{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:48:32Z","timestamp":1725889712313},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642312168"},{"type":"electronic","value":"9783642312175"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31217-5_23","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T14:24:50Z","timestamp":1338906290000},"page":"207-215","source":"Crossref","is-referenced-by-count":1,"title":["The Method of Information Security Based on Micrographics"],"prefix":"10.1007","author":[{"given":"Ivanna","family":"Dronjuk","sequence":"first","affiliation":[]},{"given":"Mariya","family":"Nazarkevych","sequence":"additional","affiliation":[]},{"given":"Nikola","family":"Medykovski","sequence":"additional","affiliation":[]},{"given":"Olena","family":"Gorodetska","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"www.jura.at\/en\/index.html"},{"issue":"i3.70","key":"23_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1615\/JAutomatInfScien.v41.i3.70","volume":"41","author":"V.V. Grytsyk","year":"2009","unstructured":"Grytsyk, V.V., Dronyuk, I.M., Nazarkevych, M.A.: Information Technologies for Document Protection by Means of Ateb-Functions. Part I. Construction of Database of Ateb-Functions for Protection of Documents. Journal of Automation and Information Sciences\u00a041(i3.70), 56\u201370 (2009)","journal-title":"Journal of Automation and Information Sciences"},{"issue":"i6.50","key":"23_CR3","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1615\/JAutomatInfScien.v41.i6.50","volume":"41","author":"V.V. Grytsyk","year":"2009","unstructured":"Grytsyk, V.V., Dronyuk, I.M., Nazarkevych, M.A.: Information Technologies for Document Protection by Means of Ateb-Functions. Part II. Construction of Database of Ateb-Functions for Protection of Documents. Journal of Automation and Information Sciences\u00a041(i6.50), 70\u201379 (2009)","journal-title":"Journal of Automation and Information Sciences"},{"issue":"2","key":"23_CR4","first-page":"243","volume":"13","author":"C.H. Murrey","year":"1943","unstructured":"Murrey, C.H., Davis, F.J.: Appl. Phot.\u00a013(2), 243\u2013248 (1943)","journal-title":"Phot."},{"key":"23_CR5","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2421.001.0001","volume-title":"Digital Halftoning","author":"R. Ulichney","year":"1987","unstructured":"Ulichney, R.: Digital Halftoning. MIT Press, Cambridge (1987)"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31217-5_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:51:41Z","timestamp":1620114701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31217-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312168","9783642312175"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31217-5_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}