{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T04:58:48Z","timestamp":1681534728302},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11623-023-1750-8","type":"journal-article","created":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T10:02:17Z","timestamp":1681466537000},"page":"225-228","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Erkennung von Kindesmissbrauch in Medien"],"prefix":"10.1007","volume":"47","author":[{"given":"Martin","family":"Steinebach","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,14]]},"reference":[{"key":"1750_CR1","doi-asserted-by":"crossref","unstructured":"Parisa Rezaee Borj, Kiran Raja, and Patrick Bours. Online grooming detection: A comprehensive survey of child exploitation in chat logs. KnowledgeBased Systems, page 110039, 2022.","DOI":"10.1016\/j.knosys.2022.110039"},{"issue":"1","key":"1750_CR2","first-page":"97","volume":"10","author":"U Breidenbach","year":"2021","unstructured":"Uwe Breidenbach, Martin Steinebach, and Huajian Liu. Privacy-enhanced robust image hashing with bloom filters. J. Cyber Secur. Mobil., 10(1):97\u2013 132, 2021.","journal-title":"J. Cyber Secur. Mobil"},{"key":"1750_CR3","first-page":"115713","volume":"81","author":"TSH Ling Du Anthony","year":"2020","unstructured":"Ling Du, Anthony TS Ho, and Runmin Cong. Perceptual hashing for image authentication: A survey. Signal Processing: Image Communication, 81:115713, 2020.","journal-title":"Signal Processing: Image Communication"},{"issue":"3","key":"1750_CR4","doi-asserted-by":"publisher","first-page":"593","DOI":"10.21300\/19.3.2018.593","volume":"19","author":"H Farid","year":"2018","unstructured":"Hany Farid. Reining in online abuses. Technology & Innovation, 19(3):593\u2013 599, 2018.","journal-title":"Technology & Innovation"},{"key":"1750_CR5","doi-asserted-by":"crossref","unstructured":"Abhishek Gangwar, Eduardo Fidalgo, Enrique Alegre, and V\u00edctor Gonz\u00e1lez-Castro. Pornography and child sexual abuse detection in image and video: A comparative evaluation. 2017.","DOI":"10.1049\/ic.2017.0046"},{"key":"1750_CR6","doi-asserted-by":"crossref","unstructured":"Mahmoud Hassaballah, Aly Amin Abdelmgeid, and Hammam A Alshazly. Image features detection, description and matching. In Image Feature Detectors and Descriptors, pages 11\u201345. Springer, 2016.","DOI":"10.1007\/978-3-319-28854-3_2"},{"key":"1750_CR7","unstructured":"Giacomo Inches and Fabio Crestani. Overview of the international sexual predator identification competition at pan-2012. In CLEF (Online working notes\/labs\/workshop), volume 30, 2012."},{"key":"1750_CR8","doi-asserted-by":"crossref","unstructured":"Felix Mayer and Martin Steinebach. Forensic image inspection assisted by deep learning. In Proceedings of the 12th International Conference on Availability, Reliability and Security, pages 1\u20139, 2017.","DOI":"10.1145\/3098954.3104051"},{"key":"1750_CR9","doi-asserted-by":"publisher","first-page":"108017","DOI":"10.1016\/j.knosys.2021.108017","volume":"240","author":"DF Milon-Flores","year":"2022","unstructured":"Daniela F Milon-Flores and Robson LF Cordeiro. How to take advantage of behavioral features for the early detection of grooming in online conversations. Knowledge-Based Systems, 240:108017, 2022.","journal-title":"Knowledge-Based Systems"},{"key":"1750_CR10","doi-asserted-by":"crossref","unstructured":"Fabi\u00e1n Mu\u00f1oz, Gustavo Isaza, and Luis Castillo. Smartsec4cop: smart cyber-grooming detection using natural language processing and convolutional neural networks. In International Symposium on Distributed Computing and Artificial Intelligence, pages 11\u201320. Springer, 2020.","DOI":"10.1007\/978-3-030-53036-5_2"},{"key":"1750_CR11","doi-asserted-by":"crossref","unstructured":"Ethel Quayle. Prevention, disruption and deterrence of online child sexual exploitation and abuse. ERA Forum, 21, 09 2020.","DOI":"10.1007\/s12027-020-00625-7"},{"key":"1750_CR12","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-658-33306-5_20","volume-title":"Selbstbestimmung, Privatheit und Datenschutz","author":"M Steinebach","year":"2022","unstructured":"Martin Steinebach. Auspr\u00e4gungen von uploadfiltern. In Selbstbestimmung, Privatheit und Datenschutz, pages 409\u2013428. Springer Vieweg, Wiesbaden, 2022."},{"key":"1750_CR13","unstructured":"Martin Steinebach. Maschinelles lernen im jugendschutz. Mediendiskurs, 2022."},{"key":"1750_CR14","doi-asserted-by":"crossref","unstructured":"Martin Steinebach, Huajian Liu, and York Yannikos. Forbild: Efficient robust image hashing. In Media Watermarking, Security, and Forensics 2012, volume 8303, page 83030O. International Society for Optics and Photonics, 2012.","DOI":"10.1117\/12.907856"},{"key":"1750_CR15","first-page":"1","volume":"653","author":"C Teunissen","year":"2022","unstructured":"Coen Teunissen and Sarah Napier. Child sexual abuse material and end-toend encryption on social media platforms: An overview. Trends and Issues in Crime and Criminal Justice [Electronic Resource], (653):[1]\u2013[19], 2022","journal-title":"Trends and Issues in Crime and Criminal Justice"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1750-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1750-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1750-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T10:14:36Z","timestamp":1681467276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1750-8"}},"subtitle":["Methoden und ihre Herausforderungen"],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1750"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1750-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]},"assertion":[{"value":"14 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}