{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:03:45Z","timestamp":1743152625966,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387747248"},{"type":"electronic","value":"9780387784144"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-78414-4_124","type":"book-chapter","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:24:57Z","timestamp":1221582297000},"page":"48-55","source":"Crossref","is-referenced-by-count":1,"title":["Biometrics for User Authentication"],"prefix":"10.1007","author":[{"given":"Claus","family":"Villager","sequence":"first","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"No. 4","key":"124_CR1_124","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/93.959103","volume":"Vol. 8","author":"J. Dittmann","year":"October-December 2001","unstructured":"J. Dittmann, P. Wohlmacher, and K. Nahrstedt, \u201cMultimedia and Security \u2013 Using Cryptographic and Watermarking Algorithms,\u201d IEEE MultiMedia, Vol. 8, No. 4, October-December 2001, pp. 54\u201365.","journal-title":"IEEE MultiMedia"},{"key":"124_CR2_124","volume-title":"\u201cComputer Security,\u201d","author":"M. Bishop","year":"2003","unstructured":"M. Bishop, \u201cComputer Security,\u201d Addison-Wesley, Boston, MA, 2003."},{"key":"124_CR3_124","volume-title":"\u201cBiometric User Authentication for IT Security: From Fundamentals to Handwriting,\u201d","author":"C. Villager","year":"2005","unstructured":"C. Villager, \u201cBiometric User Authentication for IT Security: From Fundamentals to Handwriting,\u201d Springer, New York, 2005."},{"key":"124_CR4_124","first-page":"247","volume-title":"\u201cPractical Unix and Internet Security,\u201d","author":"S. Garfinkel","year":"1996","unstructured":"S. Garfinkel and G. Spafford, \u201cPractical Unix and Internet Security,\u201d O'Reilly, Sebastopol, CA, 1996, pp. 247\u2013250."},{"issue":"No. 6","key":"124_CR5_124","first-page":"948","volume":"Vol. 92","author":"Uludag","year":"2004","unstructured":"Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, \u201cBiometric Cryptosystems: Issues and Challenges,\u201d Proceedings of the IEEE, Special Issue on Multimedia Security for Digital Rights Management, Vol. 92, No. 6, 2004, pp. 948\u2013960.","journal-title":"Proceedings of the IEEE, Special Issue on Multimedia Security for Digital Rights Management"},{"issue":"No. 2","key":"124_CR6_124","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0031-3203(02)00030-4","volume":"Vol. 36","author":"J. Daugman","year":"2003","unstructured":"J. Daugman, \u201cThe importance of being random: Statistical principles of iris recognition,\u201d Pattern Recognition, Vol. 36, No. 2, 2003, pp. 279\u2013291.","journal-title":"Pattern Recognition"},{"issue":"No. 2","key":"124_CR7_124","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0031-3203(89)90059-9","volume":"Vol. 22","author":"R. Plamondon","year":"1989","unstructured":"R. Plamondon and G. Lorette, \u201cAutomatic Signature Verification and Writer Identification \u2013 the State of the Art,\u201d Pattern Recognition, Vol. 22, No. 2, 1989, pp. 107\u2013131.","journal-title":"Pattern Recognition"},{"key":"124_CR8_124","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1142\/S0218001494000346","volume":"Vol. 8","author":"F. Leclerc","year":"1994","unstructured":"F. Leclerc and R. Plamondon, \u201cAutomatic Verification and Writer Identification: The State of the Art 1989\u20131993,\u201d International Journal of Pattern Recognition and Artificial Intelligence, Vol. 8, 1994, pp. 643\u2013660.","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"issue":"No. 8","key":"124_CR9_124","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1109\/34.57669","volume":"Vol. 12","author":"C.C. Tappert","year":"1990","unstructured":"C.C. Tappert, C.Y. Suen, and T. Wakahara, \u201cThe State of the Art in Online Handwriting Recognition,\u201d IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12, No. 8, 1990, pp. 787\u2013808.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"124_CR10_124","first-page":"707","volume":"Vol. 10","author":"V.I. Levenshtein","year":"1966","unstructured":"V.I. Levenshtein, \u201cBinary codes capable of correcting deletions, insertions, and reversals,\u201d Soviet Physics, Vol. 10, 1966, pp. 707\u2013710.","journal-title":"Soviet Physics"},{"issue":"No. 1","key":"124_CR11_124","first-page":"34","volume":"Vol. 47","author":"A.K. Jain","year":"2004","unstructured":"A.K. Jain and A. Ross, \u201cMultibiometric Systems,\u201d Communications of the ACM, Special Issue on Multimodal Interfaces, Vol. 47, No. 1, 2004, pp. 34\u201340.","journal-title":"Communications of the ACM, Special Issue on Multimodal Interfaces"},{"key":"124_CR12_124","unstructured":"WIPO Patent Registration WO 97\/04375, Electronic Data-Processing System, 1997."},{"key":"124_CR13_124","doi-asserted-by":"crossref","unstructured":"C. Villager, R. Steinmetz, and A. Mayerh\u00f6fer, \u201cBiometric Hash based on Statistical Features of Online Signatures,\u201d Proceedings of the IEEE International Conference on Pattern Recognition (ICPR), Quebec City, Canada, Vol. 1, 2002, pp. 123\u2013126.","DOI":"10.1109\/ICPR.2002.1044628"}],"container-title":["Encyclopedia of Multimedia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-78414-4_124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T23:17:00Z","timestamp":1738365420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-78414-4_124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9780387747248","9780387784144"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-78414-4_124","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}