{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T21:14:20Z","timestamp":1694639660110},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/tifs.2010.2063024","type":"journal-article","created":{"date-parts":[[2010,8,5]],"date-time":"2010-08-05T00:40:35Z","timestamp":1280968835000},"page":"837-847","source":"Crossref","is-referenced-by-count":2,"title":["Identifying and Resolving Hidden Text Salting"],"prefix":"10.1109","volume":"5","author":[{"given":"Marie-Francine","family":"Moens","sequence":"first","affiliation":[]},{"given":"Jan","family":"De Beer","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Boiy","sequence":"additional","affiliation":[]},{"given":"Juan Carlos","family":"Gomez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1109\/T-C.1971.223166","article-title":"an interactive system for reading unformatted printed text","volume":"c 20","author":"ascher","year":"1971","journal-title":"IEEE Transactions on Computers"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/363397.363417"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/62506.62539"},{"key":"ref34","article-title":"detecting known and new salting tricks in unwanted emails","author":"bergholz","year":"2008","journal-title":"CEA Proceedings"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7617.001.0001","author":"deibert","year":"2008","journal-title":"Access Denied The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1164394.1164399"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/1226736.1226740","article-title":"the effects of online advertising","volume":"50","author":"mccoy","year":"2007","journal-title":"Commun ACM"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113067"},{"key":"ref15","first-page":"179","article-title":"comparison of texts streams in the presence of mild adversaries","author":"malkin","year":"2005","journal-title":"ACSW Frontiers'05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research"},{"key":"ref16","author":"murdoch","year":"2008","journal-title":"Access Denied The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)"},{"key":"ref17","first-page":"50","article-title":"a language independent content extraction from web pages","author":"moreno","year":"2009","journal-title":"Proc 9th Dutch-Belgian Information Retrieval Workshop (DIR 2009)"},{"key":"ref18","first-page":"2699","article-title":"spam filtering based on the analysis of text information embedded into images","volume":"7","author":"fumera","year":"2006","journal-title":"J Mach Learning Res"},{"key":"ref19","first-page":"2673","article-title":"spam filtering using statistical data compression models","volume":"7","author":"bratko","year":"2006","journal-title":"J Mach Learning Res"},{"key":"ref28","first-page":"32","article-title":"a top-down document analysis method for logical structure recognition","author":"ingold","year":"1991","journal-title":"Proc First Int?l Conf on Document Analysis and Recognition"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"ref27","first-page":"801","article-title":"a document understanding system incorporating with character recognition","author":"nakano","year":"1986","journal-title":"Proc Eighth Int Conf Pattern Recognition"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"ref6","first-page":"509","article-title":"using visual features for anti-spam filtering","author":"wu","year":"2005","journal-title":"Proc IEEE Int Conf Image Processing"},{"key":"ref29","first-page":"113","article-title":"A top-down approach for the analysis of document images","author":"fujisawa","year":"1990","journal-title":"Proc SSPR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v8i6.1057"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh169"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135854"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1164394.1164398"},{"key":"ref20","author":"krueger","year":"2002","journal-title":"The Spam Battle 2002 A Tactical Update"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367565"},{"key":"ref21","author":"gansterer","year":"2005","journal-title":"Anti-Spam MethodsState of the Art"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135901"},{"key":"ref26","article-title":"how to beat a bayesian spam filter","author":"graham-cumming","year":"2004","journal-title":"Proc 2004 Spam Conf"},{"key":"ref25","article-title":"the spammer's compendium","author":"graham-cumming","year":"2003","journal-title":"Proc 2003 Spam Conf"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/5623286\/05535168.pdf?arnumber=5535168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:43:42Z","timestamp":1633913022000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5535168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":34,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2010.2063024","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12]]}}}