{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:30:40Z","timestamp":1758274240704},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/icip.2014.7025858","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T12:41:49Z","timestamp":1423140109000},"page":"4226-4230","source":"Crossref","is-referenced-by-count":2,"title":["Recovering planar projections of printed clustered-dot halftones"],"prefix":"10.1109","author":[{"given":"Stephen","family":"Pollard","sequence":"first","affiliation":[]},{"given":"Robert","family":"Ulichney","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Gaubatz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1117\/12.465289","article-title":"A method for the estimation and recovering from general affine transforms in digital watermarking applications","author":"deguillaume","year":"2002","journal-title":"Proc SPIE 4675 Security and Watermarking of Multimedia Contents IV"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/el:19930207"},{"year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1993.340983"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1998.698649"},{"key":"ref4","first-page":"121","article-title":"An iterative image registration technique with an application to stereo vision","author":"lucas","year":"1981","journal-title":"Image Understanding Workshop"},{"key":"ref3","article-title":"Pyramid Implementation of Lucas Kanade Feature Tracker: Description of the algorithm","author":"bouguet","year":"1999","journal-title":"Open Document"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000011205.11775.fd"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990498"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811685"},{"key":"ref2","first-page":"109","article-title":"Forensic Authentication of Data Bearing Halftones","author":"pollard","year":"2013","journal-title":"INSTICC VISAPP"},{"key":"ref1","article-title":"Encoding information in clustered-dot halftones","author":"ulichney","year":"2010","journal-title":"Proc IS&T 26th Intl Conf on Digital Printing Technologies and Digital Fabrication (NIP26) 602&#x2013;605"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00132-8"}],"event":{"name":"2014 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2014,10,27]]},"location":"Paris, France","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6992914\/7024995\/07025858.pdf?arnumber=7025858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:01:37Z","timestamp":1498179697000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7025858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icip.2014.7025858","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}