{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T08:44:53Z","timestamp":1648629893011},"reference-count":0,"publisher":"Centro de Innovacion y Desarrollo Tecnologico en Computo","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.17562\/pb-52-7","type":"journal-article","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T22:15:49Z","timestamp":1473891349000},"page":"67-78","source":"Crossref","is-referenced-by-count":0,"title":["Cipher Image Damage: An Application of Filters"],"prefix":"10.17562","volume":"52","author":[{"given":"Rolando","family":"Flores-Carapia","sequence":"first","affiliation":[]},{"given":"V\u00edctor Manuel","family":"Silva-Garc\u00eda","sequence":"additional","affiliation":[]},{"given":"Benjam\u00edn","family":"Luna-Benoso","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Renter\u00eda-M\u00e1rquez","sequence":"additional","affiliation":[]}],"member":"7641","published-online":{"date-parts":[[2015,7,31]]},"container-title":["Polibits"],"original-title":[],"deposited":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T22:15:52Z","timestamp":1473891352000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.polibits.cidetec.ipn.mx\/2015_52\/Cipher%20Image%20Damage_%20An%20Application%20of%20Filters.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,31]]},"references-count":0,"URL":"https:\/\/doi.org\/10.17562\/pb-52-7","relation":{},"ISSN":["2395-8618","1870-9044"],"issn-type":[{"value":"2395-8618","type":"electronic"},{"value":"1870-9044","type":"print"}],"subject":[],"published":{"date-parts":[[2015,7,31]]}}}