{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:16Z","timestamp":1725751636059},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_24","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"367-384","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Counterfeit Currency and Identifying Its Source"],"prefix":"10.1007","author":[{"given":"Ankit","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Robin","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1109\/SITIS.2007.146","volume-title":"Proceedings of the Third IEEE International Conference on Signal-Image Technologies and Internet-Based Systems","author":"C. Chang","year":"2007","unstructured":"C. Chang, T. Yu and H. Yen, Paper currency verification with support vector machines, Proceedings of the Third IEEE International Conference on Signal-Image Technologies and Internet-Based Systems, pp. 860\u2013865, 2007."},{"key":"24_CR2","unstructured":"S. Gupta, D. Handa, R. Singh and K. Kumar, Forensic identification of Rs.\u00a01,000 \u2013 Awareness for genuineness, CBI Bulletin, pp. 41\u201345, July-September 2011."},{"issue":"1","key":"24_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.diin.2006.01.009","volume":"3","author":"G. Gupta","year":"2006","unstructured":"G. Gupta, C. Mazumdar, M. Rao and R. Bhosale, Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents, Digital Investigation, vol. 3(1), pp. 43\u201355, 2006.","journal-title":"Digital Investigation"},{"key":"24_CR4","first-page":"497","volume-title":"Proceedings of the International Conference on Computing Theory and Applications","author":"G. Gupta","year":"2007","unstructured":"G. Gupta, S. Saha, S. Chakraborty and C. Mazumdar, Document frauds: Identification and linking fake documents to scanners and printers, Proceedings of the International Conference on Computing Theory and Applications, pp. 497\u2013501, 2007."},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-540-77086-2_19","volume-title":"Proceedings of the Third International Conference on Information Systems Security","author":"G. Gupta","year":"2007","unstructured":"G. Gupta, R. Sultania, S. Mondal, S. Saha and B. Chanda, A structured approach to detect a scanner-printer used in generating fake documents, Proceedings of the Third International Conference on Information Systems Security, pp. 250\u2013253, 2007."},{"issue":"1","key":"24_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M. Hall","year":"2009","unstructured":"M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann and I. Witten, The WEKA data mining software: An update, ACM SIGKDD Explorations Newsletter, vol. 11(1), pp. 10\u201318, 2009.","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"24_CR7","first-page":"300","volume-title":"Proceedings of the Fourteenth IEEE International Conference on Fuzzy Systems","author":"M. Ionescu","year":"2005","unstructured":"M. Ionescu and A. Ralescu, Fuzzy Hamming distance based banknote validator, Proceedings of the Fourteenth IEEE International Conference on Fuzzy Systems, pp. 300\u2013305, 2005."},{"key":"24_CR8","first-page":"2081","volume":"4","author":"C. Liu","year":"2008","unstructured":"C. Liu, S. Ruan, G. Huang, Y. Jian and L. Zhang, Research on identification of counterfeits by recognizing infrared images, Proceedings of the International Conference on Microwave and Millimeter Wave Technology, vol. 4, pp. 2081\u20132084, 2008.","journal-title":"Proceedings of the International Conference on Microwave and Millimeter Wave Technology"},{"key":"24_CR9","first-page":"486","volume-title":"Proceedings of the Ninth Pacific Rim Conference on Multimedia","author":"S. Ryu","year":"2008","unstructured":"S. Ryu, H. Lee, I. Cho and H. Lee, Document forgery detection with SVM classifier and image quality measures, Proceedings of the Ninth Pacific Rim Conference on Multimedia, pp. 486\u2013495, 2008."},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-85303-9_5","volume-title":"Proceedings of the Second International Workshop on Computational Forensics","author":"J. Beusekom van","year":"2008","unstructured":"J. van Beusekom, F. Shafait and T. Breuel, Document signature using intrinsic features for counterfeit detection, Proceedings of the Second International Workshop on Computational Forensics, pp. 47\u201357, 2008."},{"key":"24_CR11","first-page":"1268","volume-title":"Proceedings of the IEEE International Conference on Robotics and Biomimetics","author":"J. Xie","year":"2009","unstructured":"J. Xie, C. Qin, T. Liu, Y. He and M. Xu, A new method to identify the authenticity of banknotes based on the texture roughness, Proceedings of the IEEE International Conference on Robotics and Biomimetics, pp. 1268\u20131271, 2009."},{"issue":"1","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.1016\/j.asoc.2010.04.015","volume":"11","author":"C. Yeh","year":"2011","unstructured":"C. Yeh, W. Su and S. Lee, Employing multiple-kernel support vector machines for counterfeit banknote recognition, Applied Soft Computing, vol. 11(1), pp. 1439\u20131447, 2011.","journal-title":"Applied Soft Computing"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T21:44:25Z","timestamp":1558129465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_24","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}