{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:04:39Z","timestamp":1725771879690},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/icip.2010.5652420","type":"proceedings-article","created":{"date-parts":[[2010,12,10]],"date-time":"2010-12-10T23:00:11Z","timestamp":1292022011000},"page":"4329-4332","source":"Crossref","is-referenced-by-count":7,"title":["Randomly driven fuzzy key extraction of unclonable images"],"prefix":"10.1109","author":[{"given":"Saloomeh","family":"Shariati","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Jacques","sequence":"additional","affiliation":[]},{"given":"Francois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Macq","sequence":"additional","affiliation":[]},{"given":"Mohamed Amin","family":"Salhi","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Antoine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-4198-5_20"},{"journal-title":"TOMO3D Project WIST2 Program Contract n?616444","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"journal-title":"Digital Communications","year":"2001","author":"proakis","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/509961.509965"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1088\/0266-5611\/23\/3\/008"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327494"},{"journal-title":"Optical Shop Testing","year":"1992","author":"malacara","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"5","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Lect Notes Comp Sc"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1006\/acha.2000.0313"},{"journal-title":"The Concentration of Measure Phenomenon","year":"2001","author":"ledoux","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/227683.227684"}],"event":{"name":"2010 17th IEEE International Conference on Image Processing (ICIP 2010)","start":{"date-parts":[[2010,9,26]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 IEEE International Conference on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5641636\/5648792\/05652420.pdf?arnumber=5652420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:08:47Z","timestamp":1497877727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5652420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icip.2010.5652420","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}