{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:04:20Z","timestamp":1760346260089,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/wifs.2011.6123156","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:03:26Z","timestamp":1326319406000},"page":"1-6","source":"Crossref","is-referenced-by-count":19,"title":["A Dempster-Shafer framework for decision fusion in image forensics"],"prefix":"10.1109","author":[{"given":"M.","family":"Fontani","sequence":"first","affiliation":[]},{"given":"T.","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"A.","family":"De Rosa","sequence":"additional","affiliation":[]},{"given":"A.","family":"Piva","sequence":"additional","affiliation":[]},{"given":"M.","family":"Barni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.03.019"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.150"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366211"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.154"},{"key":"6","first-page":"86","article-title":"Nonintrusive image tamper detection based on fuzzy fusion","volume":"10","author":"chetty","year":"2010","journal-title":"IJCSNS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2008.5074646"},{"key":"4","first-page":"123","article-title":"Improving steganalysis by fusion techniques: A case study with image steganography","volume":"4300 lncs","author":"kharrazi","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1117\/1.2401138"},{"journal-title":"Reasoning under Uncertainty From Bayesian to Valuation Based Systems","year":"2007","author":"benavoli","key":"11"},{"key":"12","first-page":"61","article-title":"Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods","author":"platt","year":"1999","journal-title":"Advances in Large Margin Classifiers"}],"event":{"name":"2011 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2011,11,29]]},"location":"Iguacu Falls, Brazil","end":{"date-parts":[[2011,12,2]]}},"container-title":["2011 IEEE International Workshop on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112284\/6123119\/06123156.pdf?arnumber=6123156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,25]],"date-time":"2021-12-25T20:31:35Z","timestamp":1640464295000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6123156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wifs.2011.6123156","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}