{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/AA12443718.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/AA12443718#entity","@type":"bibo:Journal","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/AA12443718.json"},"dc:title":[{"@value":"IEEE transactions on information forensics and security"}],"dcterms:alternative":["Institute of Electrical and Electronics Engineers transactions on information forensics and security","Information forensics and security","T-IFS","Information forensics and security, IEEE transactions on"],"dc:publisher":[{"@value":"IEEE Signal Processing Society"}],"dc:language":"eng","dc:date":"2006","cinii:ncid":"AA12443718","cinii:ownerCount":"2","dcterms:medium":{"dc:title":"機械可読データファイル(リモートファイル)"},"foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA04982391#entity","@type":"foaf:Person","foaf:name":[{"@value":"IEEE Signal Processing Society"}]},{"@id":"https://ci.nii.ac.jp/author/DA00739948#entity","@type":"foaf:Person","foaf:name":[{"@value":"Institute of Electrical and Electronics Engineers"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA004322","@type":"foaf:Organization","foaf:name":"北海道科学大学 図書館"},{"@id":"https://ci.nii.ac.jp/library/FA01460X","@type":"foaf:Organization","foaf:name":"東京工科大学 メディアセンター","rdfs:seeAlso":{"@id":"http://library.teu.ac.jp/mylimedio/search/search.do?target=local&mode=comp&annex=all&ncid=AA12443718"}}],"bibo:lccn":["2005212395"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2005212395"}],"prism:publicationDate":["2006-"],"cinii:note":["Description based on: Vol. 5, issue 1 (Mar. 2010)","Access: via WWW"],"cinii:volumeYear":"Vol. 1, issue 1 (Mar. 2006)-","prism:issn":"15566021"}]}