{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:02:36Z","timestamp":1725753756293},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccw.2013.6649327","type":"proceedings-article","created":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T20:36:40Z","timestamp":1383338200000},"page":"717-722","source":"Crossref","is-referenced-by-count":7,"title":["AACI: The mechanism for approximate authentication and correction of images"],"prefix":"10.1109","author":[{"given":"S. Amir Hossein A. E.","family":"Tabatabaei","sequence":"first","affiliation":[]},{"given":"Obaid","family":"Ur-Rehman","sequence":"additional","affiliation":[]},{"given":"Natasa","family":"Zivic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813603"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"journal-title":"An Introduction to Probability Theory and Its Applications","year":"1968","author":"feller","key":"18"},{"journal-title":"Digital Image Processing","year":"2004","author":"gonzalez","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34980-0_31"},{"key":"13","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/978-3-642-01877-0_19","article-title":"Un- conditional secure approximate message authentication","author":"tonien","year":"2009","journal-title":"Proc 2nd International Workshop on Coding and Cryptology"},{"key":"14","article-title":"Approximate message authentication codes","author":"graveman","year":"1999","journal-title":"Proc 3rd Annual Symposium on Advanced Telecommuni- Cation and Information Distribution Research Program (ATIRP)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73011"},{"key":"12","article-title":"Soft input decryption","author":"ruland","year":"2006","journal-title":"Proc 4th Interna- Tional Symposium on Turbo Codes and Related Topics 6th International ITG\/IEEE Conference on Source and Channel Coding"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873601"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/NSIP.2005.1502213"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/6046.923823"},{"key":"10","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/11507840_22","article-title":"Approximate message authentication and biometric entity authentication","author":"crescenzo","year":"2005","journal-title":"Proc Financial Cryptography"},{"key":"7","article-title":"Soft authentication and correction of images","author":"ur-rehman","year":"2013","journal-title":"Proc 9th International ITG Conference on Systems Communications and Coding (SCC 2013)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483479"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-007-0154-3"},{"key":"4","article-title":"A robust image authentication method surviving jpeg lossy compression","author":"lin","year":"1998","journal-title":"Proc SPIE Storage and Retrieval of Image\/Video Database"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2004.1276112","article-title":"When seeing is not believing","author":"zhu","year":"2004","journal-title":"IEEE Signal Magazine"}],"event":{"name":"2013 ICC - 2013 IEEE International Conference on Communication Workshop (ICC)","start":{"date-parts":[[2013,6,9]]},"location":"Budapest, Hungary","end":{"date-parts":[[2013,6,13]]}},"container-title":["2013 IEEE International Conference on Communications Workshops (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637583\/6649166\/06649327.pdf?arnumber=6649327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T18:59:00Z","timestamp":1564599540000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6649327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iccw.2013.6649327","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}