{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:11:34Z","timestamp":1732036294402},"reference-count":9,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2016,9,17]],"date-time":"2016-09-17T00:00:00Z","timestamp":1474070400000},"content-version":"vor","delay-in-days":260,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2016]]},"DOI":"10.1016\/j.procs.2016.09.178","type":"journal-article","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T21:04:43Z","timestamp":1475615083000},"page":"421-428","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["Information System for Automation of Counterfeited Documents Images Correlation"],"prefix":"10.1016","volume":"100","author":[{"given":"Rafael","family":"Vieira","sequence":"first","affiliation":[]},{"given":"Catarina","family":"Silva","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Assis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2016.09.178_bib0005","doi-asserted-by":"crossref","unstructured":"H. Farid, \u201cImage Forgery Detection\u201d, in IEEE Signal Processing Magazine, pp. 16-25, March 2009.","DOI":"10.1109\/MSP.2008.931079"},{"key":"10.1016\/j.procs.2016.09.178_bib0010","unstructured":"A. Kaur and A. K. G. Vaibhav Saran, \u201cDigital Image Processing for Forensic Analysis of Fabricated Documents\u201d, in International Journal of Advanced Research in Science, Engineering and Techonology, pp. 84-89, September 2014."},{"key":"10.1016\/j.procs.2016.09.178_bib0015","doi-asserted-by":"crossref","unstructured":"R. Bertrand, P. Gomez-Kramer, O.R. Terrades, P. Franco and J.-M. Ogier, \u201cA System Based On Intrisic Features for Fraudulent Document Detection\u201d, in 12th Internation Conference on Document Analysis and Recognition, pp. 106-110, August 2013.","DOI":"10.1109\/ICDAR.2013.29"},{"key":"10.1016\/j.procs.2016.09.178_bib0020","doi-asserted-by":"crossref","unstructured":"J. Fridrich, D. Soukal and J. Luk\u00e1s, \u201cDetection of Copy-Move Forgery in Digital Images\u201d, in Forensic Science International, vol. 231, pp. 284-295, September 2013.","DOI":"10.1016\/j.forsciint.2013.05.027"},{"key":"10.1016\/j.procs.2016.09.178_bib0025","unstructured":"C. Harris and M. Stephens, \u201cA Combined Corner and Edge Detector\u201d, in 4th Alvey Vision Conference, pp 147-151, 1998."},{"key":"10.1016\/j.procs.2016.09.178_bib0030","doi-asserted-by":"crossref","unstructured":"David G. Lowe, \u201cDistinctive Image Features from Scale-Invariant Keypoints\u201d, in International Journal of Computer Vision, pp. 91-110, 2004.","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"10.1016\/j.procs.2016.09.178_bib0035","doi-asserted-by":"crossref","unstructured":"H. Bay, A. Ess, T. Tuytelaars and Luc Van Gool, \u201cSpeeded-Up Robust Features (SURF)\u201d, in Computer Vision and Image Understanding, vol. 110, pp. 346-359, June 2008.","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"10.1016\/j.procs.2016.09.178_bib0040","doi-asserted-by":"crossref","unstructured":"Edward Rosten and Tom Drummond, \u201cMachine Learning for High-Speed Corner Detection\u201d, in 9th European Conference on Computer Vision, May 2006.","DOI":"10.1007\/11744023_34"},{"key":"10.1016\/j.procs.2016.09.178_bib0045","unstructured":"E. Rublee, V. Rabaud, K. Kunolige and G. Bradski, \u201cORB: An Efficient Alternative to SIRF or SURF\u201d, in IEEE International Conference on Computer Vision, pp. 2564-2571, November 2011."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050916323468?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050916323468?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T08:00:21Z","timestamp":1568448021000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050916323468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":9,"alternative-id":["S1877050916323468"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2016.09.178","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Information System for Automation of Counterfeited Documents Images Correlation","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2016.09.178","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}