{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T00:25:30Z","timestamp":1708734330294},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T00:00:00Z","timestamp":1696464000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T00:00:00Z","timestamp":1696464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00503-z","type":"journal-article","created":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T07:01:46Z","timestamp":1696489306000},"page":"127-133","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection against adversarial attacks with randomization of recognition algorithm"],"prefix":"10.1007","volume":"20","author":[{"given":"Grigory","family":"Marshalko","sequence":"first","affiliation":[]},{"given":"Svetlana","family":"Koreshkova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,5]]},"reference":[{"issue":"3","key":"503_CR1","first-page":"428","volume":"18","author":"GM Lavrentyeva","year":"2018","unstructured":"Lavrentyeva, G.M., Novoselov, S.A., Kozlov, A.V., Kudashev, O.Y., Shchemelinin, V.L., Matveev, Y.N., De Marsico, M.: Audio-replay attacks spoofing detection for speaker recognition systems. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(3), 428\u2013436 (2018)","journal-title":"Sci. Tech. J. Inf. Technol. Mech. Opt."},{"issue":"4","key":"503_CR2","first-page":"702","volume":"17","author":"YN Matveev","year":"2017","unstructured":"Matveev, Y.N., Volkova, S.S.: Convolutional neural networks for anti-face spoofing. Sci. Tech. J. Inf. Technol. Mech. Opt. 17(4), 702\u2013710 (2017)","journal-title":"Sci. Tech. J. Inf. Technol. Mech. Opt."},{"key":"503_CR3","doi-asserted-by":"crossref","unstructured":"Kruglova, S., Marshalko, G.: Investigating the possibility of bypassing biometric facial recognition systems using the LBP algorithm. Voprosy kiberbrzopasnosti 1, 45\u201352 (2019)","DOI":"10.21681\/2311-3456-2019-1-45-52"},{"key":"503_CR4","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TPAMI.2006.244","volume":"12","author":"T Ahonen","year":"2006","unstructured":"Ahonen, T., Hadid, A., Pietikainen, M.: Face description with local binary patterns: application to face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 12, 2037\u20132041 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"503_CR5","unstructured":"Recommendations for Standardisation R 50.1.111-2016. Information Technology. Cryptographic Data Protection. Password Protection of Key Information (2016)"},{"key":"503_CR6","unstructured":"Recommendations for Standardisation R 1323565.1.022-2018. Information Technology. Cryptographic Data Protection. Key Derivation Functions (2018)"},{"key":"503_CR7","unstructured":"Fisher, R.A., Yates, F.: Oliver and Boyd (1938)"},{"issue":"6","key":"503_CR8","first-page":"600","volume":"4","author":"JA Ojo","year":"2011","unstructured":"Ojo, J.A., Adeniran, S.A.: Colour face image database for skin segmentation, face detection, recognition and tracking of black faces under real-life situations. Int. J. Image Process. 4(6), 600 (2011)","journal-title":"Int. J. Image Process."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00503-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00503-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00503-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T11:24:37Z","timestamp":1708687477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00503-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,5]]},"references-count":8,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["503"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00503-z","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,5]]},"assertion":[{"value":"12 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}