{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:58:08Z","timestamp":1742950688282,"version":"3.40.3"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030519704"},{"type":"electronic","value":"9783030519711"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51971-1_3","type":"book-chapter","created":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T17:03:00Z","timestamp":1596906180000},"page":"26-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Hand Contour Classification Using Ensemble of Natural Features: A Large Comparative Study"],"prefix":"10.1007","author":[{"given":"Jaroslav","family":"Moravec","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,9]]},"reference":[{"issue":"11","key":"3_CR1","first-page":"7","volume":"2","author":"RC Bakshe","year":"2014","unstructured":"Bakshe, R.C., Patil, A.M.: Hand geometry techniques: a review. Int. J. Mod. Commun. Technol. Res. 2(11), 7 (2014)","journal-title":"Int. J. Mod. Commun. Technol. Res."},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.ins.2018.01.010","volume":"479","author":"S Barra","year":"2019","unstructured":"Barra, S., Marsico, M.D., Nappi, M., Narducci, F., Riccio, D.: A hand-based biometric system in visible light for mobile environments. Inf. Sci. 479, 472\u2013485 (2019)","journal-title":"Inf. Sci."},{"key":"3_CR3","unstructured":"Bartlett, M.S., Lades, H.M., Sejnowski, T.J.: Independent component representations for face recognition. In: Conference on Human Vision and Electronic Imaging III, San Jose, California (1998)"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/34.121791","volume":"14","author":"PJ Besl","year":"1992","unstructured":"Besl, P.J., McKay, H.D.: A method for registration of 3-D shapes. IEEE Trans. Pattern Anal. Mach. Intell. 14(2), 239\u2013256 (1992)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"3_CR5","first-page":"101","volume":"3","author":"S Bharathi","year":"2011","unstructured":"Bharathi, S., Sudhakar, R.: Hand biometrics: an overview. Int. J. Auto. Ident. Technol. 3(2), 101\u2013108 (2011)","journal-title":"Int. J. Auto. Ident. Technol."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Borra, S.R., Reddy, G.J., Reddy, E.S.: A broad survey on fingerprint recognition systems. In: IEEE 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (2016)","DOI":"10.1109\/WiSPNET.2016.7566372"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/s00500-006-0124-0","volume":"11","author":"J Brest","year":"2007","unstructured":"Brest, J., Bo\u0161kovi\u010d, B., Greiner, S., \u017dumer, V., Mau\u010dec, M.S.: Performance comparison of self-adaptive and adaptive differential evolution algorithms. Soft. Comput. 11, 617\u2013629 (2007)","journal-title":"Soft. Comput."},{"issue":"2","key":"3_CR8","first-page":"134","volume":"1","author":"N Covavisaruch","year":"2003","unstructured":"Covavisaruch, N., Prateepamornkul, P., Ruchikachorn, P., Taksaphan, P.: Personal verification and identification using hand geometry. ECTI Trans. Comput. Inf. Technol. 1(2), 134\u2013140 (2003)","journal-title":"ECTI Trans. Comput. Inf. Technol."},{"issue":"1","key":"3_CR9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circ. Syst. Video Technol. 14(1), 21\u201330 (2004)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Dubuisson, M.P., Jain, A.K.: A modified Hausdorff distance for object matching. In: 12th International Conference on Pattern Recognition, pp. 566\u2013568 (1994)","DOI":"10.1109\/ICPR.1994.576361"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"2797","DOI":"10.1016\/j.patcog.2009.02.007","volume":"42","author":"N Duta","year":"2009","unstructured":"Duta, N.: A survey of biometric technology based on hand shape. Pattern Recogn. 42, 2797\u20132806 (2009)","journal-title":"Pattern Recogn."},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s11063-007-9052-y","volume":"26","author":"M Faundez-Zanuy","year":"2016","unstructured":"Faundez-Zanuy, M., Elizondo, D.A., Ferrer-Ballester, M.A., Travieso-Gonz\u00e1lez, C.M.: Authentication of individuals using hand geometry biometrics: a neural network approach. Neural Process. Lett. 26, 201\u2013216 (2016)","journal-title":"Neural Process. Lett."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Ferrer, M.A., Morales, A., Travieso, C.M., Alonso, J.B.: Low cost multimodal biometric identification system based on hand geometry, palm and finger textures. In: 41st Annual IEEE International Carnahan Conference on Security Technology, pp. 52\u201358 (2007)","DOI":"10.1109\/CCST.2007.4373467"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Ferrer, M., Vargas-Bonilla, J., Morales, A.: BiSpectral contactless hand based biometric identification device (2011). https:\/\/doi.org\/10.5772\/18096","DOI":"10.5772\/18096"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Hemery, B., Mahier, J., Pasquet, M., Rosenberger, C.: Face authentication for banking. In: First International Conference on Advances in Computer-Human Interaction (2008)","DOI":"10.1109\/ACHI.2008.17"},{"issue":"4","key":"3_CR16","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1364\/JOSAA.4.000629","volume":"4","author":"BKP Horn","year":"1987","unstructured":"Horn, B.K.P.: Closest form solution of absolute orientation using unit quaternions. J. Opt. Soc. Am. 4(4), 629\u2013642 (1987)","journal-title":"J. Opt. Soc. Am."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Charfi, N.: Biometric recognition based on hand shape and palmprint modalities. Image Processing. Ecole nationale sup\u00e9rieure Mines-T\u00e9l\u00e9com Atlantique (2017)","DOI":"10.1007\/978-3-319-67074-4_52"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2010.11.027","volume":"2","author":"S Chauhan","year":"2010","unstructured":"Chauhan, S., Arora, A.S., Kaul, A.: A survey of emerging biometric modalities. Procedia Comput. Sci. 2, 213\u2013218 (2010)","journal-title":"Procedia Comput. Sci."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Iorio, A., Li, X.: Solving rotated multi-objective optimization problems using differential evolution. In: Australian Conference on Artificial Intelligence, Cairns, Australia, pp. 861\u2013872 (2004)","DOI":"10.1007\/978-3-540-30549-1_74"},{"key":"3_CR20","unstructured":"Jain, A.K., Ross, A., Pankanti, S.: A prototype hand geometry-based verification system. In: 2nd International Conference on Audio and Video based Biometric Person Authentication, pp. 166\u2013171 (1999)"},{"key":"3_CR21","unstructured":"Jetensk\u00fd, P., Marek, J., Rak, J.: Fingers segmentation and its approximation. In: Proceedings of 25th International Conference Radioelektronika, RADIOELEKTRONIKA 2015, pp. 431\u2013434. IEEE (Institute of Electrical and Electronics Engineers), New York (2015). ISBN 978-1-4799-8117-5"},{"key":"3_CR22","unstructured":"Jetensk\u00fd, P.: Human hand image analysis extracting finger coordinates using circular scanning. In: Proceedings of 25th International Conference Radioelektronika, Radioelektronika 2015, pp. 427\u2013430. IEEE (Institute of Electrical and Electronics Engineers), New York (2015). ISBN 978-1-4799-8117-5"},{"key":"3_CR23","unstructured":"Jetensk\u00fd, P.: Human hand image analysis extracting finger coordinates and axial vectors: finger axis detection using blob extraction and line fitting. In: 2014 24th International Conference Radioelektronika, pp. 1\u20134. IEEE (Institute of Electrical and Electronics Engineers), New York (2014). ISBN 978-1-4799-3715-8"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Jost, T., H\u00fcgli, H.: Fast ICP algorithms for shape registration. In: Joint Pattern Recognition Symposium, pp. 91\u201399 (2002)","DOI":"10.1007\/3-540-45783-6_12"},{"issue":"11","key":"3_CR25","first-page":"1510","volume":"44","author":"W Kang","year":"2014","unstructured":"Kang, W., Wu, Q.: Pose-invariant hand shape recognition based on finger. Geometry 44(11), 1510\u20131521 (2014)","journal-title":"Geometry"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Kumar, A., Hanmandlu, M., Kuldeep, M., Gupta, H.M.: Automatic ear detection for online biometric applications. In: Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (2011)","DOI":"10.1109\/NCVPRIPG.2011.69"},{"issue":"9","key":"3_CR27","doi-asserted-by":"publisher","first-page":"3580","DOI":"10.1016\/j.eswa.2012.12.065","volume":"40","author":"RM Luque-Baena","year":"2013","unstructured":"Luque-Baena, R.M., Elizondob, D., Lopez-Rubioa, E., Palomoa, E.J., Watsonb, T.: Assessment of geometric features for individual identification and verification in biometric hand systems. Expert Syst. Appl. 40(9), 3580\u20133594 (2013)","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"3_CR28","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1109\/TPAMI.2011.248","volume":"34","author":"L Maier-Hein","year":"2012","unstructured":"Maier-Hein, L., Franz, A.M., Santos, T.R., Schmidt, M., Fangerau, M., Meinzer, H.P., Fitzpatrick, J.M.: Convergent iterative closest-point algorithm to accommodate anisotropic and inhomogenous localization error. IEEE Trans. Pattern Anal. Mach. Intell. 34(8), 1520\u20131532 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Mallipeddi, R., Suganthan, P.N.: Differential evolution algorithm with ensemble of parameters and mutation and crossover strategies. In: International Conference on Swarm, Evolutionary, and Memetic Computing SEMCCO 2010, pp. 71\u201378 (2010)","DOI":"10.1007\/978-3-642-17563-3_9"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.ins.2016.03.055","volume":"366","author":"J Moravec","year":"2016","unstructured":"Moravec, J., Hub, M.: Automatic correction of barrel distorted images using cascaded evolutionary estimator. J. Inf. Sci. 366, 70\u201398 (2016)","journal-title":"J. Inf. Sci."},{"issue":"3","key":"3_CR31","doi-asserted-by":"publisher","first-page":"2895","DOI":"10.3390\/s130302895","volume":"28","author":"G Park","year":"2013","unstructured":"Park, G., Kim, S.: Hand biometric recognition based on fused hand geometry and vascular patterns. Sensors 28(3), 2895\u20132910 (2013)","journal-title":"Sensors"},{"key":"3_CR32","unstructured":"Parker, J.R.: Algorithms for Image Processing and Computer Vision, 2nd edn. Wiley, New York (2010)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Pavlidis, T.: Algorithms for Graphics and Image Processing, Springer, Heidelberg (1982)","DOI":"10.1007\/978-3-642-93208-3"},{"key":"3_CR34","unstructured":"Pottmann, H., Huang, Q.X., Yang, Y.L., Hu, S.M.: Geometry and convergence analysis of algorithms for registration of 3D shapes. Int. J. Comput. Vis. 67(3), 277\u2013296 (2006)"},{"key":"3_CR35","unstructured":"Price, K.: Differential evolution: a fast and simple numerical optimizer. In: NAFIPS, pp. 524\u2013527 (1996)"},{"key":"3_CR36","unstructured":"Price, K., Storn, R.: Minimizing the real functions of the ICEC contest by differential evolution. In: IEEE International Conference on Evolutionary Computation, pp. 842\u2013844 (1996)"},{"key":"3_CR37","unstructured":"Price, K., Storn, R.: Differential evolution \u2013 a simple evolution strategy for fast optimization. Dr. Dobb\u2019s J. 22(4), 18\u201324 and 78 (1997)"},{"issue":"1","key":"3_CR38","first-page":"6","volume":"2","author":"SM Ramteke","year":"2013","unstructured":"Ramteke, S.M., Hatkar, S.S.: A survey on security and accuracy in palmprint recognition. Int. J. Eng. Res. Technol. (IJERT) 2(1), 6 (2013)","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"key":"3_CR39","unstructured":"Rechenberg, I.: Evolutionsstrategies: Optimierung technischer Systeme nach Prinzipien der biologischen Evolution. Frommann-Holzboog Eds., Stutgart, Germany (1973)"},{"key":"3_CR40","unstructured":"Rechenberg, I.: Evolutionsstrategie \u201894. Frommann-Holzboog Ed., Stuttgart (1994)"},{"key":"3_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/cviu.2002.0978","volume":"87","author":"M Rodrigues","year":"2002","unstructured":"Rodrigues, M., Fisher, R., Liu, Y.: Special issue on registration and fusion of range images. Comput. Vis. Image Underst. 87, 1\u2013131 (2002)","journal-title":"Comput. Vis. Image Underst."},{"key":"3_CR42","unstructured":"Rusinkiewicz, S., Levoy, M.: Efficient variants of the ICP algorithm. In: IEEE Third International Conference on 3-D Digital Imaging and Modeling, p. 8 (2001)"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Santos-Sierra, A., Casanova, J.G., Avila, C.S., Vera, J.V.: Silhouette-based hand recognition on mobile devices. In: International Carnahan Conference on Security Technology, pp. 160\u2013166 (2009)","DOI":"10.1109\/CCST.2009.5335548"},{"issue":"10","key":"3_CR44","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1109\/34.879796","volume":"22","author":"SR Sanches-Reillo","year":"2000","unstructured":"Sanches-Reillo, S.R., Sanches-Avila, S.C., Gonzales-Marcos, A.: Biometric identification through hand geometry measurement. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1168\u20131171 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3_CR45","doi-asserted-by":"publisher","first-page":"10143","DOI":"10.3390\/s111110143","volume":"11","author":"A Santos-Sierra","year":"2011","unstructured":"Santos-Sierra, A., S\u00e1nchez-\u00c1vila, C., Pozo, G.B., Guerra-Casanova, J.: Unconstrained and contactless hand geometry biometrics. Sensors 11, 10143\u201310164 (2011)","journal-title":"Sensors"},{"key":"3_CR46","unstructured":"Stockman, G., Shapiro, L.: Computer Vision. Prentice Hall, Upper Saddle River (2001)"},{"key":"3_CR47","unstructured":"Travieso, C.M., Alonso, J.B., David, S., Ferrer, M.A.: Optimization of a biometric system identification by hand geometry. In: Complex Systems Intelligence and Modern Technological Applications, Cherbourg, France, pp. 581\u2013586 (2004)"},{"key":"3_CR48","unstructured":"Xiong, W., Xu, Ch., Ong, S.H.: Peg-free human shape analysis and recognition. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (2005)"},{"key":"3_CR49","doi-asserted-by":"publisher","unstructured":"Yan, X., Su, X.G.: Linear regression analysis: theory and computing. https:\/\/doi.org\/10.1142\/6986","DOI":"10.1142\/6986"},{"issue":"7","key":"3_CR50","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/TIP.2006.873439","volume":"15","author":"E Y\u00f6r\u00fck","year":"2009","unstructured":"Y\u00f6r\u00fck, E., Konukoglu, E., Sankur, B., Darbon, J.: 2006a shape based hand recognition. IEEE Trans. Image Process. 15(7), 1803\u20131815 (2009)","journal-title":"IEEE Trans. Image Process."},{"key":"3_CR51","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.imavis.2006.01.020","volume":"24","author":"E Y\u00f6r\u00fck","year":"2006","unstructured":"Y\u00f6r\u00fck, E., Dutagaci, H., Sankur, B.: Hand biometrics. Image Vis. Comput. 24, 483\u2013497 (2006)","journal-title":"Image Vis. Comput."},{"key":"3_CR52","unstructured":"Zayaraz, G., Vijayalakshmi, V., Jagadiswary, D.: Securing biometric authentication using DNA sequence and Naccache Stern Knapsack cryptosystem. In: IEEE 2009 International Conference on Control, Automation, Communication and Energy Conservation (2009)"},{"issue":"5","key":"3_CR53","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1109\/TEVC.2009.2014613","volume":"13","author":"J Zhang","year":"2009","unstructured":"Zhang, J., Sanderson, A.C.: JADE: adaptive differential evolution with optional external archive. IEEE Trans. Evol. Comput. 13(5), 945\u2013958 (2009)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Zhi-Peng, F., Yan-Ning, Z., Hai-Yan, H.: Survey of deep learning in face recognition. In: 2014 International Conference on Orange Technologies (2014)","DOI":"10.1109\/ICOT.2014.6954663"},{"key":"3_CR55","unstructured":"Web1. http:\/\/www.gpds.ulpgc.es\/. Accessed Mar 2020"},{"key":"3_CR56","unstructured":"Web2. https:\/\/en.wikipedia.org\/wiki\/Linear_regression. Accessed Mar 2020"},{"key":"3_CR57","unstructured":"Web3. https:\/\/us.allegion.com. Accessed Mar 2020"},{"key":"3_CR58","unstructured":"Web4. http:\/\/www.iso.org\/iso\/home\/store\/catalogue_tc\/catalogue_detail.htm?csnumber=43638. Accessed Mar 2020"},{"key":"3_CR59","unstructured":"Web5. http:\/\/www1.icsi.berkeley.edu\/~storn\/code.html. Accessed Mar 2020"},{"key":"3_CR60","unstructured":"Web6. https:\/\/en.wikipedia.org\/wiki\/Differential_evolution. Accessed Mar 2020"},{"key":"3_CR61","unstructured":"Web7. http:\/\/handwork.4fan.cz\/. Accessed Mar 2020"},{"key":"3_CR62","unstructured":"Web8. http:\/\/robomap.4fan.cz\/. Accessed Mar 2020"}],"container-title":["Advances in Intelligent Systems and Computing","Artificial Intelligence and Bioinspired Computational Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51971-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T14:25:23Z","timestamp":1723386323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51971-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030519704","9783030519711"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51971-1_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}