{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:05Z","timestamp":1725552065445},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540332374"},{"type":"electronic","value":"9783540332381"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11732242_34","type":"book-chapter","created":{"date-parts":[[2006,3,3]],"date-time":"2006-03-03T10:12:37Z","timestamp":1141380757000},"page":"380-390","source":"Crossref","is-referenced-by-count":4,"title":["Evolutionary Singularity Filter Bank Optimization for Fingerprint Image Enhancement"],"prefix":"10.1007","author":[{"given":"Ung-Keun","family":"Cho","sequence":"first","affiliation":[]},{"given":"Jin-Hyuk","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Sung-Bae","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/b97425","volume-title":"Automatic Fingerprint Recognition Systems","author":"N. Ratha","year":"2004","unstructured":"Ratha, N., Bolle, R.: Automatic Fingerprint Recognition Systems. Springer, New York (2004)"},{"issue":"4","key":"34_CR2","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A.K. Jain","year":"1997","unstructured":"Jain, A.K., Hong, L., Bolle, R.: On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a019(4), 302\u2013314 (1997)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"7","key":"34_CR3","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TPAMI.2002.1017618","volume":"24","author":"A.M. Bazen","year":"2002","unstructured":"Bazen, A.M., Gerez, S.H.: Systematic methods for the computation of the directional fields and singular points of fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a024(7), 905\u2013919 (2002)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"34_CR4","unstructured":"Bazen, A.M., Gerez, S.H.: Segmentation of fingerprint images. In: Proc. ProRISC 2001 Workshop on Circuits, Systems and Signal Processing, Veldhoven, The Netherlands, pp. 276\u2013280 (2001)"},{"issue":"8","key":"34_CR5","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L. Hong","year":"1998","unstructured":"Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a020(8), 777\u2013789 (1998)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1016\/S0167-8655(03)00005-9","volume":"24","author":"J. Yang","year":"2003","unstructured":"Yang, J., Liu, L., Jiang, T., Fan, Y.: A modified Gabor filter design method for fingerprint image enhancement. Pattern Recognition Letters\u00a024, 1805\u20131817 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1006\/rtim.2001.0283","volume":"8","author":"S. Greenberg","year":"2002","unstructured":"Greenberg, S., Aldadjem, M., Kogan, D.: Fingerprint image enhancement using filtering techniques. Real-Time Imaging\u00a08, 227\u2013236 (2002)","journal-title":"Real-Time Imaging"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Zhu, E., Yin, J., Zhang, G.: Fingerprint enhancement using circular Gabor filter. In: International Conference on Image Analysis and Recognition, pp. 750\u2013758 (2004)","DOI":"10.1007\/978-3-540-30126-4_91"},{"key":"34_CR9","volume-title":"Genetic Algorithm in Search, Optimization and Machine Learning","author":"D. Goldberg","year":"1989","unstructured":"Goldberg, D.: Genetic Algorithm in Search, Optimization and Machine Learning. Addison-Wesley, Reading (1989)"},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0304-3975(00)00406-0","volume":"259","author":"L.M. Schmitt","year":"2001","unstructured":"Schmitt, L.M.: Theory of genetic algorithms. Theoretical Computer Science\u00a0259, 1\u201361 (2001)","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"34_CR11","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/JPROC.2004.825900","volume":"92","author":"S.B. Cho","year":"2004","unstructured":"Cho, S.B.: Emotional image and musical information retrieval with interactive genetic algorithm. Proceedings of the IEEE\u00a092(4), 702\u2013711 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"34_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/0923-5965(95)00033-X","volume":"8","author":"N.R. Harvey","year":"1996","unstructured":"Harvey, N.R., Marshall, S.: The use of genetic algorithms in morphological filter design. Signal Processing: Image Communication\u00a08, 55\u201371 (1996)","journal-title":"Signal Processing: Image Communication"},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10044-004-0204-7","volume":"7","author":"N. Yager","year":"2004","unstructured":"Yager, N., Admin, A.: Fingerprint classification: A review. Pattern Analysis and Application\u00a07, 77\u201393 (2004)","journal-title":"Pattern Analysis and Application"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1016\/S0031-3203(96)00178-1","volume":"30","author":"M.M.S. Chong","year":"1997","unstructured":"Chong, M.M.S., Ngee, T.H., Jun, L., Gay, R.K.L.: Geometric framework for fingerprint image classification. Pattern Recognition\u00a030, 1475\u20131488 (1997)","journal-title":"Pattern Recognition"},{"key":"34_CR15","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1016\/j.patcog.2003.12.020","volume":"37","author":"Q. Zhang","year":"2004","unstructured":"Zhang, Q., Yan, H.: Fingerprint classification based on extraction and analysis of singularities and pseudo ridges. Pattern Recognition\u00a037, 2233\u20132243 (2004)","journal-title":"Pattern Recognition"},{"issue":"4","key":"34_CR16","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/34.761265","volume":"21","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Prabhakar, S., Hong, L.: A multichannel approach to fingerprint classification. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a021(4), 348\u2013359 (1999)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"5","key":"34_CR17","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/34.765653","volume":"21","author":"R. Cappelli","year":"1999","unstructured":"Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Fingerprint classification by directional image partitioning. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a021(5), 402\u2013421 (1999)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1016\/S0031-3203(02)00349-7","volume":"36","author":"A. Ross","year":"2003","unstructured":"Ross, A., Jain, A., Reisman, J.: A hybrid fingerprint matcher. Pattern Recognition\u00a036, 1661\u20131673 (2003)","journal-title":"Pattern Recognition"},{"key":"34_CR19","volume-title":"Digital Image Processing","author":"R. Gonzalez","year":"1992","unstructured":"Gonzalez, R., Woods, R.: Digital Image Processing. Addison Wesley, Reading (1992)"},{"key":"34_CR20","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0304-3975(03)00393-1","volume":"310","author":"L.M. Schmitt","year":"2004","unstructured":"Schmitt, L.M.: Theory of genetic algorithms II: Models for genetic operators over the string-tensor representation to populations and convergence to global optima for arbitrary fitness function under scaling. Theoretical Computer Science\u00a0310, 181\u2013231 (2004)","journal-title":"Theoretical Computer Science"},{"key":"34_CR21","unstructured":"Watson, C., Wilson, C.: NIST Special Database 4. Fingerprint Database. National Institute of Standard and Technology (1992)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11732242_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:52:23Z","timestamp":1619491943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11732242_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540332374","9783540332381"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11732242_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}