{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:48:15Z","timestamp":1762955295119,"version":"3.28.0"},"reference-count":15,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2,19]]},"DOI":"10.1117\/12.2039638","type":"proceedings-article","created":{"date-parts":[[2014,2,19]],"date-time":"2014-02-19T02:59:52Z","timestamp":1392778792000},"page":"90280T","source":"Crossref","is-referenced-by-count":5,"title":["A framework for fast and secure packaging identification on mobile phones"],"prefix":"10.1117","volume":"9028","author":[{"given":"Maurits","family":"Diephuis","sequence":"additional","affiliation":[]},{"given":"Svyatoslav","family":"Voloshynovskiy","sequence":"additional","affiliation":[]},{"given":"Taras","family":"Holotyak","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Stendardo","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Keel","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","first-page":"404","article-title":"Speeded up robust features","author":"Bay","year":"2006"},{"doi-asserted-by":"publisher","key":"c2","DOI":"10.1109\/ISPA.2013.6703725"},{"key":"c3","first-page":"205","article-title":"Information-theoretic analysis of content based identification for correlated data","author":"Farhadzadeh","year":"2011"},{"doi-asserted-by":"publisher","key":"c4","DOI":"10.1109\/MSP.2011.940881"},{"doi-asserted-by":"publisher","key":"c5","DOI":"10.1017\/CBO9780511811685"},{"key":"c6","first-page":"833","article-title":"Stochastic neighbor embedding","author":"Hinton","year":"2002"},{"year":"2012","author":"Janssens","article-title":"Stochastic outlier selection","key":"c7"},{"doi-asserted-by":"publisher","key":"c8","DOI":"10.1109\/TPAMI.2010.57"},{"unstructured":"S. M. Kay. Fundamentals of Statistical Signal Processing: Detection Theory. Prentice Hall Signal Processing Series, 1993.","key":"c9"},{"unstructured":"P. D. Kovesi. MATLAB and Octave functions for computer vision and image processing. Centre for Exploration Targeting, School of Earth and Environment, The University of Western Australia. Available from: <http:\/\/www.csse.uwa.edu.au\/~pk\/research\/matlabfns\/>.","key":"c10"},{"doi-asserted-by":"publisher","key":"c11","DOI":"10.1002\/9781118014967"},{"key":"c12","first-page":"91","article-title":"Distinctive image features from scale-invariant keypoints","volume":"20","author":"Lowe.","year":"2003"},{"doi-asserted-by":"publisher","key":"c13","DOI":"10.1137\/0105003"},{"doi-asserted-by":"publisher","key":"c14","DOI":"10.1109\/WIFS.2012.6412623"},{"doi-asserted-by":"publisher","key":"c15","DOI":"10.1109\/CIG.2010.5592809"}],"event":{"name":"IS&T\/SPIE Electronic Imaging","location":"San Francisco, California, USA"},"container-title":["SPIE Proceedings","Media Watermarking, Security, and Forensics 2014"],"original-title":[],"deposited":{"date-parts":[[2018,6,16]],"date-time":"2018-06-16T03:53:08Z","timestamp":1529121188000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2039638"}},"subtitle":[],"editor":[{"given":"Adnan M.","family":"Alattar","sequence":"first","affiliation":[]},{"given":"Nasir D.","family":"Memon","sequence":"additional","affiliation":[]},{"given":"Chad D.","family":"Heitzenrater","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,2,19]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1117\/12.2039638","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2014,2,19]]}}}