{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T21:46:47Z","timestamp":1725400007611},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icumt.2010.5676539","type":"proceedings-article","created":{"date-parts":[[2011,1,3]],"date-time":"2011-01-03T20:50:24Z","timestamp":1294087824000},"page":"828-832","source":"Crossref","is-referenced-by-count":0,"title":["Hardwired data security using smart-metric algorithm"],"prefix":"10.1109","author":[{"given":"K.","family":"Mathan Kumar","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"A.","family":"Mohammed Iris","sequence":"additional","affiliation":[]},{"given":"Sandhya","family":"Jayaraman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Fundamental of Digital Image Processing","author":"jain","year":"2009","journal-title":"PHI Third Edition"},{"key":"ref3","article-title":"MATLAB and its Application in Engineering","author":"bansal","year":"2010","journal-title":"second edition Pearson Education"},{"key":"ref10","article-title":"Hacking Biometrics, Fooling a Fingerprint Scanner","author":"kaseva","year":"0","journal-title":"03\/3003 [Referenced 24 03 2003]"},{"key":"ref6","article-title":"Digital Fundamentals","author":"floyd","year":"2005","journal-title":"Pearson Education"},{"key":"ref5","article-title":"Digital Image Processing, Pearson Education","author":"gonzalez","year":"2009","journal-title":"Third Edition"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132500"},{"key":"ref7","article-title":"PIC Microcontroller and Embedded System","author":"mazidi","year":"2009","journal-title":"Pearson Education"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/5.628674"},{"journal-title":"BIH Annu Rep","article-title":"The Web Hacking Incidents Database 2009","year":"2009","key":"ref9"},{"journal-title":"An Effecitve Algorithm For Fingerprint Matching","year":"2004","author":"hao","key":"ref1"}],"event":{"name":"2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2010)","start":{"date-parts":[[2010,10,18]]},"location":"Moscow, Russia","end":{"date-parts":[[2010,10,20]]}},"container-title":["International Congress on Ultra Modern Telecommunications and Control Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5655222\/5676472\/05676539.pdf?arnumber=5676539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:35:03Z","timestamp":1490085303000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5676539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icumt.2010.5676539","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}