{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:03:10Z","timestamp":1742911390952,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":19,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387730028"},{"type":"electronic","value":"9780387730035"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-73003-5_164","type":"book-chapter","created":{"date-parts":[[2009,7,27]],"date-time":"2009-07-27T01:02:31Z","timestamp":1248656551000},"page":"826-836","source":"Crossref","is-referenced-by-count":0,"title":["Iris Recognition Performance Under Extreme Image Compression"],"prefix":"10.1007","author":[{"given":"John","family":"Daugman","sequence":"first","affiliation":[]},{"given":"Cathryn","family":"Downing","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"164_CR1_164","doi-asserted-by":"crossref","unstructured":"Bradley, J., Brislawn, C., Hopper, T.: The FBI Wavelet\/Scalar Quantization standard for grayscale fingerprint image compression. Proc. SPIE (Applications of Digital Image Processing XIX) 2847 (1996)","DOI":"10.1117\/12.258243"},{"key":"164_CR2_164","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TIFS.2007.916009","volume":"3","author":"J. Daugman","year":"2008","unstructured":"Daugman, J., Downing, C.: Effect of severe image compression on iris recognition performance. IEEE Trans. Inform. Forensics Secur. 3, 52\u201361 (2008)","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"key":"164_CR3_164","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C. Shannon","year":"1948","unstructured":"Shannon, C.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J"},{"key":"164_CR4_164","first-page":"4","volume":"1","author":"A. Kolmogorov","year":"1965","unstructured":"Kolmogorov, A.: Three approaches to the quantitative definition of information. Probl. Inform. Transm. 1, 4\u20137 (1965)","journal-title":"Probl. Inform. Transm"},{"key":"164_CR5_164","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/34.216726","volume":"15","author":"D. Terzopoulos","year":"1993","unstructured":"Terzopoulos, D., Waters, K.: Analysis and synthesis of facial image sequences using physical and anatomical models. IEEE Trans. Pattern Anal. Mach. Intell 15, 569\u2013579 (1993)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell"},{"key":"164_CR6_164","first-page":"475","volume":"15","author":"R. Cappelli","year":"2000","unstructured":"Cappelli, R., Maio, D., Maltoni, D.: Synthetic fingerprint-image generation. Proc. Int. Conf. Pattern Recognit. 15, 475\u2013478 (2000)","journal-title":"Proc. Int. Conf. Pattern Recognit"},{"key":"164_CR7_164","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/ICPR.2004.1333804","volume":"4","author":"J. Cui","year":"2004","unstructured":"Cui, J., Wang, Y., Huang, J., Tan, T., Sun, Z.: An iris image synthesis method based on PCA and super-resolution. Proc. 17th Int. Conf. Pattern Recognit. 4, 471\u2013474 (2004)","journal-title":"Proc. 17th Int. Conf. Pattern Recognit"},{"key":"164_CR8_164","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/TIFS.2006.890305","volume":"2","author":"J. Zuo","year":"2007","unstructured":"Zuo, J., Schmid, N., Chen, X.: On generation and analysis of synthetic iris images. IEEE Trans. Inform. Forensics Secur. 2, 77\u201390 (2007)","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"key":"164_CR9_164","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1098\/rspb.2001.1696","volume":"268","author":"J. Daugman","year":"2001","unstructured":"Daugman, J., Downing, C.: Epigenetic randomness, complexity, and singularity of human iris patterns. Proc. R. Soc. B Biol. Sci. 268, 1737\u20131740 (2001)","journal-title":"Proc. R. Soc. B Biol. Sci"},{"key":"164_CR10_164","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J. Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14, 21\u201330 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol"},{"key":"164_CR11_164","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1109\/TIFS.2007.902401","volume":"2","author":"S. Rakshit","year":"2007","unstructured":"Rakshit, S., Monro, D.: An evaluation of image sampling and compression for human iris recognition. IEEE Trans. Inform. Forensics Secur. 2, 605\u2013612 (2007)","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"key":"164_CR12_164","unstructured":"National Institute of Standards and Technology. Iris challenge evaluation. http:\/\/iris.nist.gov\/ice\/"},{"key":"164_CR13_164","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"34","author":"G. Wallace","year":"1991","unstructured":"Wallace, G.: The JPEG still picture compression standard. Commun. ACM 34, 30\u201344 (1991)","journal-title":"Commun. ACM"},{"key":"164_CR14_164","unstructured":"International Organisation for Standards: Information technology \u2013 Digital compression and coding of continuous-tone still images. ISO\/IEC 10918 (1994)"},{"key":"164_CR15_164","unstructured":"Bradley, A., Stentiford, F.: JPEG2000 and region of interest coding. In: Digital Imaging Computing Techniques and Applications. Melbourne, Australia (2002)"},{"key":"164_CR16_164","unstructured":"International Organisation for Standards: Information technology \u2013 JPEG2000 image coding system. ISO\/IEC 15444-1 (2004)"},{"key":"164_CR17_164","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1109\/30.920468","volume":"46","author":"C. Christopoulos","year":"2000","unstructured":"Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 still image coding system: an overview. IEEE Trans. Consum. Electron 46, 1103\u20131127 (2000)","journal-title":"IEEE Trans. Consum. Electron"},{"key":"164_CR18_164","unstructured":"Hsu, R., Griffin, P.: JPEG region of interest compression for face recognition. IDENTIX Doc. RDNJ-04-0102 (2005)"},{"key":"164_CR19_164","unstructured":"Registered Traveler Interoperability Consortium (RTIC): Technical Interoperability Specification for the Registered Traveler Program. http:\/\/\/www.rtconsortium.org\/"}],"container-title":["Encyclopedia of Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73003-5_164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T12:33:18Z","timestamp":1739277198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73003-5_164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387730028","9780387730035"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73003-5_164","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}