{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T14:52:41Z","timestamp":1777906361126,"version":"3.51.4"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/das.2014.48","type":"proceedings-article","created":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T15:01:53Z","timestamp":1410793313000},"page":"146-150","source":"Crossref","is-referenced-by-count":40,"title":["Printer Identification Using Supervised Learning for Document Forgery Detection"],"prefix":"10.1109","author":[{"given":"Sara","family":"Elkasrawi","sequence":"first","affiliation":[]},{"given":"Faisal","family":"Shafait","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2009604"},{"key":"16","author":"schreyer","year":"2008","journal-title":"Intelligent Printing Technique Recognition and Photocopy Detection Using Digital Image Analysis for Forensic Document Examination"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1815330.1815354"},{"key":"14","first-page":"629","article-title":"An overview of the tesseract OCR engine","volume":"2","author":"smith","year":"2007","journal-title":"Document Analysis and Recognition 2007 ICDAR 2007 Ninth International Conference on"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1117\/12.772048","article-title":"Scanner identification with extension to forgery detection","volume":"68","author":"khanna","year":"2008","journal-title":"Electronic Imaging 2008 International Society for Optics and Photonics"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-009-0109-5"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-012-0287-5"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.102"},{"key":"1","first-page":"301","article-title":"Application of principal components analysis and gaussian mixture models to printer identification","volume":"20","author":"ali","year":"2004","journal-title":"International Conference on Digital Printing Technologies"},{"key":"10","first-page":"511","article-title":"Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices","volume":"19","author":"ali","year":"2003","journal-title":"Proc IS&T's NIP19 Int Conf Digital Printing Technol"},{"key":"7","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s10032-011-0181-5","article-title":"Text-line examination for document forgery detection","volume":"16","author":"van beusekom","year":"2013","journal-title":"Int Jour on Document Analysis and Recognition"},{"key":"6","first-page":"39","article-title":"Intelligent printing technique recognition and photocopy detection for forensic document examination","author":"schreyer","year":"2009","journal-title":"Informatiktage"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85303-9_4"},{"key":"4","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1117\/12.593796","article-title":"Printer identification based on graylevel cooccurrence features for security and forensic applications","author":"mikkilineni","year":"2005","journal-title":"Security Steganography and Watermarking of Multimedia Contents"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.29"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03521-0_15"}],"event":{"name":"2014 11th IAPR International Workshop on Document Analysis Systems (DAS)","location":"Tours, France","start":{"date-parts":[[2014,4,7]]},"end":{"date-parts":[[2014,4,10]]}},"container-title":["2014 11th IAPR International Workshop on Document Analysis Systems"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6823826\/6824386\/06830987.pdf?arnumber=6830987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T20:33:53Z","timestamp":1565814833000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6830987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":16,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/das.2014.48","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}