{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:16:25Z","timestamp":1729631785754,"version":"3.28.0"},"reference-count":25,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3,4]]},"DOI":"10.1117\/12.2077531","type":"proceedings-article","created":{"date-parts":[[2015,3,4]],"date-time":"2015-03-04T21:31:19Z","timestamp":1425504679000},"page":"94090A","source":"Crossref","is-referenced-by-count":3,"title":["Benford's Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes"],"prefix":"10.1117","volume":"9409","author":[{"given":"Mario","family":"Hildebrandt","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"issue":"4","key":"c1","first-page":"573","article-title":"Fingerprint forgery - transferred latent fingerprints","volume":"28","author":"Harper","year":"1937"},{"key":"c2","doi-asserted-by":"publisher","DOI":"10.1111\/jfo.2009.54.issue-6"},{"key":"c3","doi-asserted-by":"publisher","DOI":"10.1039\/C2AY26167G"},{"key":"c4","doi-asserted-by":"publisher","DOI":"10.1117\/12.872329"},{"key":"c5","doi-asserted-by":"crossref","unstructured":"Champod, C. and Espinoza, M., \u201cForgeries of fingerprints in forensic science,\u201d in [Handbook of Biometric Anti-Spoofing], Marcel, S., Nixon, M. S., and Li, S. Z., eds., Advances in Computer Vision and Pattern Recognition, 13-34, Springer London (2014).","DOI":"10.1007\/978-1-4471-6524-8_2"},{"issue":"4","key":"c6","first-page":"551","article-title":"The law of anomalous numbers","volume":"78","author":"Benford","year":"1938"},{"article-title":"Estimating jpeg2000 compression for image forensics using benford\u2019s law","year":"2010","author":"Qadir","key":"c7"},{"key":"c8","doi-asserted-by":"publisher","DOI":"10.1145\/1656274"},{"key":"c9","unstructured":"Hildebrandt, M. and Dittmann, J., \u201cFrom StirMark to StirTrace: Benchmarking pattern recognition based printed fingerprint detection,\u201d in [Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security], IH&MMSec \u201814, 71-76, ACM, New York, NY, USA (2014)."},{"article-title":"StirTrace","year":"2014","author":"Hildebrandt","key":"c10"},{"key":"c11","first-page":"866509","article-title":"Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopes","author":"Hildebrandt","year":"2013"},{"key":"c12","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2014.6914246"},{"key":"c13","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Gonz\u00e1lez, F., Heileman, G., and Abdallah, C., \u201cBenford\u2019s law in image processing,\u201d in [Image Processing, 2007. ICIP 2007. IEEE International Conference on], I-405-I-408, IEEE (2007).","DOI":"10.1109\/ICIP.2007.4378977"},{"key":"c14","doi-asserted-by":"crossref","DOI":"10.1109\/ICASSP.2012.6288362","article-title":"Discriminating multiple jpeg compression using first digit features","author":"Milani","year":"2012"},{"key":"c15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622824"},{"key":"c16","unstructured":"KEYENCE America, \u201cKeyence\u2019s VK-X100\/X200 Series 3D Laser Scanning Microscope specifications,\u201d (2014). [Online]. Available: http:\/\/www.keyence.com\/products\/microscope\/laser-microscope\/vk-x100jc200\/specs\/index.jsp, last checked 12\/18\/2014."},{"key":"c17","unstructured":"Hildebrandt, M., Kiltz, S., Grossmann, I., and Vielhauer, C., \u201cConvergence of digital and traditional forensic disciplines: A first exemplary study for digital dactyloscopy,\u201d in [Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security], MM&Sec \u201811, 1-8, ACM, New York, NY, USA (2011)."},{"key":"c18","first-page":"329","article-title":"Bayesian networks: A model of self-activated memory for evidential reasoning","author":"Pearl","year":"1985"},{"key":"c19","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(88)90020-9"},{"key":"c20","doi-asserted-by":"crossref","unstructured":"Platt, J., \u201cFast training of support vector machines using sequential minimal optimization,\u201d in [Advances in Kernel Methods - Support Vector Learning], Schoelkopf, B., Burges, C., and Smola, A., eds., MIT Press (1998).","DOI":"10.7551\/mitpress\/1130.003.0016"},{"key":"c21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"c22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.211"},{"key":"c23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00962234"},{"key":"c24","unstructured":"Quinlan, J. R., [C4.5: Programs for Machine Learning], Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1993)."},{"key":"c25","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0466-3"}],"event":{"name":"IS&T\/SPIE Electronic Imaging","location":"San Francisco, California, United States"},"container-title":["SPIE Proceedings","Media Watermarking, Security, and Forensics 2015"],"original-title":[],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T11:48:37Z","timestamp":1691495317000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2077531"}},"subtitle":[],"editor":[{"given":"Adnan M.","family":"Alattar","sequence":"first","affiliation":[]},{"given":"Nasir D.","family":"Memon","sequence":"additional","affiliation":[]},{"given":"Chad D.","family":"Heitzenrater","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2015,3,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1117\/12.2077531","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2015,3,4]]}}}