{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T06:48:29Z","timestamp":1759042109653},"publisher-location":"Berlin, Heidelberg","reference-count":150,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540422167"},{"type":"electronic","value":"9783540453444"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45344-x_26","type":"book-chapter","created":{"date-parts":[[2007,10,27]],"date-time":"2007-10-27T20:47:36Z","timestamp":1193518056000},"page":"182-190","source":"Crossref","is-referenced-by-count":21,"title":["Recent Advances in Fingerprint Verification"],"prefix":"10.1007","author":[{"given":"Anil K.","family":"Jain","sequence":"first","affiliation":[]},{"given":"Sharath","family":"Pankanti","sequence":"additional","affiliation":[]},{"given":"Salil","family":"Prabhakar","sequence":"additional","affiliation":[]},{"given":"Arun","family":"Ross","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,17]]},"reference":[{"key":"26_CR1","volume-title":"Friction Ridge Skin: Comparison and Identification of Fingerprints","author":"J. Cowger","year":"1983","unstructured":"J. Cowger, Friction Ridge Skin: Comparison and Identification of Fingerprints. Elsevier, New York, 1983."},{"key":"26_CR2","unstructured":"Federal Bureau of Investigation, The Science of Fingerprints: Classification and Uses. U.S. Government Printing Office, Washington, D. C., 1984."},{"key":"26_CR3","unstructured":"National Institute of Standards and Technology, Guideline for The Use of Advanced Authentication Technology Alternatives. Federal Information Processing Standards Publication 190, 1994."},{"key":"26_CR4","unstructured":"J. Rafferty and J. Wegstein, The LX39 latent Fingerprint Matcher. U.S.A. Government Publication. National Bureau of Standards, Institute for Computer Sciences and Technology, 1978."},{"key":"26_CR5","doi-asserted-by":"crossref","DOI":"10.1201\/9781420048810","volume-title":"Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology","author":"D.R. Ashbaugh","year":"1999","unstructured":"D.R. Ashbaugh, Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology, CRC Press, Boca Raton, 1999."},{"volume-title":"Advances in Fingerprint Technology","year":"1991","key":"26_CR6","unstructured":"H.C. Lee and R.E. Gaensslen (editors), Advances in Fingerprint Technology, Elsevier, New York, 1991."},{"key":"26_CR7","volume-title":"Finger Prints","author":"F. Galton","year":"1892","unstructured":"F. Galton, Finger Prints, London: McMillan, 1892."},{"key":"26_CR8","volume-title":"Fingerprints, Palms and Soles: An Introduction to Dermatoglyphics","author":"H. Cummins","year":"1961","unstructured":"H. Cummins and Charles Midlo, Fingerprints, Palms and Soles: An Introduction to Dermatoglyphics. Dover Publications, Inc., New York, 1961."},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"A.K. Jain, R.M. Bolle, and S. Pankanti (editors), Biometrics: Personal Identification in a Networked Society, Kluwer Academic Publishers, 1999.","DOI":"10.1007\/b117227"},{"key":"26_CR10","unstructured":"L. Hong, \u201cAutomatic Personal Identification Using Fingerprints\u201d, Ph. D. Thesis, Department of Computer Science and Engineering, Michigan State University, East Lansing, 1998."},{"key":"26_CR11","unstructured":"S. Prabhakar, \u201cAutomatic Fingerprint Matching\u201d, Ph. D. Thesis, Department of Computer Science and Engineering, Michigan State University, East Lansing, 2001."},{"volume-title":"Intelligent Biometric Techniques in Fingerprint and Face Recognition","year":"1999","key":"26_CR12","unstructured":"L.C. Jain, U. Halici, I. Hayashi, and S.B. Lee (eds.), Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press, Boca Raton, 1999."},{"key":"26_CR13","volume-title":"Fingerprinting-A Manual of Identification","author":"C. Chapel","year":"1971","unstructured":"C. Chapel. Fingerprinting-A Manual of Identification. Coward McCann, New York, 1971."},{"key":"26_CR14","volume-title":"Fingerprint Techniques","author":"A. Moenssens","year":"1971","unstructured":"A. Moenssens. Fingerprint Techniques. Chilton Book Company, London, 1971."},{"key":"26_CR15","unstructured":"A.K. Jain and S. Pankanti, \u201cFingerprint classification and matching\u201d, In A. Bovik, editor, Handbook for Image and Video Processing. Academic Press, April 2000."},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"A.K. Jain, L. Hong and S. Pankanti, \u201cBiometrics Identification\u201d, Comm. ACM, pp. 91\u201398, Feb. 2000.","DOI":"10.1145\/328236.328110"},{"key":"26_CR17","unstructured":"J.L. Wayman, \u201cNational Biometric Test Center: Collected Works 1997\u20132000\u201d, http:\/\/www.engr.sjsu.edu\/biometrics\/nbtccw.pdf , 2000."},{"key":"26_CR18","volume-title":"Alphonse Bertillon: Father of Scientific Detection","author":"H.T.F. Rhodes","year":"1956","unstructured":"H.T.F. Rhodes. Alphonse Bertillon: Father of Scientific Detection. Abelard-Schuman, New York, 1956."},{"key":"26_CR19","unstructured":"S. Pankanti, R. Bolle, and A.K. Jain (Guest Editors), Special Issue of the IEEE Computer Magazine on Biometrics, Feb 2000."},{"key":"26_CR20","unstructured":"Proceedings of the First Audio and Video-Based Person Authentication, Crans-Montana, Switzerland, 12-14 March 1997."},{"key":"26_CR21","unstructured":"Proceedings of the Second Audio and Video-Based Person Authentication,Washington D. C. USA, March 22-23, 1999"},{"issue":"9","key":"26_CR22","volume":"85","year":"1997","unstructured":"Proceedings of the IEEE, Special Issue on Biometrics, Vol. 85,No. 9, 1997.","journal-title":"Proceedings of the IEEE"},{"key":"26_CR23","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/6.259484","volume":"31","author":"B. Miller","year":"1994","unstructured":"B. Miller, \u201cVital signs of identity,\u201d IEEE Spectrum, Vol. 31, pp. 22\u201330, February 1994.","journal-title":"IEEE Spectrum"},{"key":"26_CR24","unstructured":"First Workshop on Automatic Identification Advanced Technologies, Stoney Brook, New York, United States, 1997."},{"key":"26_CR25","unstructured":"Second Workshop on Automatic Identification Advanced Technologies, Morristown, New Jersey, United States, 1999."},{"key":"26_CR26","unstructured":"Biometrics Consortium, http:\/\/www.\/\/biometrics.org ."},{"key":"26_CR27","unstructured":"International Biometrics Industry Association, http:\/\/www.\/\/ibia.org ."},{"key":"26_CR28","unstructured":"BIOAPI, http:\/\/www.\/\/bioapi.org ."},{"key":"26_CR29","unstructured":"Digital Biometrics, Inc., biometric identification products. http:\/\/www.digitalbiometrics.com ."},{"key":"26_CR30","unstructured":"Siemens ID Mouse. http:\/\/www.\/\/siemens.com ."},{"key":"26_CR31","unstructured":"Fidelica Fingerprint Scanner. http:\/\/www.\/\/fidelica.com ."},{"key":"26_CR32","unstructured":"GemPlus, \u201cGemplus-Products, Services-Hardware-GemPC430\u201d, http:\/\/www.gemplus.com\/products\/hardware\/gempcTouch440.htm ."},{"key":"26_CR33","unstructured":"Precise Biometrics, \u201cPrecise 100 A, SC\u201d, http:\/\/www.\/\/precisebiometrics.com ."},{"key":"26_CR34","unstructured":"Oxford Micro Devices Inc., \u201cOMDI (finger) Imaging Technology that can help children\u201d, http:\/\/www.\/\/oxfordmicro.com ."},{"key":"26_CR35","unstructured":"Veritouch, \u201cVR-3-(U) \u201d, http:\/\/www.\/\/veritouch.com ."},{"key":"26_CR36","unstructured":"Access Control Applications using Optical Computing. http:\/\/www.mytec.com ."},{"key":"26_CR37","unstructured":"Edge Lit Hologram for Live-scan Fingerprinting. http:\/\/eastview.org\/ImEdge ."},{"key":"26_CR38","unstructured":"Scanner Specifications. ftp:\/\/ard.fbi.gov\/pub\/IQS\/spec ."},{"key":"26_CR39","unstructured":"Thomson CSF. http:\/\/www.tcs.thomson-csf.com\/fingerchip\/FC_home.htm ."},{"issue":"11","key":"26_CR40","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1364\/AO.31.001794","volume":"31","author":"Y. Fumio","year":"1992","unstructured":"Y. Fumio, I. Seigo, and E. Shin, \u201cReal-time fingerprint sensor using a hologram\u201d, Applied Optics, 31(11):1794, 1992.","journal-title":"Applied Optics"},{"key":"26_CR41","unstructured":"J. Klett, \u201c\u2018Thermal imaging fingerprint technology,\u201d In Proc. Biometric Consortium Ninth Meeting, Crystal City, Virginia, April 1997."},{"key":"26_CR42","unstructured":"Lexington Technology, Inc. Lexington Technology, Inc. Homepage. http:\/\/www.lexingtontech.com ."},{"issue":"4","key":"26_CR43","first-page":"287","volume":"25","author":"I. Seigo","year":"1989","unstructured":"I. Seigo, E. Shin, and S. Takashi, \u201cHolographic fingerprint sensor,\u201d Fujitsu Scientific and Technical Journal, 25(4):287, 1989.","journal-title":"Fujitsu Scientific and Technical Journal"},{"key":"26_CR44","unstructured":"Harris Semiconductor. Harris Semiconductor Homepage. http:\/\/www.semi.harris.com\/fngrloc ."},{"key":"26_CR45","unstructured":"TRS. Technology Recognition Systems Homepage. http:\/\/www.betac.com\/trs ."},{"key":"26_CR46","unstructured":"W. Bicz, D. Banasiak, P. Bruciak, Z. Gumienny, S. Gumulinski, D. Kosz, A. Krysiak, W. Kuczynski, M. Pluta, and G. Rabiej, Fingerprint structure imaging based on an ultrasound camera. http:\/\/www.optel.com.pl\/article\/english\/article.htm ."},{"issue":"1","key":"26_CR47","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/55.553063","volume":"18","author":"N.D. Young","year":"1997","unstructured":"N.D. Young, G. Harkin, R.M. Bunn, D.J. McCulloch, R.W. Wilks, and A.G. Knapp, \u201cNovel fingerprint scanning arrays using polysilicon tft\u2019s on glass and polymer substrates,\u201d IEEE Electron Device Letters, 18(1):19\u201320, Jan 1997.","journal-title":"IEEE Electron Device Letters"},{"key":"26_CR48","unstructured":"Digital Persona, \u201cOptical Fingerprint Sensors\u201d, http:\/\/www.\/\/digitalpersona.com ."},{"key":"26_CR49","unstructured":"G.V. Piosenka and R.V. Chandos, \u201cUnforgeable personal identification system\u201d, U. S. Patent 4,993,068, 1991."},{"key":"26_CR50","unstructured":"D.R. Setlak, \u201cFingerprint sensor having spoof reduction features and related methods\u201d, U.S. Patent 5,953,441, 1999."},{"key":"26_CR51","unstructured":"Lapsley et al., \u201cAnti-fraud biometric scanner that accurately detects blood flow\u201d, U.S. Patent 5,737,439, 1998."},{"key":"26_CR52","doi-asserted-by":"crossref","unstructured":"S. Ghosal, N.K. Ratha, R. Udupa, and S. Pankanti, \u201cHierarchical partitioned least squares filter-bank for fingerprint enhancement,\u201d 15th IAPR International Conference on Pattern Recognition, Barcelona, Spain, Sep. 3\u20137, pp. 334\u2013337, 2000.","DOI":"10.1109\/ICPR.2000.903553"},{"key":"26_CR53","doi-asserted-by":"crossref","unstructured":"P.E. Danielsson and Q.Z. Ye, \u201cRotation-invariant operators applied to enhancement of fingerprints,\u201d In Proc. 9th ICPR, pages 329\u2013333, Rome, 1988.","DOI":"10.1109\/ICPR.1988.28234"},{"key":"26_CR54","doi-asserted-by":"crossref","unstructured":"T. Kamei and M. Mizoguchi, \u201cImage filter design for fingerprint enhancement,\u201d In Proc. ISCV\u2019 95, pages 109\u2013114, Coral Gables, FL, 1995.","DOI":"10.1109\/ISCV.1995.476986"},{"issue":"3","key":"26_CR55","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1520\/JFS13438J","volume":"38","author":"E. Kaymaz","year":"1993","unstructured":"E. Kaymaz and S. Mitra, \u201cA novel approach to Fourier spectral enhancement of laser-luminescent fingerprint images,\u201d Journal of Forensic Sciences, 38(3):530, 1993.","journal-title":"Journal of Forensic Sciences"},{"issue":"7","key":"26_CR56","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/83.502393","volume":"5","author":"A. Sherstinsky","year":"1996","unstructured":"A. Sherstinsky and R. Picard, \u201cM-Lattice: From Morphogenesis to Image Processing,\u201d IEEE Transactions on Image Processing, Vol. 5,No. 7, pp. 1137\u20131150, July 1996.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"11","key":"26_CR57","doi-asserted-by":"publisher","first-page":"1,661","DOI":"10.1016\/0031-3203(93)90021-N","volume":"26","author":"D.C. D. Hung","year":"1993","unstructured":"D.C. D. Hung, \u201cEnhancement and Feature Purification of Fingerprint Images,\u201d Pattern Recognition, vol. 26,no. 11, pp. 1,661\u20131,671, 1993.","journal-title":"Pattern Recognition"},{"issue":"8","key":"26_CR58","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L. Hong","year":"1998","unstructured":"L. Hong, Y. Wan, and A.K. Jain, \u201cFingerprint Image Enhancement: Algorithm and Performance Evaluation,\u201d IEEE Trans. Pattern Anal. and Machine Intell., Vol. 20,No. 8, pp. 777\u2013789, 1998.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"issue":"1","key":"26_CR59","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/0031-3203(89)90035-6","volume":"22","author":"L. O\u2019Gorman","year":"1989","unstructured":"L. O\u2019Gorman and J.V. Nickerson, \u201cAn Approach to Fingerprint Filter Design\u201d, Pattern Recognition, Vol. 22,No. 1, 29\u201338, 1989.","journal-title":"Pattern Recognition"},{"issue":"10","key":"26_CR60","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1016\/0031-3203(91)90095-M","volume":"24","author":"Q. Xiao","year":"1991","unstructured":"Q. Xiao and H. Raafat, \u201cFingerprint Image Postprocessing: A Combined Statistical and Structural Approach,\u201d Pattern Recognition, vol. 24,no. 10, pp. 985\u2013992, 1991.","journal-title":"Pattern Recognition"},{"key":"26_CR61","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/ICPR.2000.905269","volume":"I","author":"S. Prabhakar","year":"2000","unstructured":"S. Prabhakar, A.K. Jain, J. Wang, S. Pankanti, and R. Bolle, \u201cMinutiae Verification and Classification for Fingerprint Matching\u201d, Proc. 15th International Conference on Pattern Recognition (ICPR), Vol. I, pp. 25\u201329, Barcelona, September 3-8, 2000.","journal-title":"Proc. 15th International Conference on Pattern Recognition (ICPR)"},{"key":"26_CR62","unstructured":"L. Berdan and R. Chiralo, \u201cAdaptive digital enhancement of latent fingerprints,\u201d In Proc. Int. Carnahan Conf. on Electronic Crime Countermeasures, pages 131\u2013135, University of Kentucky, Lexington, Kentucky, 1978."},{"issue":"18","key":"26_CR63","doi-asserted-by":"publisher","first-page":"1720","DOI":"10.1049\/el:19921093","volume":"28","author":"K. Millard","year":"1992","unstructured":"K. Millard, D. Monro, and B. Sherlock, \u201cAlgorithm for enhancing fingerprint images,\u201d Electronics Letters, 28(18):1720, 1992.","journal-title":"Electronics Letters"},{"issue":"2","key":"26_CR64","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/ip-vis:19949924","volume":"141","author":"D. Sherlock","year":"1994","unstructured":"D. Sherlock, D.M. Monro, and K. Millard, \u201cFingerprint enhancement by directional Fourier filtering,\u201d IEE Proc. Vis. Image Signal Processing, 141(2):87\u201394, 1994.","journal-title":"IEE Proc. Vis. Image Signal Processing"},{"issue":"9","key":"26_CR65","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1016\/S0031-3203(96)00178-1","volume":"30","author":"M.M.S. Chong","year":"1997","unstructured":"M.M.S. Chong, T.H. Ngee, L. Jun, and R.K.L. Gay, \u201cGeometric framework for Fingerprint Classification,\u201d Pattern Recognition, Vol. 30,No. 9, pp. 1475\u20131488, 1997.","journal-title":"Pattern Recognition"},{"key":"26_CR66","first-page":"81","volume":"13","author":"K. Goto","year":"1982","unstructured":"K. Goto, T. Minami, and O. Nakamura, \u201cFingerprint classification by directional distribution patterns,\u201d System Computer Controls, 13:81\u201389, 1982.","journal-title":"System Computer Controls"},{"key":"26_CR67","doi-asserted-by":"crossref","unstructured":"D. Maio and D. Maltoni, \u201cA structural approach to fingerprint classification,\u201d In Proc. 13th ICPR, pages 578\u2013585, Vienna, 1996.","DOI":"10.1109\/ICPR.1996.547013"},{"issue":"4","key":"26_CR68","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/34.761265","volume":"21","author":"A.K. Jain","year":"1999","unstructured":"A.K. Jain, S. Prabhakar, and L. Hong, \u201cA Multichannel Approach to Fingerprint Classification\u201d, IEEE Trans. Pattern Anal. and Machine Intell., Vol. 21,No. 4, pp. 348\u2013359, 1999.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"issue":"10","key":"26_CR69","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1016\/0031-3203(96)00018-0","volume":"29","author":"A.P. Fitz","year":"1996","unstructured":"A.P. Fitz and R.J. Green, \u201cFingerprint Classification Using Hexagonal Fast Fourier Transform,\u201c Pattern Recognition, Vol. 29,No. 10, pp. 1587\u20131597, 1996.","journal-title":"Pattern Recognition"},{"key":"26_CR70","doi-asserted-by":"crossref","unstructured":"A. Senior, \u201cA Hidden Markov Model Fingerprint Classifier,\u201d Proceedings of the 31st Asilomar conference on Signals, Systems and Computers, pp. 306\u2013310, 1997.","DOI":"10.1109\/ACSSC.1997.680212"},{"issue":"7","key":"26_CR71","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1016\/0031-3203(93)90006-I","volume":"26","author":"B.G. Sherlock","year":"1993","unstructured":"B.G. Sherlock and D.M. Monro, \u201cA Model for Interpreting Fingerprint Topology,\u201d Pattern Recognition, Vol. 26,No.7, pp. 1047\u20131055, 1993.","journal-title":"Pattern Recognition"},{"issue":"3","key":"26_CR72","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TPAMI.1986.4767798","volume":"8","author":"B. Moayer","year":"1986","unstructured":"B. Moayer and K. Fu, \u201cA Tree System Approach for Fingerprint Pattern Recognition,\u201d IEEE Trans. Pattern Anal. and Machine Intell., vol. 8no.3, pp. 376\u2013388, 1986.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"issue":"2","key":"26_CR73","first-page":"203","volume":"1","author":"C.L. Wilson","year":"1993","unstructured":"C.L. Wilson, G.T. Candela, and C.I. Watson, \u201cNeural Network Fingerprint Classification,\u201d J. Artificial Neural Networks, Vol. 1,No. 2, pp. 203\u2013228, 1993.","journal-title":"J. Artificial Neural Networks"},{"key":"26_CR74","first-page":"223","volume":"2 3","author":"C.V. Kameshwar Rao","year":"1980","unstructured":"C.V. Kameshwar Rao and K. Black, \u201cType Classification of Fingerprints: A Syntactic Approach,\u201d IEEE Trans. Pattern Anal. and Machine Intell., Vol. 2, No.3, pp. 223\u2013231, 1980.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"key":"26_CR75","doi-asserted-by":"crossref","unstructured":"G. T. Candela, P.J. Grother, C.I. Watson, R.A. Wilkinson, and C.L. Wilson, \u201cPCASYS: A Pattern-Level Classification Automation System for Fingerprints,\u201d NIST Tech. Report NISTIR 5647, August 1995.","DOI":"10.6028\/NIST.IR.5647"},{"issue":"3","key":"26_CR76","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/0031-3203(95)00106-9","volume":"29","author":"K. Karu","year":"1996","unstructured":"K. Karu and A.K. Jain, \u201cFingerprint Classification,\u201d Pattern Recognition, Vol. 29,No. 3, pp. 389\u2013404, 1996.","journal-title":"Pattern Recognition"},{"issue":"3","key":"26_CR77","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/0031-3203(84)90079-7","volume":"17","author":"M. Kawagoe","year":"1984","unstructured":"M. Kawagoe and A. Tojo, \u201cFingerprint Pattern Classification,\u201d Pattern Recognition, Vol. 17,No. 3, pp. 295\u2013303, 1984.","journal-title":"Pattern Recognition"},{"key":"26_CR78","unstructured":"R. Cappelli, D. Maio, and D. Maltoni, \u201cFingerprint Classification based on Multispace KL\u201d, Proc. Workshop on Automatic Identification Advances Technologies (AutoID\u201999), Summit (NJ), pp. 117\u2013120, October 1999."},{"key":"26_CR79","doi-asserted-by":"crossref","unstructured":"R. Cappelli, D. Maio, and D. Maltoni, \u201cCombining Fingerprint Classifiers\u201d, First International Workshop on Multiple Classifier Systems (MCS2000), Cagliari, pp.351\u2013361, June 2000.","DOI":"10.1007\/3-540-45014-9_34"},{"issue":"3","key":"26_CR80","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1162\/neco.1993.5.3.402","volume":"5","author":"P. Baldi","year":"1993","unstructured":"P. Baldi and Y. Chauvin, \u201cNeural networks for fingerprint recognition,\u201d Neural Computation, 5(3):402\u2013418, 1993.","journal-title":"Neural Computation"},{"key":"26_CR81","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/0031-3203(76)90018-2","volume":"8","author":"B. Moayer","year":"1976","unstructured":"B. Moayer and K. Fu, \u201cAn application of stochastic languages to fingerprint pattern recognition,\u201d Pattern Recognition, 8:173\u2013179, 1976.","journal-title":"Pattern Recognition"},{"key":"26_CR82","unstructured":"L. Hong and A.K. Jain, \u201cClassification of Fingerprint Images,\u201d 11th Scandinavian Conference on Image Analysis, June 7\u201311, Kangerlussuaq, Greenland, 1999."},{"key":"26_CR83","unstructured":"R. Bahuguna, \u201cFingerprint verification using hologram matched filterings\u201d, In Proc. Biometric Consortium Eighth Meeting, San Jose, California, June 1996."},{"key":"26_CR84","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/T-C.1975.224229","volume":"24","author":"K. Balck","year":"1975","unstructured":"K. Balck and K. Rao, \u201cA hybrid optical computer processing technique for fingerprint identification\u201d, IEEE Trans. Computer, 24:358\u2013369, 1975.","journal-title":"IEEE Trans. Computer"},{"issue":"5\/6","key":"26_CR85","first-page":"493","volume":"37","author":"B. Chatterjee","year":"1991","unstructured":"B. Chatterjee and B. Mehtre, \u201cAutomatic fingerprint identification,\u201d Journal of the Institution of Electronics and Telecom., 37(5\/6):493, 1991.","journal-title":"Journal of the Institution of Electronics and Telecom"},{"issue":"9","key":"26_CR86","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSPEC.1973.5212832","volume":"10","author":"M. Eleccion","year":"1973","unstructured":"M. Eleccion, \u201cAutomatic fingerprint identification,\u201d IEEE Spectrum, 10(9):36\u201345, 1973.","journal-title":"IEEE Spectrum"},{"key":"26_CR87","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1117\/12.56030","volume":"30","author":"K. Fielding","year":"1991","unstructured":"K. Fielding, J. Homer, and C. Makekau, \u201cOptical fingerprint identification by binary joint transform correlation,\u201d Optical Engineering, 30:1958, 1991.","journal-title":"Optical Engineering"},{"issue":"5","key":"26_CR88","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1364\/AO.31.000652","volume":"31","author":"L. Frye","year":"1992","unstructured":"L. Frye, F. Gamble, and D. Grieser, \u201cReal-time fingerprint verification system,\u201d Applied Optics, 31(5):652, 1992.","journal-title":"Applied Optics"},{"issue":"4","key":"26_CR89","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/BF02943110","volume":"4","author":"Q. Guisheng","year":"1989","unstructured":"Q. Guisheng, C. Minde, Q. Shi, and N. Xue, \u201cA new automated fingerprint identification system,\u201d Computer Science Technology, 4(4):289\u2013294, 1989.","journal-title":"Computer Science Technology"},{"key":"26_CR90","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/0031-3203(90)90134-7","volume":"23","author":"A.K. Hrechak","year":"1990","unstructured":"A.K. Hrechak and J.A. McHugh, \u201cAutomated Fingerprint Recognition Using Structural Matching,\u201d Pattern Recognition, Vol. 23, pp. 893\u2013904, 1990.","journal-title":"Pattern Recognition"},{"issue":"9","key":"26_CR91","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1109\/5.628674","volume":"85","author":"A.K. Jain","year":"1997","unstructured":"A.K. Jain, L. Hong, S. Pankanti, and Ruud Bolle, \u201cAn identity authentication system using fingerprints,\u201d Proceedings of the IEEE, Vol. 85,No.9, pp. 1365\u20131388, 1997.","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"26_CR92","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A.K. Jain","year":"1997","unstructured":"A.K. Jain, L. Hong, and R. Bolle, \u201cOn-line Fingerprint Verification,\u201d IEEE Trans. Pattern Anal. and Machine Intell., Vol. 19,No. 4, pp. 302\u2013314, 1997.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"issue":"5","key":"26_CR93","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/83.841531","volume":"9","author":"A.K. Jain","year":"2000","unstructured":"A.K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, \u201cFilterbank-based Fingerprint Matching,\u201d IEEE Trans. Image Processing, Vol. 9,No. 5, pp. 846\u2013859, May 2000.","journal-title":"IEEE Trans. Image Processing"},{"key":"26_CR94","unstructured":"A. Ross, S. Prabhakar, and A.K. Jain, \u201cFingerprintMatching Using Minutiae and Texture Features\u201d, to appear in International Conference on Image Processing (ICIP), Greece, October 7-10, 2001."},{"issue":"1","key":"26_CR95","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/34.566808","volume":"19","author":"D. Maio","year":"1997","unstructured":"D. Maio and D. Maltoni, \u201cDirect Gray-Scale Minutiae Detection in Fingerprints,\u201d IEEE Trans. Pattern Anal. and Machine Intell., Vol. 19,No. 1, pp. 27\u201340, 1997.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"issue":"10","key":"26_CR96","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1016\/0031-3203(93)90151-L","volume":"26","author":"L. Coetzee","year":"1993","unstructured":"L. Coetzee and E.C. Botha, \u201cFingerprint Recognition in Low Quality Images,\u201d Pattern Recognition, Vol. 26,No. 10, pp. 1141\u20131460, 1993.","journal-title":"Pattern Recognition"},{"key":"26_CR97","unstructured":"L. O\u2019Gorman, \u201cFingerprint Verification,\u201d in Biometrics: Personal Identification in a Networked Society, A.K. Jain, R. Bolle, and S. Pankanti (editors), Kluwer Academic Publishers, pp. 43\u201364, 1998."},{"issue":"8","key":"26_CR98","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/34.531800","volume":"18","author":"N. Ratha","year":"1996","unstructured":"N. Ratha, K. Karu, S. Chen, and A.K. Jain, \u201cA Real-Time Matching System for Large fingerprint Databases,\u201d IEEE Trans. Pattern Anal. and Machine Intell., Vol. 18,No. 8, pp. 799\u2013813, 1996.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"issue":"11","key":"26_CR99","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1016\/0031-3203(95)00039-3","volume":"28","author":"N. Ratha","year":"1995","unstructured":"N. Ratha, S. Chen, and A.K. Jain, \u201cAdaptive Flow Orientation-Based Feature Extraction in Fingerprint Images,\u201d Pattern Recognition, Vol. 28,No. 11, pp. 1657\u20131672, 1995.","journal-title":"Pattern Recognition"},{"key":"26_CR100","unstructured":"S. Chen and A.K. Jain, \u201cA Fingerprint Matching Algorithm Using Dynamic Programming\u201d, Technical Report, Department of Computer Science and Engineering, Michigan State University, 1999."},{"key":"26_CR101","unstructured":"X. Quinghan and B. Zhaoqi, \u201cAn Approach to Fingerprint Identification by Using the Attributes of Feature Lines of Fingerprints,\u201d Proc. Eighth Int. Conf. Pattern Recognition, pp. 663\u2013665, Oct. 1986."},{"key":"26_CR102","unstructured":"C. Banner and R. Stock, \u201cThe FBI\u2019s approach to automatic fingerprint identification (part I), \u201d FBI Law Enforcement Bulletin, U.S.A. Government Publication, 44(1), 1975."},{"key":"26_CR103","unstructured":"C. Banner and R. Stock, \u201cThe FBI\u2019s approach to automatic fingerprint identification (part II), \u201d FBI Law Enforcement Bulletin, U.S.A. Government Publication, 44(2), 1975."},{"key":"26_CR104","first-page":"1469","volume":"76","author":"I. Hideki","year":"1993","unstructured":"I. Hideki, K. Ryuj, and H. Yu, \u201cA fast automatic fingerprint identification method based on a weighted-mean of binary image,\u201d IEICE Transactions on Fundamentals of Electronic, 76:1469, 1993.","journal-title":"IEICE Transactions on Fundamentals of Electronic"},{"key":"26_CR105","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0031-3203(86)90017-8","volume":"19","author":"D. Isenor","year":"1986","unstructured":"D. Isenor and S. Zaky, \u201cFingerprint identification using graph matching,\u201d Pattern Recognition, 19:113\u2013122, 1986.","journal-title":"Pattern Recognition"},{"key":"26_CR106","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/T-C.1975.224229","volume":"24","author":"G. Johnson","year":"1975","unstructured":"G. Johnson, D. McMahon, S. Teeter, and G. Whitney, \u201cA hybrid optical computer processing technique for fingerprint identification,\u201d IEEE Trans. Computers, 24:358\u2013369, 1975.","journal-title":"IEEE Trans. Computers"},{"issue":"2-3","key":"26_CR107","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/BF01211936","volume":"6","author":"B. Mehtre","year":"1993","unstructured":"B. Mehtre, \u201cFingerprint image analysis for automatic identification,\u201d Machine Vision and Applications, 6(2-3):124\u2013139, 1993.","journal-title":"Machine Vision and Applications"},{"issue":"9","key":"26_CR108","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/5.628710","volume":"85","author":"A. Roddy","year":"1997","unstructured":"A. Roddy and J. Stosz, \u201cFingerprint features-statistical analysis and system performance estimates,\u201d Proceedings of IEEE, 85(9):1390\u20131421, 1997.","journal-title":"Proceedings of IEEE"},{"key":"26_CR109","unstructured":"M. Sparrow and P. Sparrow, A Topological Approach to The Matching of Single Fingerprints: Development of Algorithms for Use on Latent Fingermarks. U.S.A. Government Publication. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, Washington, D.C., 1985."},{"issue":"4","key":"26_CR110","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0141-9331(93)90018-3","volume":"17","author":"E. Szekly","year":"1993","unstructured":"E. Szekly and V Szekly, \u201cImage recognition problems of fingerprint identification,\u201d Microprocessors and Microsystems, 17(4):215\u2013218, 1993.","journal-title":"Microprocessors and Microsystems"},{"issue":"4871","key":"26_CR111","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1038\/197938a0","volume":"197","author":"M. Trauring","year":"1963","unstructured":"M. Trauring, \u201cAutomatic comparison of fingerprint-ridge patterns,\u201d Nature, 197 (4871):938\u2013940, 1963.","journal-title":"Nature"},{"key":"26_CR112","unstructured":"J. Wegstein, The M40 Fingerprint Matcher. U.S.A. Government Publication. Washington D.C.: National Bureau of Standards, Technical Note 878, U.S Government Printing Office, 1972."},{"key":"26_CR113","doi-asserted-by":"crossref","unstructured":"J.H. Wegstein, An Automated Fingerprint Identification System. U.S.A. Government Publication, Washington, 1982.","DOI":"10.6028\/NBS.SP.500-89"},{"issue":"4","key":"26_CR114","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/99.641608","volume":"4","author":"R. Germain","year":"1997","unstructured":"R. Germain, A Califano, and S. Colville, \u201cFingerprint matching using transformation parameter clustering,\u201d IEEE Computational Science and Engineering, 4(4):42\u201349, 1997.","journal-title":"IEEE Computational Science and Engineering"},{"key":"26_CR115","unstructured":"A.K. Jain, S. Prabhakar, and A. Ross, \u201cFingerprint Matching: Data Acquisition and Performance Evaluation\u201d, MSU Technical Report TR99-14, 1999."},{"key":"26_CR116","doi-asserted-by":"crossref","unstructured":"A.K. Jain, S. Prabhakar, and S. Pankanti, \u201cTwin Test: On Discriminability of Fingerprints\u201d to appear in 3rd International Conference on Audio-and Video-Based Person Authentication, Sweden, June 6\u20138, 2001.","DOI":"10.1007\/3-540-45344-X_30"},{"key":"26_CR117","unstructured":"D. Maio, D. Maltoni, R. Cappelli, J.L. Wayman, and A.K. Jain, \u201cFVC2000: Fingerprint Verification Competition\u201d, Proc. 15th International Conference Pattern Recognition, Barcelona, September 3\u20138, 2000, http:\/\/bias.csr.unibo.it\/fvc2000\/ ."},{"key":"26_CR118","unstructured":"J.G. Daugman and G.O. Williams, \u201cA Proposed Standard for Biometric Decidability,\u201d in Proc. CardTech\/SecureTech Conf., pp. 223\u2013234, Atlanta, GA, 1996."},{"key":"26_CR119","unstructured":"J.L. Wayman, \u201cMulti-finger Penetration Rate and ROC Variability for Automatic Fingerprint Identification Systems\u201d, Technical Report, San Jose State University, 1999, http:\/\/www.engr.sjsu.edu\/biometrics\/ ."},{"key":"26_CR120","doi-asserted-by":"crossref","unstructured":"J.L. Wayman, \u201cTechnical Testing and Evaluation of Biometric Identification Devices,\u201d In Biometrics: Personal Identification in Networked Society, Anil K. Jain, Ruud Bolle, and S. Pankanti (editors), Kluwer Academic publishers, pp. 345\u2013368, 1998.","DOI":"10.1007\/0-306-47044-6_17"},{"key":"26_CR121","unstructured":"United Kingdom Biometric Working Group, \u201cBest Practices in Testing and Reporting Biometric Device Performance\u201d, Version 1.0, March 2000. http:\/\/www.afb.org.uk\/bwg\/bestprac10.pdf ."},{"key":"26_CR122","unstructured":"Unpublished 1995 report by Frank Torpay of Mitre Corporation using data extracted from the FBI\u2019s Identification Division Automated Services database of 22, 000, 000 human-classified fingerprints."},{"key":"26_CR123","unstructured":"R. Bolle, N.K. Ratha, and S. Pankanti, \u201cEvaluating techniques for biometricsbased authentication systems\u201d, Proc. 15th IAPR Int. Conference on Pattern Recognition, Barcelona, Spain, Sep. 3-8, 2000."},{"key":"26_CR124","unstructured":"L. Hong, A.K. Jain and S. Pankanti, \u201cCan Multibiometrics Improve Performance? \u201d, Proceedings AutoID\u201999, Summit, NJ, pp. 59\u201364, Oct 1999."},{"key":"26_CR125","unstructured":"A.K. Jain, L. Hong, and Y. Kulkarni, \u201cA Multimodal Biometric System using Fingerprint, Face, and Speech\u201d, Proc. 2nd Int\u2019l Conference on Audio-and Videobased Biometric Person Authentication, Washington D.C., pp. 182\u2013187, 1999."},{"issue":"11-13","key":"26_CR126","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1016\/S0167-8655(99)00108-7","volume":"20","author":"A.K. Jain","year":"1999","unstructured":"A.K. Jain, S. Prabhakar, and S. Chen, \u201cCombining Multiple Matchers for a High Security Fingerprint Verification System\u201d, Pattern Recognition Letters, Vol 20,No. 11-13, pp. 1371\u20131379, November 1999.","journal-title":"Pattern Recognition Letters"},{"issue":"12","key":"26_CR127","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.1109\/34.735803","volume":"20","author":"L. Hong","year":"1998","unstructured":"L. Hong and A.K. Jain, \u201cIntegrating Faces and Fingerprints For Personal Identification,\u201d IEEE Trans. Pattern Anal. and Machine Intell., Vol.20,No.12, pp. 1295\u20131307, 1998.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"key":"26_CR128","doi-asserted-by":"crossref","unstructured":"S. Prabhakar and A.K. Jain, \u201cDecision-level Fusion in Fingerprint Verification\u201d to appear in Pattern Recognition, 2001.","DOI":"10.1007\/3-540-48219-9_9"},{"issue":"9","key":"26_CR129","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/S0167-8655(97)00063-9","volume":"18","author":"U. Dieckmann","year":"1997","unstructured":"U. Dieckmann, P. Plankensteiner, and T. Wagner, \u201cSesam: a Biometric Person Identification System Using Sensor Fusion,\u201d Pattern Recognition Letters, Vol. 18,No. 9, pp. 827\u2013833, 1997.","journal-title":"Pattern Recognition Letters"},{"issue":"3","key":"26_CR130","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/34.667881","volume":"20","author":"J. Kittler","year":"1998","unstructured":"J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, \u201cOn Combining Classifiers\u201d, IEEE Trans. on Patt. Anal. and Machine Intell., Vol. 20,No.3, pp. 226\u2013239, 1998.","journal-title":"IEEE Trans. on Patt. Anal. and Machine Intell"},{"issue":"1","key":"26_CR131","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/34.273716","volume":"16","author":"T.K. Ho","year":"1994","unstructured":"T.K. Ho, J.J. Hull, and S.N. Srihari, \u201cOn Multiple Classifier Systems for Pattern Recognition\u201d, IEEE Trans. Pattern Anal. and Machine Intell., Vol. 16,No. 1, pp. 66\u201375, 1994.","journal-title":"IEEE Trans. Pattern Anal. and Machine Intell"},{"key":"26_CR132","unstructured":"American National Standard for Information Systems, \u201cData Format for the Interchange of Fingerprint, Facial, and Scar Mark, & Tattoo (SMT) Information, Doc#ANSI\/NIST-CSL ITL 1-2000, NIST Special Public Report 500-245\u201d, American National Standards Institute, New York, 2000"},{"key":"26_CR133","unstructured":"C. I.Watson and C.L. Wilson, \u201cNISTS pecial Database 4, Fingerprint Database,\u201d National Institute of Standards and Technology, March 1992."},{"key":"26_CR134","unstructured":"C.I. Watson and C.L. Wilson, \u201cNISTS pecial Database 9, Fingerprint Database,\u201d National Institute of Standards and Technology, March 1992."},{"key":"26_CR135","unstructured":"J.L. Wayman, \u201cDaubert Hearing on Fingerprinting\u201d, http:\/\/www.engr.sjsu.edu\/biometrics\/publications_daubert.html ."},{"key":"26_CR136","unstructured":"R. Epstein and E. Hey, \u201cChallenging the testimony of forensic identification experts in a post-daubert world: The new rules of the game\u201d, National Seminar for Federal Defenders, New Orleans, June 5\u20137, 2000."},{"key":"26_CR137","doi-asserted-by":"crossref","unstructured":"J. Osterburg, T. Parthasarathy, T.E.S. Raghavan, and S.L. Sclove, \u201cDevelopment of a Mathematical Formula for the Calculation of Fingerprint Probabilities Based on Individual Characteristics\u201d, Journal of the American Statistical Association, No. 360, Vol. 72, 1997.","DOI":"10.2307\/2286458"},{"key":"26_CR138","unstructured":"Problem Idents. http:\/\/onin.com\/fp\/problemidents.html ."},{"key":"26_CR139","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/ICPR.2000.903587","volume":"3","author":"R. Cappelli","year":"2000","unstructured":"R. Cappelli, A. Erol, D. Maio, and D. Maltoni, \u201cSynthetic Fingerprint-image Generation\u201d, Proc. International Conference on Pattern Recognition (ICPR), Barcelona, Vol. 3, pp. 475\u2013478, September 2000.","journal-title":"Proc. International Conference on Pattern Recognition (ICPR)"},{"issue":"8","key":"26_CR140","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/6.30775","volume":"26","author":"F. Karen","year":"1989","unstructured":"F. Karen, \u201cEncryption, smart cards, and fingerprint readers,\u201d IEEE Spectrum, 26(8):22, 1989.","journal-title":"IEEE Spectrum"},{"key":"26_CR141","unstructured":"D. Mintie, \u201cWelfare id at the point of transaction using fingerprint and 2D bar codes,\u201d In Proc. CardTech\/SecurTech, Volume II: Applications, pages 469\u2013476, Atlanta, Georgia, May 1996."},{"issue":"2","key":"26_CR142","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/BF01067817","volume":"24","author":"C. Stanley","year":"1994","unstructured":"C. Stanley, \u201cAre fingerprints a genetic marker for handedness? \u201d Behavior Genetics, 24(2):141, 1994.","journal-title":"Behavior Genetics"},{"key":"26_CR143","unstructured":"C.M. Brislawn, The FBI Fingerprint Image Compression Standard. http:\/\/www.c3.lanl.gov\/~brislawn\/FBI\/FBI.html ."},{"key":"26_CR144","unstructured":"R.M. Bolle, S.E. Colville, and S. Pankanti, \u201cSystem and method for determining ridge counts in fingerprint image processing,\u201d U.S. Patent No. 6,111,978, 2000."},{"key":"26_CR145","doi-asserted-by":"crossref","unstructured":"R. Cappelli, D. Maio, and D. Maltoni, \u201cModeling plastic distortion in fingerprints\u201d, Iinternational Conference on advances in pattern Recognition (ICAPR 2001), Rio Othon Palace Hotel, Rio de Jaeiro, Brazil, March 11-14, 2001.","DOI":"10.1007\/3-540-44732-6_38"},{"key":"26_CR146","unstructured":"A.W. Senior and R. Bolle, \u201cImproved Fingerprint Matching by Distortion Removal\u201d, IEICE Transactions Special issue on Biometrics, to appear, 2001."},{"issue":"4","key":"26_CR147","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1117\/1.1287795","volume":"9","author":"M. Yeung","year":"2000","unstructured":"M. Yeung and S. Pankanti, \u201cVerification Watermarks on Fingerprint Recognition and Retrieval\u201d, Journal of Electronic Imaging, vol. 9,No. 4, pp. 468\u2013476, October 2000.","journal-title":"Journal of Electronic Imaging"},{"key":"26_CR148","unstructured":"N.K. Ratha, J. Connell, and R. Bolle, \u201cSecure Biometric Authentication\u201d, Proc. 1999 IEEE Workshop on Automatic Identification Advanced Technologies, October 28\u201329, Morristown, NJ, 1999."},{"key":"26_CR149","unstructured":"N. Ratha, J. Connell, and R. Bolle, \u201cCancelable Biometrics\u201d, Biometrics Consortium Workshop, September 2000."},{"key":"26_CR150","doi-asserted-by":"crossref","unstructured":"J. Woodward, \u201cBiometrics: Identifying law and policy concerns\u201d, in Biometrics: Personal identification in a networked society, A.K. Jain, R. Bolle, and S. Pankanti (eds.), Kluwer Academic Publishers, 1999.","DOI":"10.1007\/0-306-47044-6_19"}],"container-title":["Lecture Notes in Computer Science","Audio- and Video-Based Biometric Person Authentication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45344-X_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T22:22:11Z","timestamp":1556922131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45344-X_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540422167","9783540453444"],"references-count":150,"URL":"https:\/\/doi.org\/10.1007\/3-540-45344-x_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}