{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T07:23:46Z","timestamp":1648711426568},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11623-013-0139-5","type":"journal-article","created":{"date-parts":[[2013,6,14]],"date-time":"2013-06-14T04:48:37Z","timestamp":1371185317000},"page":"352-357","source":"Crossref","is-referenced-by-count":1,"title":["Sicherheit in der Fingerabdruck-Identifikation"],"prefix":"10.1007","volume":"37","author":[{"given":"Christian","family":"Kalla","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Schuch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,15]]},"reference":[{"key":"139_CR1","first-page":"200","volume-title":"Arch Kriminal \u2014 Anthropol Kriminalistik","author":"G Ehmer","year":"1909","unstructured":"G. Ehmer, \u201cEin Gaunertrick gegen die Daktyloskopie,\u201d in Arch Kriminal \u2014 Anthropol Kriminalistik, 1909, p. 200."},{"key":"139_CR2","unstructured":"\u201eCCC,\u201c [Online]. Available: \n                    http:\/\/dasalte.ccc.de\/biometrie\/fingerabdruck_kopieren?language=de\n                    \n                  . [Zugriff am 3. 1. 2013]."},{"key":"139_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2009","unstructured":"D. Maltoni, D. Maio, A. K. Jain und S. Prabhakar, Handbook of Fingerprint Recognition, London: Springer, 2009."},{"key":"139_CR4","volume-title":"Text of 4th Working Draft 30107, Biometrics \u2014 Presentation attack detection","author":"ISO\/IEC JTC 1\/SC 37","year":"2012","unstructured":"ISO\/IEC JTC 1\/SC 37, Text of 4th Working Draft 30107, Biometrics \u2014 Presentation attack detection, 2012."},{"key":"139_CR5","unstructured":"BBC, \u201eMalaysia car thieves steal finger,\u201c [Online]. Available: \n                    http:\/\/newsbbc.co.uk\/2\/hi\/asia-pacific\/4396831.stm\n                    \n                  . [Zugriff am 3. 1. 2013]."},{"key":"139_CR6","volume-title":"Proceedings of the Third International Conference on Advances in Biometrics","author":"Z He","year":"2009","unstructured":"Z. He, Z. Sun, T. Tan und Z. Wei, \u201eEfficient Iris Spoof Detection via Boosted Local Binary Patterns,\u201c in Proceedings of the Third International Conference on Advances in Biometrics, Alghero, Italien, 2009."},{"key":"139_CR7","first-page":"4279","volume-title":"IEEE Computer Society","author":"Z S T T Hui Zhang","year":"2010","unstructured":"Z. S. T. T. Hui Zhang, \u201cContact lens detection based on weighted LBP,\u201d IEEE Computer Society, pp. 4279\u20134282, 2010."},{"key":"139_CR8","unstructured":"\u201eThats my Face,\u201c [Online]. Available: \n                    http:\/\/www.thatsmyface.com\/\n                    \n                  . [Zugriff am 3. 1. 2013]."},{"key":"139_CR9","first-page":"235","volume-title":"Recent Advances in Face Recognition","author":"G Pan","year":"2008","unstructured":"G. Pan, Z. Wu und L. Sun, \u201eLiveness detection for face recognition,\u201c Recent Advances in Face Recognition, pp. 235\u2013252, 2008."},{"key":"139_CR10","unstructured":"\u201eLivDet 2011,\u201c [Online]. Available: \n                    http:\/\/www.clarkson.edu\/citer\/research\/collections\/livdet2011\/index.html\n                    \n                  . [Zugriff am 3. 1. 2013]."},{"key":"139_CR11","unstructured":"\u201eTabula Rasa Project,\u201c [Online]. Available: \n                    http:\/\/www.tabularasaeuproject.org\/\n                    \n                  . [Zugriff am 3. 1. 2013]."},{"key":"139_CR12","unstructured":"Y. Flink, \u201eFind Biometrics,\u201c [Online]. Available: \n                    http:\/\/findbiometrics.com\/million-dollar-border-security-machines-fooled-with-ten-cent-tape\/\n                    \n                  ."},{"key":"139_CR13","unstructured":"\u201eFallbeispiel: REWE testet Zahlverfahren payeasy,\u201c [Online]. Available: \n                    http:\/\/www.e-commerce-magazin.de\/ecm\/news\/fallbeispiel-rewetestet-zahlverfahren-payeasy\n                    \n                  . [Zugriff am 3. 1. 2013]."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0139-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0139-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0139-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0139-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:36Z","timestamp":1559398956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0139-5"}},"subtitle":["Lebenderkennung im Fokus"],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":13,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["139"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0139-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}