{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T14:49:57Z","timestamp":1766587797176,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"sichuan institute of technology research fund","award":["2014KY01"],"award-info":[{"award-number":["2014KY01"]}]},{"name":"Enterprise informatization and Internet of things measurement and control technology sichuan university key laboratory","award":["2014WYY04"],"award-info":[{"award-number":["2014WYY04"]}]},{"DOI":"10.13039\/501100004829","name":"Department of Science and Technology of Sichuan Province","doi-asserted-by":"crossref","award":["15ZC0195"],"award-info":[{"award-number":["15ZC0195"]}],"id":[{"id":"10.13039\/501100004829","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004884","name":"Education Department of Sichuan Province","doi-asserted-by":"publisher","award":["17SB0345"],"award-info":[{"award-number":["17SB0345"]}],"id":[{"id":"10.13039\/501100004884","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13640-018-0375-6","type":"journal-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T04:58:07Z","timestamp":1544072287000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An improved algorithm based on Bloom filter and its application in bar code recognition and processing"],"prefix":"10.1186","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1506-3931","authenticated-orcid":false,"given":"Mai","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Chunsheng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zaifeng","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"375_CR1","first-page":"1087","volume-title":"6rd International Congress on Image and Signal Processing (CISP 2013)","author":"M Jiang","year":"2013","unstructured":"M. Jiang, C. Zhao, G. Xiang, in 6rd International Congress on Image and Signal Processing (CISP 2013). A modified algorithm based on the bloom filter (2013), pp. 1087\u20131091"},{"key":"375_CR2","doi-asserted-by":"crossref","unstructured":"B. Bloom, Space, \u201ctime trade-offs in hash coding with allowable errors,\u201d. Commun. ACM 13(7), 422\u2013426 (1970)","DOI":"10.1145\/362686.362692"},{"issue":"3","key":"375_CR3","first-page":"1281","volume":"vol. ICC","author":"WHA Yuen","year":"1997","unstructured":"W.H.A. Yuen, A hybrid Bloom filter location update algorithm for wireless cellular system. IEEE Intl. Conf. on Communications vol. ICC(3), 1281\u20131286 (1997)","journal-title":"IEEE Intl. Conf. on Communications"},{"key":"375_CR4","volume-title":"Summary cache: a scalable wide-area web cache sharing protocol","author":"L Fan","year":"1998","unstructured":"L. Fan, P. Cao, J. Almeida, A. Broder, Summary cache: a scalable wide-area web cache sharing protocol (in Proceedings of ACM SIGCOMM\u201998, Vancouver, 1998)"},{"key":"375_CR5","volume-title":"Proceedings of the Fourth Symposium on Operating Systems Design and Implementation","author":"SD Gribble","year":"2000","unstructured":"S.D. Gribble, E.A. Brewer, J.M. Hellerstein, D. Culler, in Proceedings of the Fourth Symposium on Operating Systems Design and Implementation. Scalable, \u201cDistributed Data Structures for Internet Service Construction\u201d (OSDI 2000, San Diego, 2000)"},{"issue":"4","key":"375_CR6","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/S1389-1286(00)00179-1","volume":"35","author":"SD Gribble","year":"2001","unstructured":"S.D. Gribble, M. Welsh, R.V. Behren, E.A. Brewer, D. Culler, N. Borisov, S. Czerwinski, R. Gummadi, J. Hill, A.D. Joseph, R.H. Katz, Z. Mao, S. Ross, B. Zhao, The Ninja architecture for robust internet-scale systems and services. Comput. Netw. 35(4), 473\u2013497 (2001)","journal-title":"Comput. Netw."},{"issue":"2\u20133","key":"375_CR7","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1023\/A:1013772027164","volume":"8","author":"TD Hodes","year":"2002","unstructured":"T.D. Hodes, S.E. Czerwinski, B.Y. Zhao, A.D. Joseph, R.H. Katz, An architecture for secure wide-area service discovery. Wirel. Netw 8(2\u20133), 213\u2013230 (2002)","journal-title":"Wirel. Netw"},{"key":"375_CR8","volume-title":"Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems","author":"J Kubiatowicz","year":"2000","unstructured":"J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, B. Zhao, in Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems. OceanStore: \u201cAn Architecture for Global-Scale Persistent Storage\u201d (ASPLOS 2000, Cambridge, 2000)"},{"key":"375_CR9","volume-title":"Twentieth ACM Symposium on Principles of Distributed Computing","author":"M Mitzenmacher","year":"2001","unstructured":"M. Mitzenmacher, in Twentieth ACM Symposium on Principles of Distributed Computing. Compressed bloom filters (PODC 2001, Newport, Rhode Island, 2001)"},{"key":"375_CR10","doi-asserted-by":"crossref","unstructured":"J.K. Mullin, A second look at Bloom filters. Commun. ACM 26(8), 570\u2013571 (1983)","DOI":"10.1145\/358161.358167"},{"issue":"4","key":"375_CR11","first-page":"S25","volume":"44","author":"S Rhea","year":"1999","unstructured":"S. Rhea, W. Weimer, \u201cData location in the oceanstore\u201d, in unpublished, UC Berkeley. Journal of Nutrition Education & Behavior 44(4), S25 (1999)","journal-title":"Journal of Nutrition Education & Behavior"},{"key":"375_CR12","doi-asserted-by":"crossref","unstructured":"M.V. Ramakrishna, Practical performance of Bloom filters and parallel free-text searching. Commun. ACM 32(10), 1237\u20131239 (1989)","DOI":"10.1145\/67933.67941"},{"issue":"2","key":"375_CR13","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/TMC.2015.2418767","volume":"15","author":"KW Choi","year":"2016","unstructured":"K.W. Choi, D.T. Wiriaatmadja, E. Hossain, Discovering mobile applications in cellular device-to-device communications: Hash function and bloom filter-based approach. IEEE Trans. Mob. Comput. 15(2), 336\u2013349 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"11","key":"375_CR14","first-page":"2125","volume":"20","author":"J Qian","year":"2016","unstructured":"J. Qian, Q. Zhu, H. Chen, Integer-granularity locality-sensitive bloom filter. IEEE Trans. Comput. 20(11), 2125\u20132128 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"375_CR15","doi-asserted-by":"publisher","unstructured":"H. Byun, J. Lee, H. Lim. \"Ternary Bloom filter replacing counting Bloom filter\", IEEE International Conference on Consumer Electronics-asia, 2016, ICCE-Asia: 1-4. \n                    https:\/\/doi.org\/10.1109\/ICCE-Asia.2016.7804774","DOI":"10.1109\/ICCE-Asia.2016.7804774"},{"issue":"5","key":"375_CR16","first-page":"1558","volume":"65","author":"J HM","year":"2016","unstructured":"J. HM, H. Lim, New approach for efficient IP Address lookup using a Bloom filter in trie-based algorithms. IEEE omputer Society 65(5), 1558\u20131565 (2016)","journal-title":"IEEE omputer Society"},{"issue":"6","key":"375_CR17","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1089\/cmb.2016.0155","volume":"24","author":"D Pellow","year":"2016","unstructured":"D. Pellow, D. Filippova, C. Kingsford, Improving Bloom filter performance on sequence data using k-mer Bloom filters. J. Comput. Biol. 24(6), 547\u2013557 (2016)","journal-title":"J. Comput. Biol."},{"issue":"2","key":"375_CR18","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/TSMC.2013.2242884","volume":"44","author":"P Jiang","year":"2017","unstructured":"P. Jiang, Y. Ji, X. Wang, J. Zhu, Y. Cheng, Design of a multiple Bloom filter for distributed navigation routing. IEEE Transactions on Systems Man & Cybernetics 44(2), 254\u2013260 (2017)","journal-title":"IEEE Transactions on Systems Man & Cybernetics"},{"issue":"4","key":"375_CR19","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/2.55471","volume":"23","author":"T Pavlidis","year":"2002","unstructured":"T. Pavlidis, J. Swartz, Y.P. Wang, Fundamentals of Bar code information theory. Computer 23(4), 74\u201386 (2002)","journal-title":"Computer"},{"key":"375_CR20","doi-asserted-by":"publisher","unstructured":"G. Moualla, P.A. Frangoudis, Y. Hadjadj-Aoul, S. Ait-Chellouche, A bloom-filter-based socially aware scheme for content replication in mobile ad hoc networks. Consumer Communications & Networking Conference, 359\u2013365 (2016) \n                    https:\/\/doi.org\/10.1109\/CCNC.2016.7444807","DOI":"10.1109\/CCNC.2016.7444807"},{"issue":"2","key":"375_CR21","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TMC.2015.2411603","volume":"15","author":"H Ko","year":"2016","unstructured":"H. Ko, G. Lee, S. Pack, K. Kweon, Timer-based bloom filter aggregation for reducing signaling overhead in distributed mobility management. IEEE Trans. Mob. Comput. 15(2), 516\u2013529 (2016)","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0375-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-018-0375-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0375-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T19:04:40Z","timestamp":1575572680000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-018-0375-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["375"],"URL":"https:\/\/doi.org\/10.1186\/s13640-018-0375-6","relation":{},"ISSN":["1687-5281"],"issn-type":[{"type":"electronic","value":"1687-5281"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"26 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"139"}}