{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:02:40Z","timestamp":1764838960449,"version":"3.46.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,3]]},"DOI":"10.1109\/icumt67815.2025.11268571","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:02Z","timestamp":1764787202000},"page":"306-310","source":"Crossref","is-referenced-by-count":0,"title":["Biometric Signature Recovery under Rotational Attacks Using Embedded Watermarks"],"prefix":"10.1109","author":[{"given":"Ruben","family":"Copado-Torreblanca","sequence":"first","affiliation":[{"name":"Tecnocampus, Universitat Pompeu Fabra Matar&#x00F3;,Engineering Department,Barcelona,Spain"}]},{"given":"Marcos","family":"Faundez-Zanuy","sequence":"additional","affiliation":[{"name":"Tecnocampus, Universitat Pompeu Fabra Matar&#x00F3;,Engineering Department,Barcelona,Spain"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","first-page":"1419","article-title":"Rotation, scaling and translation analysis of biometric signature templates","volume":"2","author":"Chadha","year":"2011","journal-title":"International Journal of Computer Technology and Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2005.1499249"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2006.1662038"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.06.007"},{"article-title":"Analysis of inclinations in genuine signatures and skilled forgeries","volume-title":"In Proceedings of the 22nd Conference of the International Graphonomics Society (IGS 2025)","author":"Faundez-Zanuy","key":"ref5"},{"key":"ref6","first-page":"1337","article-title":"Blind watermarking of online handwritten signals based on dct","volume-title":"In Proceedings of the 33rd European Signal Processing Conference (EUSIPCO)","author":"Faundez-Zanuy"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.126214"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-025-10436-y"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43085-5_36"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21437\/Eurospeech.1997-504"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20031078"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.10.006"}],"event":{"name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2025,11,3]]},"location":"Florence, Italy","end":{"date-parts":[[2025,11,5]]}},"container-title":["2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268479\/11268547\/11268571.pdf?arnumber=11268571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:58:28Z","timestamp":1764838708000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icumt67815.2025.11268571","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]}}}