{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:28:38Z","timestamp":1770917318010,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/wifs.2011.6123127","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:03:26Z","timestamp":1326319406000},"page":"1-6","source":"Crossref","is-referenced-by-count":34,"title":["Video Phylogeny: Recovering near-duplicate video relationships"],"prefix":"10.1109","author":[{"given":"Zanoni","family":"Dias","sequence":"first","affiliation":[]},{"given":"Anderson","family":"Rocha","sequence":"additional","affiliation":[]},{"given":"Siome","family":"Goldenstein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/321879.321884"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169959"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/641007.641098"},{"key":"2","first-page":"229","article-title":"BASIL: Effective Near- Duplicate Image Detection using Gene Sequence Alignment","author":"kim","year":"2010","journal-title":"ECIR"},{"key":"1","author":"maret","year":"2007","journal-title":"Efficient Duplicate Detection Based on Image Analysis"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2009.0246"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1459359.1459406"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1117\/12.840235","article-title":"Exploring Image Dependencies: A New Challenge in Image Forensics","author":"rosa","year":"2010","journal-title":"Media Forensics and Security II"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711452"},{"key":"4","first-page":"386","article-title":"Practical online near-duplicate subsequence detection for continuous video streams","volume":"12","author":"huang","year":"2010","journal-title":"IEEE TMM"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.886278"},{"key":"8","author":"cox","year":"2007","journal-title":"Digital Watermarking and Steganography"}],"event":{"name":"2011 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"Iguacu Falls, Brazil","start":{"date-parts":[[2011,11,29]]},"end":{"date-parts":[[2011,12,2]]}},"container-title":["2011 IEEE International Workshop on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112284\/6123119\/06123127.pdf?arnumber=6123127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T12:37:04Z","timestamp":1497962224000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6123127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wifs.2011.6123127","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}