":"electronic","value":"9783540853039"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85303-9_5","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:33:48Z","timestamp":1218544428000},"page":"47-57","source":"Crossref","is-referenced-by-count":15,"title":["Document Signature Using Intrinsic Features for Counterfeit Detection"],"prefix":"10.1007","author":[{"given":"Joost","family":"van Beusekom","sequence":"first","affiliation":[]},{"given":"Faisal","family":"Shafait","sequence":"additional","affiliation":[]},{"given":"Thomas M.","family":"Breuel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Smith, P.J., O\u2019Doherty, P., Luna, C., McCarthy, S.: Commercial anticounterfeit products using machine vision. In: van Renesse, R.L. (ed.) Optical Security and Counterfeit Deterrence Techniques V. Presented at the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference. Proceedings of the SPIE, vol.\u00a05310, pp. 237\u2013243 (June 2004)","DOI":"10.1117\/12.525736"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Amidror, I.: A new print-based security strategy for the protection of valuable documents and products using moire intensity profiles. In: van Renesse, R.L. (ed.) Optical Security and Counterfeit Deterrence Techniques V. Proceedings of the SPIE, vol.\u00a04677, pp. 89\u2013100 (June 2002)","DOI":"10.1117\/12.462738"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Hampp, N.A., Neebe, M., Juchem, T., Wolperdinger, M., Geiger, M., Schmuck, A.: Multifunctional optical security features based on bacteriorhodopsin. In: van Renesse, R.L. (ed.) Optical Security and Counterfeit Deterrence Techniques V. Proceedings of the SPIE, vol.\u00a05310, pp. 117\u2013124 (June 2004)","DOI":"10.1117\/12.522279"},{"key":"5_CR4","unstructured":"Bernsen, J.: Dynamic thresholding of gray level images. In: Proc. Int. Conf. on Pattern Recognition, Paris, France, pp. 1251\u20131255 (1986)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Breuel, T.M.: The OCRopus open source OCR system. In: SPIE Document Recognition and Retrieval XV, San Jose, USA, pp. 0F1\u20130F15 (January 2008)","DOI":"10.1117\/12.783598"},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TPAMI.2007.70837","volume":"30","author":"F. Shafait","year":"2008","unstructured":"Shafait, F., Keysers, D., Breuel, T.M.: Performance evaluation and benchmarking of six page segmentation algorithms. IEEE Trans. on Pattern Analysis and Machine Intelligence\u00a030(6), 941\u2013954 (2008)","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"issue":"11","key":"5_CR7","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/S0262-8856(03)00137-9","volume":"21","author":"B. Zitova","year":"2003","unstructured":"Zitova, B., Flusser, J.: Image registration methods: a survey. Image and Vision Computing\u00a021(11), 977\u20131000 (2003)","journal-title":"Image and Vision Computing"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Nakai, T., Kise, K., Iwamura, M.: A method of annotation extraction from paper documents using alignment based on local arrangements of feature points. In: Int. Conf. on Document Analysis and Recognition, Curitiba, Brazil, pp. 23\u201327 (September 2007)","DOI":"10.1109\/ICDAR.2007.4378669"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Liang, J., DeMenthon, D., Doermann, D.: Camera-based document image mosaicing. In: Int. Conf. on Patt. Recog., Hong Kong, China, pp. 476\u2013479 (August 2006)","DOI":"10.1109\/ICPR.2006.352"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/978-3-540-73040-8_66","volume-title":"Image Analysis","author":"F. Shafait","year":"2007","unstructured":"Shafait, F., van Beusekom, J., Keysers, D., Breuel, T.M.: Page frame detection for marginal noise removal from scanned documents. In: Ersb\u00f8ll, B.K., Pedersen, K.S. (eds.) SCIA 2007. LNCS, vol.\u00a04522, pp. 651\u2013660. Springer, Heidelberg (2007)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-540-74936-3_51","volume-title":"Pattern Recognition","author":"J. Beusekom van","year":"2007","unstructured":"van Beusekom, J., Shafait, F., Breuel, T.M.: Image-matching for revision detection in printed historical documents. In: Hamprecht, F.A., Schn\u00f6rr, C., J\u00e4hne, B. (eds.) DAGM 2007. LNCS, vol.\u00a04713, pp. 507\u2013516. Springer, Heidelberg (2007)"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1571-0661(04)80986-1","volume":"46","author":"T.M. Breuel","year":"2001","unstructured":"Breuel, T.M.: A practical, globally optimal algorithm for geometric matching under uncertainty. Electronic Notes in Theoretical Computer Science\u00a046, 1\u201315 (2001)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/S1077-3142(03)00026-2","volume":"90","author":"T.M. Breuel","year":"2003","unstructured":"Breuel, T.M.: Implementation techniques for geometric branch-and-bound matching methods. Computer Vision and Image Understanding\u00a090(3), 258\u2013294 (2003)","journal-title":"Computer Vision and Image Understanding"},{"issue":"2","key":"5_CR14","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/TC.1972.5008926","volume":"C\u201321","author":"G.H. Granlund","year":"1972","unstructured":"Granlund, G.H.: Fourier Preprocessing for Hand Print Character Recognition. IEEE Trans. on Computers\u00a0C\u201321(2), 195\u2013201 (1972)","journal-title":"IEEE Trans. on Computers"},{"key":"5_CR15","series-title":"Lecture Notes in Artificial Intelligence","first-page":"639","volume-title":"Computational Intelligence and Security","author":"C.H. Lampert","year":"2007","unstructured":"Lampert, C.H., Mei, L., Breuel, T.M.: Printing technique classification for document counterfeit detection. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol.\u00a01, pp. 639\u2013644. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Computational Forensics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85303-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T11:52:28Z","timestamp":1738324348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85303-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540853022","9783540853039"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85303-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}