{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:34:37Z","timestamp":1743125677993,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319009681"},{"type":"electronic","value":"9783319009698"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-00969-8_23","type":"book-chapter","created":{"date-parts":[[2013,5,23]],"date-time":"2013-05-23T02:14:36Z","timestamp":1369275276000},"page":"237-246","source":"Crossref","is-referenced-by-count":3,"title":["Performance Benchmarking of Different Binarization Techniques for Fingerprint-Based Biometric Authentication"],"prefix":"10.1007","author":[{"given":"Soharab Hossain","family":"Shaikh","sequence":"first","affiliation":[]},{"given":"Khalid","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"23_CR1","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s00138-011-0402-4","volume":"24","author":"H.S. Shaikh","year":"2013","unstructured":"Shaikh, H.S., Maiti, K.A., Chaki, N.: A new image binarization method using iterative partitioning. Springer Journal on Machine Vision and Applications(MVAP)\u00a024(2), 337\u2013350 (2013)","journal-title":"Springer Journal on Machine Vision and Applications(MVAP)"},{"issue":"1","key":"23_CR2","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1117\/1.1631315","volume":"13","author":"M. Sezgin","year":"2004","unstructured":"Sezgin, M., Sankur, B.: Survey over image thresholding techniques and quantitative performance evaluation. J. Electr. Imaging\u00a013(1), 146\u2013165 (2004)","journal-title":"J. Electr. Imaging"},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N. Otsu","year":"1979","unstructured":"Otsu, N.: A threshold selection method from gray-level histogram. IEEE Transaction on Systems Man Cybernetics\u00a09, 62\u201366 (1979)","journal-title":"IEEE Transaction on Systems Man Cybernetics"},{"issue":"3","key":"23_CR4","first-page":"273","volume":"29","author":"N.J. Kapur","year":"1985","unstructured":"Kapur, N.J., Sahoo, K.P., Wong, C.K.A.: A new method for gray-level picture thresholding using the entropy of the histogram. CVGIP\u00a029(3), 273\u2013285 (1985)","journal-title":"CVGIP"},{"key":"23_CR5","unstructured":"Bernsen, J.: Dynamic thresholding of gray level images. In: Proceedings of the International Conference on Pattern Recognition (ICPR), pp. 1251\u20131255 (1986)"},{"key":"23_CR6","first-page":"115","volume-title":"An Introduction to Digital Image Processing","author":"W. Niblack","year":"1986","unstructured":"Niblack, W.: An Introduction to Digital Image Processing, pp. 115\u2013116. Prentice Hall, Eaglewood Cliffs (1986)"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/S0031-3203(99)00055-2","volume":"33","author":"J. Sauvola","year":"2000","unstructured":"Sauvola, J., Pietikainen, M.: Adaptive document image binarization. Pattern Recognition\u00a033(2), 225\u2013236 (2000)","journal-title":"Pattern Recognition"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-642-21219-2_51","volume-title":"Hybrid Artificial Intelligent Systems","author":"M. Walu\u015b","year":"2011","unstructured":"Walu\u015b, M., Kosmala, J., Saeed, K.: Finger Vein Pattern Extraction Algorithm. In: Corchado, E., Kurzy\u0144ski, M., Wo\u017aniak, M. (eds.) HAIS 2011, Part I. LNCS, vol.\u00a06678, pp. 404\u2013411. Springer, Heidelberg (2011)"},{"key":"23_CR9","unstructured":"Kaggwa, F.: Evaluation of Multiple Enrollment for Fingerprint Recognition, M.Sc. Thesis, University of Twente (2011)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Maltoni, D., Maio, D., Jain, K.A., Prabhakar, S.: Springer professional computing. In: Handbook of Fingerprint Recognition. Springer (2009)","DOI":"10.1007\/978-1-84882-254-2"},{"key":"23_CR11","unstructured":"Zhili, W.: Fingerprint Recognition, Thesis for BS in Computer Science, Hong Kong Baptist University (2002)"},{"key":"23_CR12","unstructured":"Jain, C.L., Halici, U., Hayashi, I., Lee, B.S., Tsutsui, S.: Intelligent biometric techniques in fingerprint and face recognition. CRC Press (1999)"},{"issue":"8","key":"23_CR13","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L. Hong","year":"1998","unstructured":"Hong, L., Wan, Y., Jain, K.A.: Fingerprint Image Enhancement: Algorithms and Performance Evaluation. IEEE Transactions on PAMI\u00a020(8), 777\u2013789 (1998)","journal-title":"IEEE Transactions on PAMI"},{"issue":"9","key":"23_CR14","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1109\/5.628674","volume":"85","author":"K.A. Jain","year":"1997","unstructured":"Jain, K.A., Hong, L., Pankanti, S., Bolle, R.: An identity authentication system using fingerprints. Proceedings of the IEEE\u00a085(9), 1365\u20131388 (1997)","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"23_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/34.566808","volume":"19","author":"D. Maio","year":"1997","unstructured":"Maio, D., Maltoni, D.: Direct Gray-scale Minutiae Detection in Fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a019(1), 27\u201340 (1997)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"23_CR16","unstructured":"Hong, L.: Automatic Personal Identification Using Fingerprints, Ph.D. Thesis (1998)"},{"key":"23_CR17","unstructured":"FVC2000: Fingerprint Verification Competition, \n                      http:\/\/www.csr.unibo.it\/research\/biolab\n                     (accessed in January 2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-00969-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T08:51:47Z","timestamp":1710838307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-00969-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319009681","9783319009698"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-00969-8_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}