{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:56:26Z","timestamp":1756000586974,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T00:00:00Z","timestamp":1520553600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10664-018-9600-2","type":"journal-article","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T01:34:30Z","timestamp":1520559270000},"page":"3187-3220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["On the correctness of electronic documents: studying, finding, and localizing inconsistency bugs in PDF readers and files"],"prefix":"10.1007","volume":"23","author":[{"given":"Tomasz","family":"Kuchta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1823-0061","authenticated-orcid":false,"given":"Thibaud","family":"Lutellier","sequence":"additional","affiliation":[]},{"given":"Edmund","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Cadar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,9]]},"reference":[{"key":"9600_CR1","unstructured":"Archlinux (2015) [wontfix] wrong colours in adobe reader (acroread). https:\/\/bbs.archlinux.org\/viewtopic.php?id=193918"},{"key":"9600_CR2","unstructured":"Arthur D, Vassilvitskii S (2007) k-means+ +: the advantages of careful seeding. In: Proceedings of the eighteenth annual ACM-SIAM symposium on discrete algorithms. Society for industrial and applied mathematics, Philadelphia, pp 1027\u20131035"},{"key":"9600_CR3","unstructured":"Bugzilla (2016) bug 94260 - pdf file doesn\u2019t load or is displayed inconsistently. https:\/\/bugs.freedesktop.org\/show_bug.cgi?id=94260"},{"key":"9600_CR4","unstructured":"Bugzilla@Mozilla (2016) Bug 1244729 - [PDF Viewer] Incorrect PDF display (large portions of the map appear as black). https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1244729"},{"key":"9600_CR5","doi-asserted-by":"crossref","unstructured":"Choudhary SR (2011) Detecting cross-browser issues in web applications. In: 2011 33rd international conference on Software engineering (ICSE). IEEE, Piscataway, pp 1146\u20131148","DOI":"10.1145\/1985793.1986024"},{"key":"9600_CR6","doi-asserted-by":"crossref","unstructured":"Choudhary SR, Versee H, Orso A (2010) Webdiff: automated identification of cross-browser issues in web applications. In: 2010 IEEE international conference on Software maintenance (ICSM). IEEE, Piscataway, pp 1\u201310","DOI":"10.1109\/ICSM.2010.5609723"},{"key":"9600_CR7","doi-asserted-by":"crossref","unstructured":"Choudhary SR, Prasad MR, Orso A (2012) Crosscheck: combining crawling and differencing to better detect cross-browser incompatibilities in web applications. In: 2012 IEEE fifth international conference on Software testing, verification and validation (ICST). IEEE, Piscataway, pp 171\u2013180","DOI":"10.1109\/ICST.2012.97"},{"key":"9600_CR8","unstructured":"Chromium Bug Tracker (2016) PDF\u2019s not displaying with Chromes PDF Distiller. https:\/\/code.google.com\/p\/chromium\/issues\/detail?id=333918"},{"key":"9600_CR9","unstructured":"Complex-wavelet structural similarity index (cw-ssim) (2013) http:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/43017-complex-wavelet-structural-similarity-index--cw-ssim-"},{"key":"9600_CR10","doi-asserted-by":"crossref","unstructured":"Corona I, Maiorca D, Ariu D, Giacinto G (2014) Lux0r: detection of malicious pdf-embedded javascript code through discriminant analysis of api references. In: Proceedings of the 2014 workshop on artificial intelligent and security workshop. ACM, New York, pp 47\u201357","DOI":"10.1145\/2666652.2666657"},{"key":"9600_CR11","unstructured":"Demsky B, Rinard M (2005) Data structure repair using goal-directed reasoning. In: Proceedings of the 27th international conference on software engineering. ACM, New York, pp 176\u2013185"},{"issue":"3","key":"9600_CR12","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1504\/IJWET.2007.012055","volume":"3","author":"C Eaton","year":"2007","unstructured":"Eaton C, Memon AM (2007) An empirical approach to evaluating web application compliance across diverse client platform configurations. Int J Web Eng Technol 3 (3):227\u2013253","journal-title":"Int J Web Eng Technol"},{"key":"9600_CR13","volume-title":"PDF Specification for IEEE xplore (Part A-core requirements)","author":"IC ENGINEERING","year":"2008","unstructured":"ENGINEERING IC (2008) PDF Specification for IEEE xplore (Part A-core requirements). IEEE, Piscataway"},{"key":"9600_CR14","doi-asserted-by":"publisher","first-page":"S2","DOI":"10.1016\/j.diin.2009.06.016","volume":"6","author":"S Garfinkel","year":"2009","unstructured":"Garfinkel S, Farrell P, Roussev V, Dinolt G (2009) Bringing science to digital forensics with standardized forensic corpora. Digit Investig 6:S2\u2013S11","journal-title":"Digit Investig"},{"key":"9600_CR15","unstructured":"Google Chrome Help Forum (2015) PDF viewer bug with tcpdf. https:\/\/productforums.google.com\/forum\/#!msg\/chrome\/tVNKJhiv-XQ\/tH9RZyPlJGwJ"},{"key":"9600_CR16","doi-asserted-by":"publisher","first-page":"S94","DOI":"10.1016\/j.diin.2017.06.004","volume":"22","author":"C Grajeda","year":"2017","unstructured":"Grajeda C, Breitinger F, Baggili I (2017) Availability of datasets for digital forensics\u2013and what is missing. Digit Investig 22:S94\u2013S105","journal-title":"Digit Investig"},{"issue":"13","key":"9600_CR17","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1049\/el:20080522","volume":"44","author":"Q Huynh-Thu","year":"2008","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image\/video quality assessment. Electron Lett 44(13):800\u2013801","journal-title":"Electron Lett"},{"key":"9600_CR18","volume-title":"Part 1, graphic technology: pre press digital data exchange","author":"ISO","year":"2001","unstructured":"ISO (2001) Part 1, graphic technology: pre press digital data exchange. ISO, Geneva"},{"key":"9600_CR19","volume-title":"Document management: electronic document file format for long-term preservation","author":"ISO","year":"2005","unstructured":"ISO (2005) Document management: electronic document file format for long-term preservation. ISO, Geneva"},{"key":"9600_CR20","doi-asserted-by":"crossref","unstructured":"Kuchta T, Cadar C, Castro M, Costa M (2014) Docovery: toward generic automatic document recovery. In: Proceedings of the 29th ACM\/IEEE international conference on automated software engineering. ACM, New York, pp 563\u2013574","DOI":"10.1145\/2642937.2643004"},{"key":"9600_CR21","unstructured":"Laskov P (2013) Detection of malicious pdf files based on hierarchical document structure. In: Proceedings of the network and distributed system security symposium, NDSS 2013. The internet society, Reston"},{"key":"9600_CR22","doi-asserted-by":"crossref","unstructured":"Laskov P, \u0160Rndi\u0107 N (2011) Static detection of malicious javascript-bearing pdf documents. In: Proceedings of the 27th annual computer security applications conference. ACM, New York, pp 373\u2013382","DOI":"10.1145\/2076732.2076785"},{"key":"9600_CR23","doi-asserted-by":"crossref","unstructured":"Long F, Ganesh V, Carbin M, Sidiroglou S, Rinard M (2012) Automatic input rectification. In: 2012 34th international conference on software engineering (ICSE). IEEE, Piscataway, pp 80\u201390","DOI":"10.1109\/ICSE.2012.6227204"},{"key":"9600_CR24","unstructured":"MacQueen J (1965) On convergence of k-means and partitions with minimum average variance. In: Annals of mathematical statistics, vol 36, p 1084. INST MATHEMATICAL STATISTICS IMS BUSINESS OFFICE-SUITE 7, 3401 INVESTMENT BLVD, HAYWARD, CA 94545"},{"key":"9600_CR25","unstructured":"MacQueen J et al. (1967) Some methods for classification and analysis of multivariate observations. In: Proceedings of the fifth berkeley symposium on mathematical statistics and probability, vol. 1, Oakland, pp 281\u2013297"},{"key":"9600_CR26","doi-asserted-by":"crossref","unstructured":"Maiorca D, Corona I, Giacinto G (2013) Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security. ACM, New York, pp 119\u2013130","DOI":"10.1145\/2484313.2484327"},{"key":"9600_CR27","unstructured":"Matlabpyrtools (2016) http:\/\/www.cns.nyu.edu\/~lcv\/software.php"},{"key":"9600_CR28","doi-asserted-by":"crossref","unstructured":"Mesbah A, Prasad MR (2011) Automated cross-browser compatibility testing. In: Proceedings of the 33rd international conference on software engineering. ACM, New York, pp 561\u2013570","DOI":"10.1145\/1985793.1985870"},{"key":"9600_CR29","unstructured":"Mozilla Support Forum (2013) PDF.js not being displayed correctly. https:\/\/support.mozilla.org\/en-US\/questions\/948061"},{"issue":"3","key":"9600_CR30","doi-asserted-by":"publisher","first-page":"66","DOI":"10.5121\/ijsea.2011.2305","volume":"2","author":"JG Ochin","year":"2011","unstructured":"Ochin JG (2011) Cross browser incompatibility: reasons and solutions. International Journal of Software Engineering & Applications (IJSEA) 2(3):66\u201377","journal-title":"International Journal of Software Engineering & Applications (IJSEA)"},{"key":"9600_CR31","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw PJ (1987) Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J Comput Appl Math 20:53\u201365","journal-title":"J Comput Appl Math"},{"key":"9600_CR32","doi-asserted-by":"crossref","unstructured":"Roy Choudhary S, Prasad MR, Orso A (2014) X-pert: a web application testing tool for cross-browser inconsistency detection. In: Proceedings of the 2014 international symposium on software testing and analysis. ACM, New York, pp 417\u2013420","DOI":"10.1145\/2610384.2628057"},{"key":"9600_CR33","first-page":"503","volume-title":"Lecture Notes in Computer Science","author":"T\u00f5nis Saar","year":"2014","unstructured":"Saar T, Dumas M, Kaljuve M, Semenenko N (2014) Cross-browser testing in browserbite. In: Web engineering. Springer, Berlin, pp 503\u2013506"},{"issue":"11","key":"9600_CR34","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1109\/TIP.2009.2025923","volume":"18","author":"MP Sampat","year":"2009","unstructured":"Sampat MP, Wang Z, Gupta S, Bovik AC, Markey MK (2009) Complex wavelet structural similarity: a new image similarity index. IEEE Trans Image Process 18(11):2385\u20132401","journal-title":"IEEE Trans Image Process"},{"key":"9600_CR35","unstructured":"Scikit learn (2017) http:\/\/scikit-learn.org\/stable\/"},{"key":"9600_CR36","doi-asserted-by":"crossref","unstructured":"Smutz C, Stavrou A (2012) Malicious pdf detection using metadata and structural features. In: Proceedings of the 28th annual computer security applications conference. ACM, New York, pp 239\u2013248","DOI":"10.1145\/2420950.2420987"},{"issue":"6479","key":"9600_CR37","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1038\/369395a0","volume":"369","author":"JA Solomon","year":"1994","unstructured":"Solomon JA, Pelli DG et al. (1994) The visual filter mediating letter identification. Nature 369(6479):395\u2013397","journal-title":"Nature"},{"key":"9600_CR38","doi-asserted-by":"crossref","unstructured":"Tzermias Z, Sykiotakis G, Polychronakis M, Markatos EP (2011) Combining static and dynamic analysis for the detection of malicious documents. In: Proceedings of the fourth european workshop on system security. ACM, New York, p 4","DOI":"10.1145\/1972551.1972555"},{"key":"9600_CR39","unstructured":"Xvfb (2010) x window system version 11 release 7.6. http:\/\/www.x.org\/archive\/X11R7.6\/"},{"key":"9600_CR40","unstructured":"Zauner C (2010) Implementation and benchmarking of perceptual image hash functions na"},{"issue":"2","key":"9600_CR41","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/32.988498","volume":"28","author":"A Zeller","year":"2002","unstructured":"Zeller A, Hildebrandt R (2002) Simplifying and isolating failure-inducing input. IEEE Trans Softw Eng 28(2):183\u2013200","journal-title":"IEEE Trans Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9600-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9600-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9600-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T11:04:40Z","timestamp":1570878280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9600-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,9]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9600"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9600-2","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2018,3,9]]},"assertion":[{"value":"9 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}