{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:45:17Z","timestamp":1725749117164},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407789"},{"type":"electronic","value":"9783642407796"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_6","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T11:32:11Z","timestamp":1379331131000},"page":"85-94","source":"Crossref","is-referenced-by-count":0,"title":["Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Hasselberg","sequence":"first","affiliation":[]},{"given":"Rene","family":"Zimmermann","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kraetzer","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Scheidat","sequence":"additional","affiliation":[]},{"given":"Claus","family":"Vielhauer","sequence":"additional","affiliation":[]},{"given":"Karl","family":"K\u00fcmmel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/0-387-28094-4","volume-title":"Biometric User Authentication for IT Security: From Fundamentals to Handwriting","author":"C. Vielhauer","year":"2006","unstructured":"Vielhauer, C.: Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Spinger, New York (2006)"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/34.667887","volume":"20","author":"A.W. Senior","year":"1998","unstructured":"Senior, A.W., Robinson, A.J.: An Off-Line Cursive Handwriting Recognition System. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a020, 309\u2013321 (1998)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Bresenham, J.: Algorithm for computer control of a digital plotter. IBM Systems Journal 4 (1965)","DOI":"10.1147\/sj.41.0025"},{"key":"6_CR4","unstructured":"Yanikoglu, B., Sanson, P.: Off-Line Cursive Handwriting Recognition Using Style Parameters, Dartmouth College, Computer Science, Version: 1993 (PCS-TR93-192) (1993), http:\/\/www.cs.dartmouth.edu\/reports\/TR93-192.ps.Z"},{"key":"6_CR5","unstructured":"Koppenhaver, K.: Forensic Document Examination: Principles and Practices. Humana Press (2007)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-13241-4_17","volume-title":"Communications and Multimedia Security","author":"K. K\u00fcmmel","year":"2010","unstructured":"K\u00fcmmel, K., Vielhauer, C., Scheidat, T., Franke, D., Dittmann, J.: Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. In: De Decker, B., Schaum\u00fcller-Bichl, I. (eds.) CMS 2010. LNCS, vol.\u00a06109, pp. 178\u2013190. Springer, Heidelberg (2010)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-31971-6_2","volume-title":"Transactions on Data Hiding and Multimedia Security VIII","author":"A. Makrushin","year":"2012","unstructured":"Makrushin, A., Scheidat, T., Vielhauer, C.: Improving reliability of biometric hash generation through the selection of dynamic handwriting features. In: Shi, Y.Q., Katzenbeisser, S. (eds.) Transactions on DHMS VIII. LNCS, vol.\u00a07228, pp. 19\u201341. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T03:28:45Z","timestamp":1596511725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40779-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40779-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}