{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:51:30Z","timestamp":1725551490722},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540639305"},{"type":"electronic","value":"9783540696698"}],"license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-63930-6_160","type":"book-chapter","created":{"date-parts":[[2010,4,5]],"date-time":"2010-04-05T21:12:10Z","timestamp":1270501930000},"page":"499-506","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Technical evaluation of biometric systems"],"prefix":"10.1007","author":[{"given":"Brigitte","family":"Wirtz","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,8,22]]},"reference":[{"key":"65_CR1","unstructured":"T.M. Corcoran, J.S. Fischer, A Dynamic Model for the Evaluation and Selection of Biometric Technologies, CardTech\/SecurTech'96, 1996, pp. 431\u2013449"},{"key":"65_CR2","unstructured":"M. Golfarelli, D. Maio, D. Maltoni, On the Error-Reject Tradeoff in Biometric Verification Systems, Rapporto tecnico CSITE-022-96, University of Bologna, Oct. 1996, pp. 1\u201326"},{"key":"65_CR3","first-page":"313","volume":"2","author":"R. Hopkins","year":"1997","unstructured":"R. Hopkins, Benchmarking Very Large Scale Biometric Identity Systems, CardTech\/SecurTech'97, 1997, vol. 2, pp. 313\u2013331","journal-title":"CardTech\/SecurTech'97"},{"issue":"2","key":"65_CR4","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/S0031-3203(96)00073-8","volume":"30","author":"A.K. Jain","year":"1997","unstructured":"A.K. Jain, C. Dorai, Practising vision: Integration, evaluation and application, Pattern Recognition, 1997, vol. 30, no. 2, pp. 183\u2013196","journal-title":"Pattern Recognition"},{"key":"65_CR5","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/0167-6393(95)00017-I","volume":"17","author":"J. Oglesby","year":"1995","unstructured":"John Oglesby, t's in a number? Moving beyond the equal error rateSpeech Communication, 1995, vol. 17, pp. 193\u2013208","journal-title":"Speech Communication"},{"key":"65_CR6","unstructured":"P.J. Phillips, P.J. Rauss, S.Z. Der, FERET Recognition Algorithm Development and Test Results, ARL-TR-995, October 1996"},{"issue":"10","key":"65_CR7","first-page":"67","volume":"39","author":"D.R. Richards","year":"1995","unstructured":"D.R. Richards, Rules of thumb for biometric systems, Security Management, 1995, vol. 39, no. 10, pp. 67\u201371","journal-title":"Security Management"},{"key":"65_CR8","doi-asserted-by":"crossref","unstructured":"L. Sachs, Statistische Methoden, Springer Verlag, 1970","DOI":"10.1007\/978-3-662-22684-1"},{"key":"65_CR9","first-page":"385","volume":"1","author":"J.L. Wayman","year":"1997","unstructured":"J.L. Wayman, The Science of Biometric Technologies: Classifiying, Testing, Evaluating and Selecting, CardTech\/SecurTech, 1997, vol. 1, pp. 385\u2013396","journal-title":"CardTech\/SecurTech"},{"key":"65_CR10","first-page":"477","volume":"1","author":"J.L. Wayman","year":"1997","unstructured":"J.L. Wayman, A Scientific Approach to Evaluating Biometric Systems using a Mathematical Methodology, CardTech\/SecurTech, 1997, vol. 1, pp. 477\u2013492","journal-title":"CardTech\/SecurTech"},{"key":"65_CR11","unstructured":"G. Williams, Comparing the Efficacy of Various Biometric Devices, BiometriCon'97, 1997, pp. Q1\u2013Q14"},{"key":"65_CR12","unstructured":"B. Wirtz, Ein System zur dynamischen Unterschriftsverifikation, 6. Handschriften-Symposium, BKA Wiesbaden, 1997, pp. 1\u201312"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2014 ACCV'98"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-63930-6_160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:53:32Z","timestamp":1558270412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-63930-6_160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540639305","9783540696698"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-63930-6_160","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]},"assertion":[{"value":"22 August 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}