{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:48:24Z","timestamp":1760708904641,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/chinasip.2015.7230527","type":"proceedings-article","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T21:54:20Z","timestamp":1441317260000},"page":"861-865","source":"Crossref","is-referenced-by-count":10,"title":["A printer forensics method using halftone dot arrangement model"],"prefix":"10.1109","author":[{"given":"Han","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiangwei","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Shize","family":"Shang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1117\/12.705849","article-title":"Forensic classification of imaging sensor types","author":"khanna","year":"2007","journal-title":"Electronic Imaging 2007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2011.5938145"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572349"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854803"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495377"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959855"},{"key":"ref4","first-page":"65050s","article-title":"Robust scanner identification based on noise features","volume":"6505","author":"gou","year":"2007","journal-title":"Proc SPIE Electronic Imaging Security Steganography and Watermarking of Multimedia Contents IX Proc SPIE Int Soc Opt Eng"},{"key":"ref3","first-page":"2909","article-title":"Printer forensics based on document's geometric distortion","author":"wu","year":"2009","journal-title":"Proceedings of the 2009 16th IEEE International Conference on Image Processing (ICIP 2009)"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s10032-011-0181-5","article-title":"Text-line examination for document forgery detection","volume":"16","author":"beusekom","year":"2013","journal-title":"International Journal on Document Analysis and Recognition"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959851"},{"key":"ref8","article-title":"Document Forgery Detection Using Distortion Mutation of Geometric Parameters in Characters","author":"shang","year":"2014","journal-title":"Journal of Electronic Imaging"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2014-140"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.845377"},{"key":"ref1","first-page":"78800r1","article-title":"Forensic printer detection using intrinsic signatures","author":"mikkilineni","year":"2011","journal-title":"Proc SPIE-IS&T Electronic Imaging 7880"},{"year":"0","key":"ref9","article-title":"Printer steganography"}],"event":{"name":"2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)","start":{"date-parts":[[2015,7,12]]},"location":"Chengdu, China","end":{"date-parts":[[2015,7,15]]}},"container-title":["2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7177532\/7230339\/07230527.pdf?arnumber=7230527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T05:06:56Z","timestamp":1567141616000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7230527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/chinasip.2015.7230527","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}