{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:55:26Z","timestamp":1742921726028,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029603"},{"type":"electronic","value":"9783319029610"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-02961-0_26","type":"book-chapter","created":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T22:56:02Z","timestamp":1383605762000},"page":"208-215","source":"Crossref","is-referenced-by-count":2,"title":["Latent Fingerprint Recognition: Challenges and Advances"],"prefix":"10.1007","author":[{"given":"Wei","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yunqi","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25948-0_1","volume-title":"Biometric Authentication","author":"D. Maio","year":"2004","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC 2004: Third fingerprint verification competition. In: ICBA 2004. LNCS, vol.\u00a03072, pp. 1\u20137. Springer, Heidelberg (2004)"},{"issue":"7","key":"26_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S0969-4765(07)70140-6","volume":"15","author":"R. Cappelli","year":"2007","unstructured":"Cappelli, R., Ferrara, M., Franco, A., et al.: Fingerprint verification competition 2006. Biometric Technology Today\u00a015(7), 7\u20139 (2007)","journal-title":"Biometric Technology Today"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1201\/9781420041347","volume-title":"Advances in fingerprint technology","author":"H.C. Lee","year":"2001","unstructured":"Lee, H.C., Gaensslen, R.E.: Advances in fingerprint technology, p. 106. CRC Press LLC, New York (2001)"},{"issue":"1","key":"26_CR4","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TPAMI.2010.59","volume":"31","author":"A.K. Jain","year":"2011","unstructured":"Jain, A.K., Feng, J.: Latent fingerprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a031(1), 88\u2013100 (2011)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Dvornychenko, V.N., Garris, M.D.: Summary of NIST Latent Fingerprint Testing Workshop. NISTIR 7377 (2006), \n                    \n                      http:\/\/fingerprint.nist.gov\/latent\/ir_7377.pdf","DOI":"10.6028\/NIST.IR.7377"},{"issue":"4","key":"26_CR6","first-page":"303","volume":"35","author":"J. Feng","year":"2013","unstructured":"Feng, J., Zhou, J., Jain, A.: Orientation field estimation for latent fingerprint enhancement. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a035(4), 303\u2013310 (2013)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Yoon, S., Feng, J., Jain, A.K.: Latent fingerprint enhancement via robust orientation field estimation. In: IEEE International Joint Conference on Biometrics (IJCB), pp. 1\u20138 (2011)","DOI":"10.1109\/IJCB.2011.6117482"},{"key":"26_CR8","unstructured":"Yoon, S., Feng, J., Jain, A. K.: On latent fingerprint enhancement, SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, (2010)."},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Choi, H., Boaventura, M., Boaventura, I.A.G., Jain, A.K.: Automatic segmentation of latent fingerprints. In: IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 303\u2013310 (2012)","DOI":"10.1109\/BTAS.2012.6374593"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, J., Lai, R., Kuo, C.C.J.: Latent fingerprint segmentation with adaptive total variation model. In: IEEE 5th IAPR International Conference on Biometrics (ICB), pp. 189\u2013195 (2012)","DOI":"10.1109\/ICB.2012.6199807"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, J., Lai, R., Kuo, C.C.J.: Latent fingerprint detection and segmentation with a directional total variation model. In: IEEE 19th IEEE International Conference on Image Processing (ICIP), pp. 1145\u20131148 (2012)","DOI":"10.1109\/ICIP.2012.6467067"},{"issue":"8","key":"26_CR12","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1109\/TPAMI.2003.1217604","volume":"25","author":"M. Tico","year":"2003","unstructured":"Tico, M., Kuosmanen, P.: Fingerprint matching using an orientation-based minutia descriptor. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a025(8), 1009\u20131014 (2003)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"26_CR13","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TPAMI.2007.250596","volume":"29","author":"A.K. Jain","year":"2007","unstructured":"Jain, A.K., Chen, Y., Demirkus, M.: Pores and ridges: High-resolution fingerprint matching using level 3 features. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a029(1), 15\u201327 (2007)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Y., Jain, A.K.: Dots and incipients: extended features for partial fingerprint matching. In: IEEE Biometrics Symposium, pp. 1\u20136 (2007)","DOI":"10.1109\/BCC.2007.4430538"},{"issue":"1","key":"26_CR15","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TIFS.2012.2223678","volume":"8","author":"A.A. Paulino","year":"2013","unstructured":"Paulino, A.A., Feng, J., Jain, A.K.: Latent Fingerprint Matching Using Descriptor-Based Hough Transform. IEEE Transactions on Information Forensics and Security\u00a08(1), 31\u201345 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Paulino, A.A., Jain, A.K., Feng, J.: Latent Fingerprint Matching: Fusion of Manually Marked and Derived Minutiae. In: 23rd SIBGRAPI Conference on Graphics, Patterns and Images (2010)","DOI":"10.1109\/SIBGRAPI.2010.17"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Paulino, A.A., Feng, J., Jain, A.K.: Latent fingerprint matching using descriptor-based hough transform. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1\u20137 (2011)","DOI":"10.1109\/IJCB.2011.6117483"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/978-3-642-01793-3_71","volume-title":"Advances in Biometrics","author":"J. Feng","year":"2009","unstructured":"Feng, J., Yoon, S., Jain, A.K.: Latent fingerprint matching: Fusion of rolled and plain fingerprints. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol.\u00a05558, pp. 695\u2013704. Springer, Heidelberg (2009)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Dvornychenko, V.N.: Evaluation of fusion methods for latent fingerprint matchers. In: IEEE 5th IAPR International Conference on Biometrics (ICB), pp. 182\u2013188 (2012)","DOI":"10.1109\/ICB.2012.6199806"},{"key":"26_CR20","unstructured":"Fingerprint Minutiae from Latent and Matching Tenprint Images, NIST Special Database 27 (2010), \n                    \n                      http:\/\/www.nist.gov\/srd\/nistsd27.htm"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02961-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T22:22:23Z","timestamp":1558304543000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02961-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319029603","9783319029610"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02961-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}