{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:35:29Z","timestamp":1723034129206},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,9,8]],"date-time":"2017-09-08T00:00:00Z","timestamp":1504828800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s12083-017-0606-0","type":"journal-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T18:43:39Z","timestamp":1505155419000},"page":"1166-1175","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems"],"prefix":"10.1007","volume":"11","author":[{"given":"Jungpil","family":"Shin","sequence":"first","affiliation":[]},{"given":"Zhaofeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cheol Min","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyung-Jin","family":"Mun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,8]]},"reference":[{"issue":"4","key":"606_CR1","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/s12083-014-0298-7","volume":"8","author":"J Han","year":"2015","unstructured":"Han J (2015) Distributed hybrid P2P networking systems. Peer-to-Peer Networking Appl 8(4):555\u2013556","journal-title":"Peer-to-Peer Networking Appl"},{"issue":"6","key":"606_CR2","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang Q, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking Appl 8(6):1070\u20131081","journal-title":"Peer-to-Peer Networking Appl"},{"issue":"3","key":"606_CR3","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s11416-016-0270-6","volume":"12","author":"H-J Mun","year":"2016","unstructured":"Mun H-J, Han K-H (2016) Blackhole attack: user identity and password seize attack using honeypot. J Comput Virology Hacking Tech 12(3):185\u2013190","journal-title":"J Comput Virology Hacking Tech"},{"key":"606_CR4","doi-asserted-by":"publisher","unstructured":"Wu F, Xu L, Kumari S, Li X (2016) An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications, https:\/\/doi.org\/10.1007\/s12083-016-0485-9 . August (first published online)","DOI":"10.1007\/s12083-016-0485-9"},{"issue":"1","key":"606_CR5","doi-asserted-by":"crossref","first-page":"17","DOI":"10.22266\/ijies2009.0331.03","volume":"2","author":"Y Yan","year":"2009","unstructured":"Yan Y, Chen C, Deng W, Yuan F (2009) Chinese handwriting identification based on stable spectral feature of texture images. Int J Intell Eng Syst 2(1):17\u201322","journal-title":"Int J Intell Eng Syst"},{"issue":"1","key":"606_CR6","first-page":"4","volume":"1-2010","author":"MN Abdi","year":"2010","unstructured":"Abdi MN, Khemakhem M (2010) Off-line text-independent Arabic writer identification using contour-based features. Int J Signal Image Proc 1-2010(1):4\u201311","journal-title":"Int J Signal Image Proc"},{"issue":"1","key":"606_CR7","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/S0031-3203(99)00006-0","volume":"33","author":"H Said","year":"2000","unstructured":"Said H, Tan T, Baker K (2000) Personal identification based on handwriting. Pattern Recogn 33(1):149\u2013160","journal-title":"Pattern Recogn"},{"issue":"6","key":"606_CR8","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/TPAMI.2004.18","volume":"26","author":"L Schomaker","year":"2004","unstructured":"Schomaker L, Bulacu M (2004) Automatic writer identification using connected-component contours and edge-based features of uppercase western script. IEEE Trans Pattern Anal Mach Intell 26(6):787\u2013798","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"13","key":"606_CR9","doi-asserted-by":"crossref","first-page":"2080","DOI":"10.1016\/j.patrec.2005.03.024","volume":"26","author":"A Bensefia","year":"2005","unstructured":"Bensefia A, Paquet T, Heutte L (2005) A Writer Identification and Verification system. Pattern Recogn Lett 26(13):2080\u20132092","journal-title":"Pattern Recogn Lett"},{"issue":"4","key":"606_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1520\/JFS15447J","volume":"47","author":"SN Srihari","year":"2002","unstructured":"Srihari SN, Cha S-H, Arora H, Lee S (2002) Individuality of handwriting. J Forensic Sci 47(4):1\u201317","journal-title":"J Forensic Sci"},{"key":"606_CR11","doi-asserted-by":"crossref","unstructured":"E. Zois, Morphological waveform coding for writer identification. Electronics Laboratory, Physics Department, University of Patras, Greece, 33: 385\u2013398, 2000","DOI":"10.1016\/S0031-3203(99)00063-1"},{"key":"606_CR12","doi-asserted-by":"crossref","unstructured":"C. Tomai, B. Zhang, and S. Srihari, Discriminatory power of handwritten words for writer recognition. International conference pattern recognition (ICPR2004), NY, 2: 638\u2013641, 2004","DOI":"10.1109\/ICPR.2004.1334329"},{"key":"606_CR13","doi-asserted-by":"crossref","unstructured":"Zhang B, Srihari S, Lee S (2003) Individuality of handwritten characters. Seventh international conference on document analysis and recognition (ICDAR), pp 1086-1090","DOI":"10.1109\/ICDAR.2003.1227824"},{"issue":"5","key":"606_CR14","first-page":"331","volume":"4","author":"A Soma","year":"2014","unstructured":"Soma A, Mizutani K, Arai M (2014) Writer identification for offline handwritten kanji characters using multiple features. Int J Inf Electron Eng 4(5):331\u2013335","journal-title":"Int J Inf Electron Eng"},{"key":"606_CR15","unstructured":"Siewkeng C, Yonghaur T, Christian V (2007) Online text independent writer identification using character prototypes distribution. 6th international conference on information, Communications & Signal Processing, Utar, Malaysia, pp 1\u20135, 10\u201313"},{"issue":"7","key":"606_CR16","doi-asserted-by":"crossref","first-page":"2381","DOI":"10.1016\/j.patcog.2008.01.006","volume":"41","author":"A Schlapbach","year":"2008","unstructured":"Schlapbach A, Liwicki M, Bunke H (2008) A Writer Identification System for on-line whiteboard data. Pattern Recogn 41(7):2381\u20132397","journal-title":"Pattern Recogn"},{"key":"606_CR17","doi-asserted-by":"crossref","unstructured":"Li B, Sun Z, Tan T (2009) Hierarchical Shape Primitive Features for Online Text-Independent Writer Identification. 10th International Conference on Document Analysis and Recognition, ICDAR 2009, Barcelona, Spain, pp 986\u2013990, 26\u201329","DOI":"10.1109\/ICDAR.2009.53"},{"key":"606_CR18","doi-asserted-by":"crossref","unstructured":"Yang W, Jin L, Liu M (2015) Chinese character-level writer identification using path signature feature, DropStroke and deep CNN. 13th international conference on document analysis and recognition (ICDAR), Nancy, France, pp 546\u2013550, 23\u201326","DOI":"10.1109\/ICDAR.2015.7333821"},{"key":"606_CR19","unstructured":"Long Z, Yunhong W, Tieniu T (2002) Personal handwriting identification based on PCA. Proceedings of the SPIE second international conference on image and graphics, pp 766\u2013771"},{"key":"606_CR20","doi-asserted-by":"crossref","unstructured":"Matsuura T, Thumwarin P, Kato N (2008) On-line writer identification based on handwriting velocity and curvature of script. 23rd international conference on image and vision computing, New Zealand, pp 192\u2013197, 26\u201328","DOI":"10.1109\/IVCNZ.2008.4762097"},{"key":"606_CR21","unstructured":"Shin J, Liu Z (2015) Writer identification method using inter and intra-stroke information. The fifth international conference on advanced communications and computation (Infocomp2015), pp 80-83, June 21-26, Brussels, Belgium"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-017-0606-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0606-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0606-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T09:51:30Z","timestamp":1570096290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-017-0606-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,8]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["606"],"URL":"https:\/\/doi.org\/10.1007\/s12083-017-0606-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,8]]}}}