{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:09:35Z","timestamp":1769911775153,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,1,12]],"date-time":"2012-01-12T00:00:00Z","timestamp":1326326400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJDAR"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s10032-011-0181-5","type":"journal-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T06:07:17Z","timestamp":1326262037000},"page":"189-207","source":"Crossref","is-referenced-by-count":42,"title":["Text-line examination for document forgery detection"],"prefix":"10.1007","volume":"16","author":[{"given":"Joost","family":"van Beusekom","sequence":"first","affiliation":[]},{"given":"Faisal","family":"Shafait","sequence":"additional","affiliation":[]},{"given":"Thomas M.","family":"Breuel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,12]]},"reference":[{"key":"181_CR1","first-page":"238","volume-title":"Scientific Examination of Ques- tioned Documents","author":"B.S. Lindblom","year":"2006","unstructured":"Lindblom B.S., Gervais R.: Scientific Examination of Ques- tioned Documents, pp. 238\u2013241. Taylor and Francis, Boca Raton, FL (2006)"},{"key":"181_CR2","doi-asserted-by":"crossref","unstructured":"Smith, P.J., O\u2019Doherty, P., Luna, C., McCarthy, S.: Commercial anticounterfeit products using machine vision. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques V, vol. 5310, pp. 237\u2013243. San Jose, CA, USA (2004)","DOI":"10.1117\/12.525736"},{"key":"181_CR3","doi-asserted-by":"crossref","unstructured":"Amidror, I.: A new print-based security strategy for the protection of valuable documents and products using moire intensity profiles. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 89\u2013100. San Jose, CA, USA (2002)","DOI":"10.1117\/12.462738"},{"key":"181_CR4","doi-asserted-by":"crossref","unstructured":"Hampp, N.A., Neebe, M., Juchem T., Wolperdinger M., Geiger M., Schmuck A.: Multifunctional optical security features based on bacteriorhodopsin. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques V, vol. 5310, pp. 117\u2013124. San Jose, CA, USA (2004)","DOI":"10.1117\/12.522279"},{"key":"181_CR5","doi-asserted-by":"crossref","unstructured":"van Renesse, R.: Ordering the order, a survey of optical document security features. In: Proceedings of SPIE Conference on Practical Holography IX, pp. 268\u2013275. San Jose, CA, USA (1995)","DOI":"10.1117\/12.206227"},{"key":"181_CR6","unstructured":"van Renesse, R.: Protection of high security documents\u2014developments in holography to secure the future market and serve the public. In: Proceedings of Holo-Pack, Holo-Print, Vienna, Austria (2006)"},{"key":"181_CR7","doi-asserted-by":"crossref","unstructured":"van Renesse, R.: Hidden and scambled images\u2014a review. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 333\u2013348. San Jose, CA, USA (2002)","DOI":"10.1117\/12.462726"},{"key":"181_CR8","doi-asserted-by":"crossref","unstructured":"Ali, G.N., Chiang, P.-J., Mikkilineni, A.K., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices. In: Proceedings of the International Conference on Digital Printing Technologies, pp. 511\u2013515. New Orleans, LA, USA (2003)","DOI":"10.2352\/ISSN.2169-4451.2003.19.1.art00015_2"},{"key":"181_CR9","doi-asserted-by":"crossref","unstructured":"Mikkilineni, A.K., Chiang, P.-J., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer identification based on graylevel co-occurrence features for security and forensic applications. In: Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 430\u2013440. San Jose, CA, USA (2005)","DOI":"10.1117\/12.593796"},{"key":"181_CR10","doi-asserted-by":"crossref","unstructured":"Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Survey of scanner and printer forensics at purdue university. In: Proceedings of the 2nd International Workshop on Computational Forensics. Lecture Notes in Computer Science, vol. 5158, pp. 22\u201334. Washington, DC, USA (2008)","DOI":"10.1007\/978-3-540-85303-9_3"},{"key":"181_CR11","doi-asserted-by":"crossref","unstructured":"Schulze, C., Schreyer, M., Stahl, A., Breuel, T.M.: Evaluation of graylevel-features for printing technique classification in high-throughput document management systems. In: Proceedings of the 2nd International Workshop on Computational Forensics. Lecture Notes in Computer Science, vol. 5158, pp. 35\u201346. Washington, DC, USA (2008)","DOI":"10.1007\/978-3-540-85303-9_4"},{"key":"181_CR12","unstructured":"Schreyer, M.: Intelligent printing technique recognition and photocopy detection for forensic document examination. In: Proceedings of Informatiktage 2009, vol. S-8, pp. 39\u201342. Bonn, Germany (2009)"},{"key":"181_CR13","doi-asserted-by":"crossref","unstructured":"Schulze, C., Schreyer, M., Stahl, A., Breuel, T.M.: Using DCT features for printing technique and copy detection. In: Proceedings of the 5th International Conference on Digital Forensics, pp. 95\u2013106. Orlando, FL, USA (2009)","DOI":"10.1007\/978-3-642-04155-6_7"},{"key":"181_CR14","doi-asserted-by":"crossref","unstructured":"Breuel, T.M.: Robust least square baseline finding using a branch and bound algorithm. In: Proceedings of SPIE Document Recognition and Retrieval IX, pp. 20\u201327. San Jose, CA, USA (2002)","DOI":"10.1117\/12.450735"},{"issue":"6","key":"181_CR15","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TPAMI.2007.70837","volume":"30","author":"F. Shafait","year":"2008","unstructured":"Shafait F., Keysers D., Breuel T.M.: Performance evaluation and benchmarking of six page segmentation algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 30(6), 941\u2013954 (2008)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"181_CR16","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s10032-009-0109-5","volume":"13","author":"J. Beusekom van","year":"2010","unstructured":"van Beusekom J., Shafait F., Breuel T.M.: Combined orientation and skew detection using geometric text-line modeling. Int. J. Doc. Anal. Recognit. 13(2), 79\u201392 (2010)","journal-title":"Int. J. Doc. Anal. Recognit."},{"issue":"2","key":"181_CR17","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/34.748827","volume":"21","author":"T. Kanungo","year":"1999","unstructured":"Kanungo T., Haralick R.M.: An automatic closed-loop methodology for generating character groundtruth for scanned documents. IEEE Trans. Pattern Anal. Mach. Intell. 21(2), 179\u2013183 (1999)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"9\u201310","key":"181_CR18","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1016\/S0167-8655(02)00378-1","volume":"24","author":"T.M. Breuel","year":"2003","unstructured":"Breuel T.M.: On the use of interval arithmetic in geometric branch-and-bound algorithms. Pattern Recognit. Lett. 24(9\u201310), 1375\u20131384 (2003)","journal-title":"Pattern Recognit. Lett."},{"key":"181_CR19","unstructured":"Duda, R.O., Hart, P. E., Stork, D. G.: Pattern Classification, p. 49. Wiley, New York (2001)"},{"key":"181_CR20","doi-asserted-by":"crossref","unstructured":"van Beusekom, J., Shafait, F., Breuel, T.M.: Document signature using intrinsic features for counterfeit detection. In: Proceedings of the 2nd International Workshop on Computational Forensics. Lecture Notes in Computer Science, vol. 5158, pp. 47\u201357. Washing-ton, DC, USA (2008)","DOI":"10.1007\/978-3-540-85303-9_5"}],"container-title":["International Journal on Document Analysis and Recognition (IJDAR)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10032-011-0181-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10032-011-0181-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10032-011-0181-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T13:04:00Z","timestamp":1686661440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10032-011-0181-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,12]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["181"],"URL":"https:\/\/doi.org\/10.1007\/s10032-011-0181-5","relation":{},"ISSN":["1433-2833","1433-2825"],"issn-type":[{"value":"1433-2833","type":"print"},{"value":"1433-2825","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,12]]}}}