{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:32:13Z","timestamp":1767652333970,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041549"},{"type":"electronic","value":"9783642041556"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_7","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T12:04:42Z","timestamp":1254225882000},"page":"95-106","source":"Crossref","is-referenced-by-count":17,"title":["Using DCT Features for Printing Technique and Copy Detection"],"prefix":"10.1007","author":[{"given":"Christian","family":"Schulze","sequence":"first","affiliation":[]},{"given":"Marco","family":"Schreyer","sequence":"additional","affiliation":[]},{"given":"Armin","family":"Stahl","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Breuel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"23","author":"N. Ahmed","year":"1974","unstructured":"N.\u00a0Ahmed, T.\u00a0Natarajan and K.\u00a0Rao, Discrete cosine transform, IEEE Transactions on Computers, vol. 23(1), pp. 90\u201393, 1974.","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"7_CR2","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1520\/JFS2004061","volume":"50","author":"Y. Akao","year":"2005","unstructured":"Y. Akao, K. Kobayashi and Y. Seki, Examination of spur marks found on inkjet-printed documents, Journal of Forensic Science, vol. 50(4), pp. 915\u2013923, 2005.","journal-title":"Journal of Forensic Science"},{"key":"7_CR3","unstructured":"H.\u00a0Baird, The state of the art of document image degradation modeling, Proceedings of the Fourth International Association for Pattern Recognition Workshop on Document Analysis Systems, pp. 1\u201316, 2000."},{"key":"7_CR4","unstructured":"C.\u00a0Chang and C.\u00a0Lin, LIBSVM: A Library for Support Vector Machines, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan (www.csie .ntu.edu.tw\/~cjlin\/libsvm)."},{"issue":"2","key":"7_CR5","doi-asserted-by":"crossref","first-page":"69","DOI":"10.69525\/jasqde.105","volume":"7","author":"J. Chim","year":"2004","unstructured":"J.\u00a0Chim, C.\u00a0Li, N.\u00a0Poon and S.\u00a0Leung, Examination of counterfeit banknotes printed by all-in-one color inkjet printers, Journal of the American Society of Questioned Document Examiners, vol. 7(2), pp. 69\u201375, 2004.","journal-title":"Journal of the American Society of Questioned Document Examiners"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1007\/11612704_69","volume-title":"Computer Vision \u2013 ACCV 2006","author":"H. Dasari","year":"2006","unstructured":"H.\u00a0Dasari and C.\u00a0Bhagvati, Identification of printing process using HSV colour space, Proceedings of the Seventh Asian Conference on Computer Vision, pp. 692\u2013701, 2006."},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-540-77086-2_19","volume-title":"Information Systems Security","author":"G. Gupta","year":"2007","unstructured":"G.\u00a0Gupta, R.\u00a0Sultania, S.\u00a0Mondal, S.\u00a0Saha and B.\u00a0Chanda, A structured approach to detect the scanner-printer used in generating fake documents, Proceedings of the Third International Conference on Information Systems Security, pp. 250\u2013253, 2007."},{"key":"7_CR8","unstructured":"C.\u00a0Hsu, C.\u00a0Chang and C.\u00a0Lin, A Practical Guide to Support Vector Classification, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan (www .csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf), 2003."},{"volume-title":"Scientific Examination of Questioned Documents","year":"2006","key":"7_CR9","unstructured":"J.\u00a0Kelly and B.\u00a0Lindblom (Eds.), Scientific Examination of Questioned Documents, CRC Press, Boca Raton, Florida, 2006."},{"key":"7_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-29900-4","volume-title":"Handbook of Print Media","author":"H. Kipphan","year":"2001","unstructured":"H.\u00a0Kipphan, Handbook of Print Media, Springer, Heidelberg, Germany, 2001."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"C.\u00a0Lampert, L.\u00a0Mei and T.\u00a0Breuel, Printing technique classification for document counterfeit detection, Proceedings of the International Conference on Computational Intelligence and Security, pp. 639\u2013644, 2006.","DOI":"10.1109\/ICCIAS.2006.294214"},{"issue":"2","key":"7_CR12","doi-asserted-by":"crossref","first-page":"105","DOI":"10.69525\/jasqde.110","volume":"7","author":"C. Li","year":"2004","unstructured":"C.\u00a0Li, W.\u00a0Chan, Y.\u00a0Cheng and S.\u00a0Leung, The differentiation of color laser printers, Journal of the American Society of Questioned Document Examiners, vol. 7(2), pp. 105\u2013109, 2004.","journal-title":"Journal of the American Society of Questioned Document Examiners"},{"issue":"2","key":"7_CR13","doi-asserted-by":"crossref","first-page":"71","DOI":"10.69525\/jasqde.132","volume":"9","author":"J. Makris","year":"2006","unstructured":"J.\u00a0Makris, S.\u00a0Krezias and V.\u00a0Athanasopoulou, Examination of newspapers, Journal of the American Society of Questioned Document Examiners, vol. 9(2), pp. 71\u201375, 2006.","journal-title":"Journal of the American Society of Questioned Document Examiners"},{"key":"7_CR14","unstructured":"A.\u00a0Mikkilineni, P.\u00a0Chiang, G.\u00a0Ali, G.\u00a0Chiu, J.\u00a0Allebach and E.\u00a0Delp, Printer identification based on gray level co-occurrence features for security and forensic applications, Proceedings of the SPIE, vol. 5681, pages 430\u2013440, 2005."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"J.\u00a0Oliver and J.\u00a0Chen, Use of signature analysis to discriminate digital printing technologies, Proceedings of the International Conference on Digital Printing Technologies, pp. 218\u2013222, 2002.","DOI":"10.2352\/ISSN.2169-4451.2002.18.1.art00055_1"},{"issue":"1","key":"7_CR16","first-page":"39","volume":"5","author":"A. Osborn","year":"2002","unstructured":"A.\u00a0Osborn and A.\u00a0Osborn, Questioned documents, Journal of the American Society of Questioned Document Examiners, vol. 5(1), pp. 39\u201344, 2002.","journal-title":"Journal of the American Society of Questioned Document Examiners"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-85303-9_4","volume-title":"Computational Forensics","author":"C. Schulze","year":"2008","unstructured":"C.\u00a0Schulze, M.\u00a0Schreyer, A.\u00a0Stahl and T.\u00a0Breuel, Evaluation of gray level features for printing technique classification in high-throughput document management systems, Proceedings of the Second International Workshop on Computational Forensics, pp. 35\u201346, 2008."},{"key":"7_CR18","unstructured":"J.\u00a0Tchan, The development of an image analysis system that can detect fraudulent alterations made to printed images, Proceedings of the SPIE, vol. 5310, pp. 151\u2013159, 2004."},{"issue":"2","key":"7_CR19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.69525\/jasqde.62","volume":"4","author":"J. Tweedy","year":"2001","unstructured":"J.\u00a0Tweedy, Class characteristics of counterfeit protection system codes of color laser copiers, Journal of the American Society of Questioned Document Examiners, vol. 4(2), pp. 53\u201366, 2001.","journal-title":"Journal of the American Society of Questioned Document Examiners"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T12:13:49Z","timestamp":1739362429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}