{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:02:07Z","timestamp":1760346127777},"reference-count":18,"publisher":"Springer Science and Business Media LLC","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP Journal on Information Security"],"published-print":{"date-parts":[[2009]]},"DOI":"10.1155\/2009\/859859","type":"journal-article","created":{"date-parts":[[2009,12,30]],"date-time":"2009-12-30T15:30:26Z","timestamp":1262187026000},"page":"1-16","source":"Crossref","is-referenced-by-count":17,"title":["An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT"],"prefix":"10.1186","volume":"2009","author":[{"given":"Xudong","family":"Lv","sequence":"first","affiliation":[]},{"given":"Z. Jane","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2002.802018"},{"issue":"1","key":"6","first-page":"1","volume":"2","year":"2006"},{"key":"7","first-page":"1349","year":"2000"},{"issue":"2","key":"8","first-page":"215","volume":"1","year":"2006"},{"issue":"11","key":"9","first-page":"3453","volume":"15","year":"2006"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863502"},{"key":"15","first-page":"556","volume":"13","year":"2001"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902670"},{"issue":"5","key":"20","first-page":"767","volume":"10","year":"2001"},{"key":"21","year":"2006"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.823831"},{"key":"25","year":"2006"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.012"},{"issue":"3, part 1","key":"27","first-page":"462","volume":"2","year":"2007"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2004.05.002"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.07.003"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-008-9025-z"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","deposited":{"date-parts":[[2011,3,2]],"date-time":"2011-03-02T09:14:58Z","timestamp":1299057298000},"score":1,"resource":{"primary":{"URL":"http:\/\/jis.eurasipjournals.com\/content\/2009\/1\/859859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":18,"alternative-id":["859859","859859"],"URL":"https:\/\/doi.org\/10.1155\/2009\/859859","relation":{},"ISSN":["1687-4161","1687-417X"],"issn-type":[{"value":"1687-4161","type":"print"},{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}