{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:59:56Z","timestamp":1729648796946,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412629","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T14:44:59Z","timestamp":1359125099000},"page":"79-84","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-preserving architecture for forensic image recognition"],"prefix":"10.1109","author":[{"given":"Andreas","family":"Peter","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Hartmann","sequence":"additional","affiliation":[]},{"given":"Sascha","family":"Muller","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"13","article-title":"New iterative geometric methods for robust perceptual image hashing","volume":"2320","author":"mihc?ak","year":"2001","journal-title":"LNCS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161392"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"15","first-page":"1","article-title":"Fuzzy extractors for asymmetric biometric representations","author":"li","year":"2008","journal-title":"IEEE Workshop on Biometrics (In Association with CVPR)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/76.905982"},{"journal-title":"PKCS # 1 V2 1 RSA Cryptography Standard","year":"2002","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161377"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2000.844203"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"journal-title":"Perceptually Based Methods for Robust Image Hashing","year":"2005","author":"monga","key":"20"},{"key":"22","article-title":"Forbild: Efficient robust image hashing. In Media Watermarking, Security, and Forensics, 8303","author":"steinebach","year":"0","journal-title":"Proc SPIE SPIE 2012"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902022"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2006.265125"},{"journal-title":"Implementation and Benchmarking of Perceptual Image Hash Functions","year":"2010","author":"zauner","key":"25"},{"journal-title":"Mhash An Open Source Hash Library","year":"0","key":"3"},{"journal-title":"Implementation of a [960 840 25]-bch Code","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.778542"},{"journal-title":"The Cimg Library A C++ Template Image Processing Toolkit","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723518"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"journal-title":"Phash The Open Source Perceptual Hash Library","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"8","first-page":"129","article-title":"On the relation of error correction and cryptography to an off line biometric based identification scheme","author":"davida","year":"1999","journal-title":"Proc WCC"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2012,12,2]]},"location":"Costa Adeje - Tenerife, Spain","end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412629.pdf?arnumber=6412629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:24:46Z","timestamp":1498011886000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412629","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}