{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T02:55:42Z","timestamp":1765421742966},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540422167"},{"type":"electronic","value":"9783540453444"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45344-x_34","type":"book-chapter","created":{"date-parts":[[2007,10,27]],"date-time":"2007-10-27T20:47:36Z","timestamp":1193518056000},"page":"235-240","source":"Crossref","is-referenced-by-count":20,"title":["Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images"],"prefix":"10.1007","author":[{"given":"Seonjoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Dongjae","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jaihie","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,17]]},"reference":[{"issue":"1","key":"34_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/34.566808","volume":"19","author":"D. Maio","year":"1997","unstructured":"D. Maio and D. Maltoni, \u201cDirect Gray-Scale Minutiae Detection in Fingerprints,\u201d IEEE Trans. Pattern Anal. Machine Intell., vol. 19,no. 1, pp. 27\u201339, 1997.","journal-title":"IEEE Trans. Pattern Anal. Machine Intell"},{"issue":"4","key":"34_CR2","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A.K. Jain","year":"1997","unstructured":"A.K. Jain, L. Hong, and R. Bolle, \u201cOn-Line Fingerprint Verification,\u201d IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19,no. 4, pp.302\u2013313, April 1997.","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"34_CR3","unstructured":"L.C. Jain et al. Eds., Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press International Series on Computational Intelligence, 1999."},{"issue":"11","key":"34_CR4","doi-asserted-by":"publisher","first-page":"1,657","DOI":"10.1016\/0031-3203(95)00039-3","volume":"28","author":"N.K. Ratha","year":"1995","unstructured":"N.K. Ratha, S. Chen, and A.K. Jain, \u201cAdaptive Flow Orientation Based Feature Extraction in Fingerprint Images,\u201d Pattern Recognition, vol. 28,no. 11, pp. 1,657\u20131,672, 1995.","journal-title":"Pattern Recognition"},{"issue":"11","key":"34_CR5","doi-asserted-by":"crossref","first-page":"1,657","DOI":"10.1016\/0031-3203(95)00039-3","volume":"28","author":"Q. Xiao","year":"1995","unstructured":"Q. Xiao and H. Raafat, \u201cFingerprint Image Postprocessing: A Combined Statistical and Structural Approach,\u201d Pattern Recognition, vol. 28,no. 11, pp. 1,657\u20131,672, 1995.","journal-title":"Pattern Recognition"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L. Hong","year":"1998","unstructured":"L. Hong, Y. Wan, and A.K. Jain, \u201cFingerprint Image Enhancement: Algorithm and Performance Evaluation,\u201d IEEE Trans. Pattern Analysis and Machine Intelligence, vol.20, pp.777\u2013789, Aug. 1998.","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"34_CR7","volume-title":"Algorithms for Image Processing and Computer Vision","author":"J.R. Parker","year":"1997","unstructured":"J.R. Parker, Algorithms for Image Processing and Computer Vision, New York: Wiley Computer Publishing, 1997."},{"issue":"3","key":"34_CR8","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1049\/ip-vis:19981809","volume":"145","author":"A. Wahab","year":"1998","unstructured":"A. Wahab, S.H. Chin, and E.C. Tain, \u201cNovel Approach to Automated Fingerprint Recognition,\u201d IEE Proc.-Vis. Image Signal Process, vol.145,no.3, pp.160\u2013166, Jun. 1998.","journal-title":"IEE Proc.-Vis. Image Signal Process"}],"container-title":["Lecture Notes in Computer Science","Audio- and Video-Based Biometric Person Authentication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45344-X_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T12:21:32Z","timestamp":1551010892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45344-X_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540422167","9783540453444"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-45344-x_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}