{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:03:34Z","timestamp":1763017414830,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/ispa.2013.6703725","type":"proceedings-article","created":{"date-parts":[[2014,4,30]],"date-time":"2014-04-30T21:13:13Z","timestamp":1398892393000},"page":"119-123","source":"Crossref","is-referenced-by-count":14,"title":["Physical object identification based on FAMOS microstructure fingerprinting: Comparison of templates versus invariant features"],"prefix":"10.1109","author":[{"given":"Maurits","family":"Diephuis","sequence":"first","affiliation":[]},{"given":"Sviatoslav","family":"Voloshynovskiy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811685"},{"journal-title":"Vlfeat An Open and Portable Library of Computer Vision Algorithms","year":"2008","author":"vedaldi","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007906812782"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592809"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089378"},{"key":"1","article-title":"Towards reproducible results in authentication based on physical noncloneable functions the forensic authentication microstructure optical set (famos)","author":"voloshynovskiy","year":"2012","journal-title":"Proceedings of IEEE International Workshop on Information Forensics and Security"},{"key":"10","volume":"2","author":"kay","year":"1993","journal-title":"Fundamentals of Statistical Signal Processing"},{"key":"7","first-page":"404","article-title":"Surf speeded up robust features","author":"bay","year":"2006","journal-title":"ECCV"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.5244\/C.16.23"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412638"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2003.1228096"},{"key":"9","article-title":"Physical object authentication with correlated camera noise","author":"beekhof","year":"2013","journal-title":"15th GI-Symposium Database Systems for Business"},{"journal-title":"Image Analysis SCIA 2005 Proceedings Lecture Notes in Computer Science 3540","article-title":"Image analysis with local binary patterns","year":"2005","key":"8"}],"event":{"name":"2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA)","start":{"date-parts":[[2013,9,4]]},"location":"Trieste, Italy","end":{"date-parts":[[2013,9,6]]}},"container-title":["2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693156\/6703696\/06703725.pdf?arnumber=6703725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T01:38:39Z","timestamp":1490233119000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6703725\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ispa.2013.6703725","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}