{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:37:40Z","timestamp":1725910660612},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811063879"},{"type":"electronic","value":"9789811063886"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6388-6_35","type":"book-chapter","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T10:13:30Z","timestamp":1505470410000},"page":"424-432","source":"Crossref","is-referenced-by-count":1,"title":["Plagiarism Detection in Homework Based on Image Hashing"],"prefix":"10.1007","author":[{"given":"Ying","family":"Chen","sequence":"first","affiliation":[]},{"given":"Liping","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Shiqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenping","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yuelong","family":"Chuang","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Krizkova, S., Tomaskova, H., Gavalec, M.: Preference comparison for plagiarism detection systems. In: IEEE International Conference on Fuzzy Systems, pp. 1760\u20131767 (2016). doi:\n10.1109\/FUZZ-IEEE.2016.7737903","key":"35_CR1","DOI":"10.1109\/FUZZ-IEEE.2016.7737903"},{"doi-asserted-by":"publisher","unstructured":"Xiaoping, Z., Xiaoxuan, M., Honghong, S.: Research on a VSM-based e-homework anti-plagiarism system. In: International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), pp. 102\u2013105 (2012). doi:\n10.1109\/ICIII.2012.6339788","key":"35_CR2","DOI":"10.1109\/ICIII.2012.6339788"},{"issue":"2","key":"35_CR3","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/TE.2007.906778","volume":"51","author":"F Rosales","year":"2008","unstructured":"Rosales, F., Garcia, A.F., Rodriguez, S., Pedraza, J.L., Mendez, R., Nieto, M.: Detection of plagiarism in programming assignments. IEEE Trans. Educ. 51(2), 174\u2013183 (2008). doi:\n10.1109\/TE.2007.906778","journal-title":"IEEE Trans. Educ."},{"doi-asserted-by":"publisher","unstructured":"Hadmi, A., Ouahman, A.A., Said, B.A.E., Puech, W.: Perceptual image hashing. INTECH Open Access Publisher (2012). doi:\n10.5772\/37435","key":"35_CR4","DOI":"10.5772\/37435"},{"doi-asserted-by":"publisher","unstructured":"Weng, L., Preneel, B.: A secure perceptual hash algorithm for image content authentication. In: International Conference on Communications, pp. 108\u2013121 (2011). doi:\n10.1007\/978-3-642-24712-5_9","key":"35_CR5","DOI":"10.1007\/978-3-642-24712-5_9"},{"issue":"8","key":"35_CR6","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s11042-015-2496-6","volume":"75","author":"R Davarzani","year":"2016","unstructured":"Davarzani, R., Mozaffari, S., Yaghmaie, K.: Perceptual image hashing using center-symmetric local binary patterns. Multimed. Tools Appl. 75(8), 4639\u20134667 (2016). doi:\n10.1007\/s11042-015-2496-6","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"35_CR7","doi-asserted-by":"publisher","first-page":"556","DOI":"10.13164\/re.2016.0556","volume":"25","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Xin, G.J., Xiao, Y.: Robust image hashing using radon transform and invariant features. Radioengineering 25(3), 556\u2013564 (2016). doi:\n10.13164\/re.2016.0556","journal-title":"Radioengineering"},{"key":"35_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","volume":"361","author":"C Qin","year":"2016","unstructured":"Qin, C., Chen, X., Ye, D., Wang, J., Sun, X.: A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361, 84\u201399 (2016). doi:\n10.1016\/j.ins.2016.04.036","journal-title":"Inf. Sci."},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.dsp.2015.03.006","volume":"41","author":"J Ouyang","year":"2015","unstructured":"Ouyang, J., Coatrieux, G., Shu, H.: Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digital Signal Process. 41, 98\u2013109 (2015). doi:\n10.1016\/j.dsp.2015.03.006","journal-title":"Digital Signal Process."},{"issue":"2","key":"35_CR10","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.dsp.2012.11.002","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Tsou, P.L.: Robust image hashing using non-uniform sampling in discrete Fourier domain. Digital Signal Process. 23(2), 578\u2013585 (2013). doi:\n10.1016\/j.dsp.2012.11.002","journal-title":"Digital Signal Process."},{"doi-asserted-by":"publisher","unstructured":"Monga, V., Evans, B.L.: Robust perceptual image hashing using feature points. In: International Conference on Image Processing, pp. 677\u2013680 (2004). doi:\n10.1109\/ICIP.2004.1418845","key":"35_CR11","DOI":"10.1109\/ICIP.2004.1418845"},{"doi-asserted-by":"publisher","unstructured":"Ahmed, F., Siyal, M.Y.: A novel hashing scheme for image authentication. In: Proceedings of the 2006 Innovations in Information Technology, pp. 1\u20135 (2006). doi:\n10.1109\/INNOVATIONS.2006.301971","key":"35_CR12","DOI":"10.1109\/INNOVATIONS.2006.301971"},{"issue":"5","key":"35_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.9790\/0661-16531319","volume":"6","author":"AK Abraham","year":"2014","unstructured":"Abraham, A.K., Haroon, R.P.: An improved hashing method for the detection of image forgery. IOSR J. Comput. Eng. 6(5), 13\u201319 (2014). doi:\n10.9790\/0661-16531319","journal-title":"IOSR J. Comput. Eng."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6388-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T10:28:23Z","timestamp":1505471303000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6388-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811063879","9789811063886"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6388-6_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}