{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:04:13Z","timestamp":1725728653118},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642386572"},{"type":"electronic","value":"9783642386589"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38658-9_55","type":"book-chapter","created":{"date-parts":[[2013,6,3]],"date-time":"2013-06-03T21:43:38Z","timestamp":1370295818000},"page":"602-612","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Graph-Based Descriptor for Object Matching"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Nowak","sequence":"first","affiliation":[]},{"given":"Patryk","family":"Najgebauer","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Ryga\u0142","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Scherer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"55_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D. Lowe","year":"2004","unstructured":"Lowe, D.: Distinctive Image Features from Scale-Invariant Keypoints. Int\u2019l J. Computer Vision\u00a060(2), 91\u2013110 (2004)","journal-title":"Int\u2019l J. Computer Vision"},{"issue":"9","key":"55_CR2","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1049\/el.2011.0594","volume":"47","author":"J. Ryu","year":"2011","unstructured":"Ryu, J., Park, H., Park, J.: Corner classification using Harris algorithm. Electronics Letters\u00a047(9), 536\u2013538 (2011)","journal-title":"Electronics Letters"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Matas, J., Chum, O., Martin, U., Pajdla, T.: Robust wide baseline stereo from maximally stable extremal regions. In: British Machine Vision Conference, vol.\u00a01, pp. 384\u2013393 (2002)","DOI":"10.5244\/C.16.36"},{"issue":"1","key":"55_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/B:VISI.0000027790.02288.f2","volume":"60","author":"K. Mikolajczyk","year":"2004","unstructured":"Mikolajczyk, K., Schmid, C.: Scale and affine invariant interest point detector. Int. J. Comput. Vision\u00a060(1), 63\u201386 (2004)","journal-title":"Int. J. Comput. Vision"},{"key":"55_CR5","unstructured":"Kozat, S., Venkatesan, R., Mihcak, M.: Robust perceptual image hashing via matrix invariants. In: Proc. IEEE Int. Conf. Image Processing (ICIP), pp. 2442\u20132446 (2004)"},{"issue":"3","key":"55_CR6","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V. Monga","year":"2007","unstructured":"Monga, V., Mhcak, M.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Securit\u00a02(3), 376\u2013390 (2007)","journal-title":"IEEE Trans. Inf. Forensics Securit"},{"issue":"3","key":"55_CR7","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H. Bay","year":"2008","unstructured":"Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-Up Robust Features (SURF). International Journal of Computer Vision and Image Understanding (CVIU)\u00a0110(3), 346\u2013359 (2008)","journal-title":"International Journal of Computer Vision and Image Understanding (CVIU)"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Kisku, D.R., Rattani, A., Grosso, E., Tistarelli, M.: Face Identification by SIFT-based Complete Graph Topology. In: 2007 IEEE Workshop on Automatic Identification Advanced Technologies, June 7-8, pp. 63\u201368 (2007), doi:10.1109\/AUTOID.2007.380594","DOI":"10.1109\/AUTOID.2007.380594"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Achanta, R., S\u00fcsstrunk, S.: Saliency Detection for Content-aware Image Resizing. In: IEEE International Conference on Image Processing (2009)","DOI":"10.1109\/ICIP.2009.5413815"},{"key":"55_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-540-71629-7_54","volume-title":"Adaptive and Natural Computing Algorithms","author":"R. Tadeusiewicz","year":"2007","unstructured":"Tadeusiewicz, R., Ogiela, M.R.: Why Automatic Understanding? In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol.\u00a04432, pp. 477\u2013491. Springer, Heidelberg (2007)"},{"issue":"6","key":"55_CR11","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/51.887252","volume":"19","author":"M.R. Ogiela","year":"2000","unstructured":"Ogiela, M.R., Tadeusiewicz, R.: Syntactic pattern recognition for X-ray diagnosis of pancreatic cancer. IEEE Engineering in Medicine and Biology Magazine\u00a019(6), 94\u2013105 (2000)","journal-title":"IEEE Engineering in Medicine and Biology Magazine"},{"key":"55_CR12","series-title":"LNCIS","first-page":"851","volume-title":"ICIC 2006","author":"L. Ogiela","year":"2006","unstructured":"Ogiela, L., Tadeusiewicz, R., Ogiela, M.R.: Cognitive Computing in Intelligent Medical Pattern Recognition Systems. In: Huang, D.-S., Li, K., Irwin, G.W. (eds.) ICIC 2006. LNCIS, vol.\u00a0344, pp. 851\u2013856. Springer, Heidelberg (2006)"},{"key":"55_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1007\/11424925_89","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"M.R. Ogiela","year":"2005","unstructured":"Ogiela, M.R., Tadeusiewicz, R., Ogiela, L.: Intelligent Semantic Information Retrieval in Medical Pattern Cognitive Analysis. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005, Part IV. LNCS, vol.\u00a03483, pp. 852\u2013857. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38658-9_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T16:49:33Z","timestamp":1557766173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38658-9_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386572","9783642386589"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38658-9_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}