{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:08:35Z","timestamp":1730218115782,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/eisic.2017.27","type":"proceedings-article","created":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T21:30:02Z","timestamp":1514496602000},"page":"135-138","source":"Crossref","is-referenced-by-count":1,"title":["Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media Websites"],"prefix":"10.1109","author":[{"given":"Michael","family":"Martin","sequence":"first","affiliation":[]},{"given":"Jeremy","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Thirimachos","family":"Bourlai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CRV.2012.67"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77255-2_28"},{"journal-title":"Secre-tary's Advisory Committee on Human Research Protections (SACHRP)","article-title":"Considerations and Recommendations Concerning Internet Research and Human Subjects Research Regulations, with Revisions","year":"2013","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.179"},{"key":"ref14","first-page":"5","article-title":"Critical Questions for Big Data","volume":"15","author":"dana","year":"2012","journal-title":"Information Communication and Society"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281195"},{"key":"ref16","first-page":"94 100h","article-title":"Efficient graph-cut tattoo segmentation","author":"kim","year":"2015","journal-title":"IS&T\/SPIE Electronic Imaging"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374555"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791158"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568921"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2013.6645881"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5414140"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752396"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568950"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SSIAI.2008.4512275"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.884368"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BSYM.2008.4655515"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2011.59"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613003"},{"journal-title":"Title 45 – Public Welfare Department of Health and Human Services Part 46 Protection of Human Subjects","article-title":"Code of Federal Regulations","year":"2009","key":"ref20"}],"event":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","start":{"date-parts":[[2017,9,11]]},"location":"Athens","end":{"date-parts":[[2017,9,13]]}},"container-title":["2017 European Intelligence and Security Informatics Conference (EISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8234922\/8240751\/08240781.pdf?arnumber=8240781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T22:32:50Z","timestamp":1517869970000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8240781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/eisic.2017.27","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}