{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:00:42Z","timestamp":1725616842904},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412638","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T14:44:59Z","timestamp":1359125099000},"page":"133-138","source":"Crossref","is-referenced-by-count":5,"title":["Content authentication and identification under informed attacks"],"prefix":"10.1109","author":[{"given":"Fokko","family":"Beekhof","sequence":"first","affiliation":[]},{"given":"Sviatoslav","family":"Voloshynovskiy","sequence":"additional","affiliation":[]},{"given":"Farzad","family":"Farhadzadeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-984-2"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592809"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2010.5454105"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2152394"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288254"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2011.5743600"},{"journal-title":"Secret-Key Rates and Privacy Leakage in Biometric Systems","year":"2009","author":"ingatenko","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108288"},{"key":"8","article-title":"Biometrical fingerprint recognition: Don't get your fingers burned","author":"van der putte","year":"0","journal-title":"Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS) 2000"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513690"},{"key":"12","article-title":"Information theory and biometrics","author":"willems","year":"0","journal-title":"Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Darmstadt Germany October 15-17 2010"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2012,12,2]]},"location":"Costa Adeje - Tenerife, Spain","end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412638.pdf?arnumber=6412638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:07:00Z","timestamp":1490126820000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412638","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}