{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T21:51:23Z","timestamp":1753739483793,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,29]],"date-time":"2011-09-29T00:00:00Z","timestamp":1317254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,29]]},"DOI":"10.1145\/2037252.2037260","type":"proceedings-article","created":{"date-parts":[[2011,10,4]],"date-time":"2011-10-04T13:24:12Z","timestamp":1317734652000},"page":"33-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Malicious fingerprint traces"],"prefix":"10.1145","author":[{"given":"Mario","family":"Hildebrandt","sequence":"first","affiliation":[{"name":"Otto-von-Guericke University of Magdeburg, Magdeburg, Germany"}]},{"given":"Stefan","family":"Kiltz","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke University of Magdeburg, Magdeburg, Germany"}]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke University of Magdeburg, Magdeburg, Germany"}]},{"given":"Claus","family":"Vielhauer","sequence":"additional","affiliation":[{"name":"Brandenburg University of Applied Sciences, Brandenburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2011,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1021\/jf030490p"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/978-3-642-19530-3_26","volume-title":"Biometrics and ID Management","author":"Hildebrandt M.","year":"2011","unstructured":"M. Hildebrandt , J. Dittmann , M. Pocs , M. Ulrich , R. Merkel , and T. Fries . Privacy preserving challenges: New design aspects for latent fingerprint detection systems with contact-less sensors for future preventive applications in airport luggage handling . In Biometrics and ID Management , Lecture Notes in Computer Science , pages 286 -- 298 . 2011 . DOI: 10.1007\/978--3--642--19530--3_26. 10.1007\/978--3--642--19530--3_26 M. Hildebrandt, J. Dittmann, M. Pocs, M. Ulrich, R. Merkel, and T. Fries. Privacy preserving challenges: New design aspects for latent fingerprint detection systems with contact-less sensors for future preventive applications in airport luggage handling. In Biometrics and ID Management, Lecture Notes in Computer Science, pages 286--298. 2011. DOI: 10.1007\/978--3--642--19530--3_26."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(98)00090-0"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of SPIE","volume":"7867","author":"Kiltz S.","year":"2011","unstructured":"S. Kiltz , M. Hildebrandt , J. Dittmann , C. Vielhauer , and C. Kraetzer . Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics. In Image Quality and System Performance VIII , Proceedings of SPIE Vol. 7867 , 2011 . DOI: 10.1117\/12.872329. 10.1117\/12.872329 S. Kiltz, M. Hildebrandt, J. Dittmann, C. Vielhauer, and C. Kraetzer. Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics. In Image Quality and System Performance VIII, Proceedings of SPIE Vol. 7867, 2011. DOI: 10.1117\/12.872329."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of SPIE","volume":"4677","author":"Matsumoto T.","year":"2002","unstructured":"T. Matsumoto , H. Matsumoto , K. Yamada , and S. Hoshino . Impact of Artificial \"Gummy\" Fingers on Fingerprint Systems. In Optical Security and Counterfeit Deterrence Techniques IV , Proceedings of SPIE Vol. 4677 , 2002 . DOI:10.1117\/12.462719. 10.1117\/12.462719 T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of Artificial \"Gummy\" Fingers on Fingerprint Systems. In Optical Security and Counterfeit Deterrence Techniques IV, Proceedings of SPIE Vol. 4677, 2002. DOI:10.1117\/12.462719."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1556-4029.2009.01168.x"}],"event":{"name":"MM&Sec '11: Multimedia and Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Buffalo New York USA","acronym":"MM&Sec '11"},"container-title":["Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2037252.2037260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2037252.2037260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:29Z","timestamp":1750240109000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2037252.2037260"}},"subtitle":["a proposal for an automated analysis of printed amino acid dots using houghcircles"],"short-title":[],"issued":{"date-parts":[[2011,9,29]]},"references-count":8,"alternative-id":["10.1145\/2037252.2037260","10.1145\/2037252"],"URL":"https:\/\/doi.org\/10.1145\/2037252.2037260","relation":{},"subject":[],"published":{"date-parts":[[2011,9,29]]},"assertion":[{"value":"2011-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}