{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T01:00:27Z","timestamp":1704762027878},"reference-count":15,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET signal process."],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1049\/iet-spr.2014.0508","type":"journal-article","created":{"date-parts":[[2015,10,8]],"date-time":"2015-10-08T12:18:33Z","timestamp":1444306713000},"page":"63-68","source":"Crossref","is-referenced-by-count":3,"title":["Efficient and anti\u2010interference method of synchronising information extraction for cideo leaking signal"],"prefix":"10.1049","volume":"10","author":[{"given":"De\u2010gang","family":"Sun","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of SciencesBeijingPeople's Republic of China"}]},{"given":"Jun","family":"Shi","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of SciencesBeijingPeople's Republic of China"},{"name":"University of Chinese Academy of SciencesBeijing100093People's Republic of China"}]},{"given":"Dong","family":"Wei","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of SciencesBeijingPeople's Republic of China"}]},{"given":"Meng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of SciencesBeijingPeople's Republic of China"}]},{"given":"Wei\u2010qing","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of SciencesBeijingPeople's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2016,2]]},"reference":[{"key":"e_1_2_6_2_2","unstructured":"Kuhn M.G.: \u2018Compromising emanations: eavesdropping risks of computer displays\u2019. Technical Report 2003. Available athttp:\/\/www.cl.cam.ac.uk\/TechReports\/UCAM\u2010CL\u2010TR\u2010577.pdf"},{"key":"e_1_2_6_3_2","unstructured":"Kuhn M.G.: \u2018Eavesdropping attacks on computer displays\u2019 Information Security Summit Prague 2006 pp.24\u201325"},{"key":"e_1_2_6_4_2","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1109\/TEMC.2012.2232297","article-title":"Study on maximum receivable distance for radiated emission of information technology equipment causing information leakage","volume":"55","author":"Sekiguchi H.","year":"2013","journal-title":"IEEE Trans. Electromagn. Compat."},{"issue":"4","key":"e_1_2_6_5_2","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","article-title":"Electromagnetic radiation from video display units: An eavesdropping risk?","volume":"4","author":"Eck W.v.","year":"1985","journal-title":"Comput. Secur."},{"key":"e_1_2_6_6_2","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/TEMC.2013.2252353","article-title":"Compromising emanations of LCD TV sets","volume":"55","author":"Kuhn M.G.","year":"2013","journal-title":"IEEE Trans. Electromagn. Compat."},{"key":"e_1_2_6_7_2","unstructured":"Wiesner A. Associates W.: \u2018Evaluating the information content of the computer monitor radio frequency radiation using a simple technique\u2019.Int. Conf on Network and Service Security N2S '09.2009 pp.1\u20135"},{"key":"e_1_2_6_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2014.2372039"},{"key":"e_1_2_6_9_2","unstructured":"Song T.\u2010L. Yook J.\u2010G.: \u2018Study of jamming countermeasure for electromagnetically leaked digital video signals\u2019.Proc. of the 2014 Int. Symp. on Electromagnetic Compatibility (EMC Europe 2014) 2014 pp.1161\u20131165"},{"key":"e_1_2_6_10_2","unstructured":"Elibol F. Sarac U. Erer I.: \u2018Realistic eavesdropping attacks on computer displays with low\u2010cost and mobile receiver system\u2019.2012\u00a0Proc. of the 20th European Signal Processing Conf. (EUSIPCO) 2012 pp.1767\u20131771"},{"key":"e_1_2_6_11_2","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TSA.2005.855834","article-title":"Robust speech recognition in noisy environments based on sub\u2010band spectral centroid histograms","volume":"14","author":"Gajic B.","year":"2006","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"e_1_2_6_12_2","unstructured":"Deng J. Wan W. Yu X.: \u2018Audio fingerprinting based on harmonic enhancement and spectral sub\u2010band centroid\u2019.IET Int. Communication Conf. Wireless Mobile and Computing 2011 pp.93\u201396"},{"key":"e_1_2_6_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TUFFC.2012.2309"},{"key":"e_1_2_6_14_2","doi-asserted-by":"crossref","unstructured":"Boonkla1 S. Unoki1 M. Makhanov S.S.: \u2018Speech analysis method based on source\u2010filter model using multivariate empirical mode decomposition in log\u2010spectrum domain\u2019.2014\u00a0Ninth Int. Symp. on Chinese Spoken Language Processing (ISCSLP) September2014 pp.555\u2013559","DOI":"10.1109\/ISCSLP.2014.6936715"},{"key":"e_1_2_6_15_2","unstructured":"Darvin R.C. Paranjape H. Mohanan S.K.et al: \u2018Analysis of autocorrelation based frequencymeasurement algorithm for IFM receivers\u2019 2014 IEEE Int. Conf. on Electronics Computing and Communication Technologies (IEEE CONECCT) 2014 pp.1\u20136"},{"key":"e_1_2_6_16_2","unstructured":"VESA Monitor Timing Specifications. Version 1.0 Video Electronics Standards Association. September 1998 The radio disturbance characteristics\u2010limits and measurement methods of information technology equipment. GB 9254\u20132008.2009"}],"container-title":["IET Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-spr.2014.0508","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-spr.2014.0508","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-spr.2014.0508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T06:03:18Z","timestamp":1612591398000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-spr.2014.0508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["10.1049\/iet-spr.2014.0508"],"URL":"https:\/\/doi.org\/10.1049\/iet-spr.2014.0508","archive":["Portico"],"relation":{},"ISSN":["1751-9675","1751-9683"],"issn-type":[{"value":"1751-9675","type":"print"},{"value":"1751-9683","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2]]}}}