{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:50:24Z","timestamp":1743101424545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319168852"},{"type":"electronic","value":"9783319168869"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16886-9_28","type":"book-chapter","created":{"date-parts":[[2015,4,20]],"date-time":"2015-04-20T11:51:57Z","timestamp":1429530717000},"page":"269-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Evaluation of Fingerprint Biometrics Systems for e-Business Access Control"],"prefix":"10.1007","author":[{"given":"O. A.","family":"Esan","sequence":"first","affiliation":[]},{"given":"I. O.","family":"Osunmakinde","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Ngwira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,21]]},"reference":[{"key":"28_CR1","first-page":"825","volume":"E84-D","author":"A Senior","year":"2001","unstructured":"Senior, A., Bole, R.: Improved fingerprint matching by distortion removal. IEICE trans. Inf. Sys. E84-D, 825\u2013831 (2001)","journal-title":"IEICE trans. Inf. Sys."},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Esan, O.A., Ngwira, S.M., Osunmakinde, I.O.: Bimodal biometrics for financial infrastructure security. In: Information Security for South Africa (ISSA), South Africa (2013)","DOI":"10.1109\/ISSA.2013.6641045"},{"key":"28_CR3","unstructured":"Bazen, A.M., Verwaaijen, G.T.B., Gerez, S.H., Veelenturf, L.P.J., van der Zwaag, B.J.: A correlation-based fingerprint verification system. In: proRISC 2000 Workshop on Circuits, System and Sigbal Processing (2000)"},{"key":"28_CR4","unstructured":"Team, V.B.R., Service U.S.S.: A Study of Data Breach Investigation Record in Financial Institutions (2010)"},{"issue":"4","key":"28_CR5","first-page":"355","volume":"8","author":"A El-Sisi","year":"2011","unstructured":"El-Sisi, A.: Design and implementation biometric access control system using fingerprint for restricted area based on Gabor filter. Int. Arab J. Inf. Technol. 8(4), 355--363 (2011)","journal-title":"Int. Arab J. Inf. Technol."},{"key":"28_CR6","unstructured":"Jiang, X., Yau, W.Y.: Fingerprint matching based on local and global structure. In: Proceedings of the 15th International Conference on Pattern Recognition, Barcelona, IEEE (2000)"},{"key":"28_CR7","unstructured":"Fons, M., Fons, F., Canto, E.: Design of an embedded Fingerprint Matcher System (2006)"},{"key":"28_CR8","unstructured":"Gebroyohanne, T., Kim, D.Y.: Adaptive Noise Reduction Scheme for Salt and Pepper, Computer Engineering, Ajou University, Suwon, South Korea (2008)"},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L Hong","year":"1998","unstructured":"Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement: algorithm and performance evaluation. IEEE Trans. Pattern Anal. Mach. Intell. 20, 777\u2013789 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"28_CR10","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1016\/S0167-8655(03)00005-9","volume":"24","author":"J Yang","year":"2003","unstructured":"Yang, J., et al.: Modified Gabor filter designed method for fingerprint image enchacement. Pattern Recogn. Lett.\n24(12), 1805--1817 (2003). Elsevier","journal-title":"Pattern Recogn. Lett."},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/11527923_32","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"U Uludag","year":"2005","unstructured":"Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310\u2013319. Springer, Heidelberg (2005)"},{"key":"28_CR12","unstructured":"Xi, K., Hu, J.: Biometric Mobile Template Protection: A Composite Feature -based Fingerprint Fuzzy Vault, School of Computer Science and IT, RMIT University (2003)"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1016\/j.aeue.2009.07.012","volume":"64","author":"AS Awad","year":"2010","unstructured":"Awad, A.S., Man, H.: Similar neighbour criterion for impulse noise removal in images. Int. J. Electron. Commun. 64, 904\u2013915 (2010)","journal-title":"Int. J. Electron. Commun."},{"key":"28_CR14","unstructured":"Ko, T.: Multimodal biometric identification for large user population using fingerprint, face and iris recognition. In: Proceedings of the 34th Applied Imagery and Pattern Recognition Workshop (AIPR 2005), pp. 144\u2013152 (2005)"},{"key":"28_CR15","first-page":"731","volume":"44","author":"MA El-Iskandarani","year":"2005","unstructured":"El-Iskandarani, M.A., Abdul-Kader, H.M.: Biometric authentication system Using fingerprints based on Self-Organizing Map Neural Network Classifier. Alexandra Engineering Journal 44, 731\u2013743 (2005)","journal-title":"Alexandra Engineering Journal"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16886-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T10:35:25Z","timestamp":1675852525000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16886-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319168852","9783319168869"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16886-9_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}