{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T02:58:54Z","timestamp":1765421934892,"version":"3.37.3"},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100002347","name":"German Federal Ministry of Education and Science through the Research Program","doi-asserted-by":"publisher","award":["FKZ: 13N10818"],"award-info":[{"award-number":["FKZ: 13N10818"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/tifs.2015.2405412","type":"journal-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T14:40:05Z","timestamp":1424788805000},"page":"833-848","source":"Crossref","is-referenced-by-count":14,"title":["StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection"],"prefix":"10.1109","volume":"10","author":[{"given":"Mario","family":"Hildebrandt","sequence":"first","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Fingerprint Source Book","year":"2013","author":"bleay","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-40779-6_1","article-title":"Towards a standardised testsuite to assess fingerprint matching robustness: The StirMark toolkit&#x2014;Cross-feature type comparisons","volume":"8099","author":"h\u00e4mmerle-uhl","year":"2013","journal-title":"Communications and Multimedia Security"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","article-title":"Attacks on copyright marking systems","volume":"1525","author":"petitcolas","year":"1998","journal-title":"Information Hiding"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(88)90020-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.211"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0466-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-45524-2"},{"article-title":"Correlation-based feature subset selection for machine learning","year":"1998","author":"hall","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2014.6914246"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.05.021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8_3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9_20"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2617756"},{"key":"ref2","first-page":"652","article-title":"Latent fingerprint fabrication","volume":"44","author":"wertheim","year":"1994","journal-title":"J Forensic Identification"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600926"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1117\/12.2004507"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2011.6004969"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622824"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7059276\/07047866.pdf?arnumber=7047866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:47:59Z","timestamp":1641988079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7047866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":21,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2015.2405412","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2015,4]]}}}