{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:00:22Z","timestamp":1729634422390,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cibim.2014.7015462","type":"proceedings-article","created":{"date-parts":[[2015,1,24]],"date-time":"2015-01-24T02:26:28Z","timestamp":1422066388000},"page":"185-194","source":"Crossref","is-referenced-by-count":2,"title":["Speeding up the knowledge-based deblocking method for efficient forensic analysis"],"prefix":"10.1109","author":[{"given":"Yanzhu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaojie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Adams Wai Kin","family":"Kong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/103085.103089"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.934141"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.935384"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/TIP.2003.814252","article-title":"Removing the blocking artifacts of block-based DCT compressed images","volume":"12","author":"luo","year":"2003","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/97.659544"},{"key":"ref12","first-page":"22","article-title":"How to Beat the Net?","author":"hunter","year":"2001","journal-title":"Community Care"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2033427"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2006.876168"},{"key":"ref16","first-page":"1992","article-title":"Unidentified bodies\/skulls found in Danish waters in the period","volume":"123","author":"kringsholm","year":"0","journal-title":"Forensic Science International"},{"volume":"19","journal-title":"Leviticus","year":"0","key":"ref17"},{"volume":"7","journal-title":"Translation of Sahih Bukhari","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/6046.985556"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4284716"},{"key":"ref4","article-title":"Federal prosecution of child sex exploitation offenders, 2006","author":"motivans","year":"2007","journal-title":"Bureau of Justice Statistics"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563100"},{"journal-title":"BBC International Child Porn Ring Smashed","year":"2001","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995531"},{"key":"ref29","first-page":"88","article-title":"A parallel architecture for high speed fractal image coding","author":"lee","year":"1999","journal-title":"Proc of the International Symposium on Parallel Architectures Algorithms and Networks"},{"key":"ref5","first-page":"1","article-title":"Fundamental statistics of relatively permanent pigmented or vascular skin marks","author":"nurhudatiana","year":"2011","journal-title":"International Joint Conference on Biometrics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.904969"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2157821"},{"journal-title":"Canada's National Tipline for Reporting The Online Sexual Exploitation of Children","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.891788"},{"journal-title":"U S Immigration and Customs Enforcement","article-title":"Ex-marine convicted of using drugs and force to have sex","year":"2008","key":"ref1"},{"article-title":"Transformation-based method for indexing high-dimensional data for nearest neighbour Queriesd","year":"2004","author":"yu","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5413381"},{"key":"ref21","first-page":"518","article-title":"Similarity search in high dimensions via hashing","author":"gionis","year":"1999","journal-title":"Proc of International Conference on Very Large Databases"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/355744.355745"},{"key":"ref23","first-page":"409","article-title":"Dynamic batch nearest neighbor search in video retrieval","author":"shao","year":"2008","journal-title":"Proc of IEEE International Conference on Data Engineering"},{"key":"ref26","first-page":"14","article-title":"A review of various k-nearest neighbor query processing techniques","volume":"31","author":"dhanabal","year":"2011","journal-title":"International Journal of Computer Applications"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1071610.1071612"}],"event":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","start":{"date-parts":[[2014,12,9]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7000190\/7011733\/07015462.pdf?arnumber=7015462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:16:24Z","timestamp":1498191384000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7015462\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cibim.2014.7015462","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}