{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:13:00Z","timestamp":1748751180430,"version":"3.41.0"},"publisher-location":"Cham","reference-count":81,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_2","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T13:07:52Z","timestamp":1450271272000},"page":"11-20","source":"Crossref","is-referenced-by-count":4,"title":["Automated Border Control Systems: Biometric Challenges and Research Trends"],"prefix":"10.1007","author":[{"given":"Ruggero Donida","family":"Labati","sequence":"first","affiliation":[]},{"given":"Angelo","family":"Genovese","sequence":"additional","affiliation":[]},{"given":"Enrique","family":"Mu\u00f1oz","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Scotti","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Sforza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"2_CR1","unstructured":"TABULA RASA - trusted biometrics under spoofing attacks - EU FP7 project (2010). https:\/\/www.tabularasa-euproject.org\/"},{"key":"2_CR2","unstructured":"FastPass - a harmonized, modular reference system for all European automated border crossing points - EU FP7 project (2013). https:\/\/www.fastpass-project.eu"},{"key":"2_CR3","unstructured":"ABC4EU - automated border controls for europe - EU FP7 project (2014). http:\/\/abc4eu.com"},{"key":"2_CR4","unstructured":"Fiumicino is the first airport in Italy to automate border controls (2014). http:\/\/www.futuretravelexperience.com\/2014\/11\/romes-fiumicino-airport-trialling-automated-border-control-e-gates"},{"key":"2_CR5","volume-title":"Semantic Analysis and Understanding of Human Behavior in Video Streaming","author":"A Amato","year":"2012","unstructured":"Amato, A., Di Lecce, V., Piuri, V.: Semantic Analysis and Understanding of Human Behavior in Video Streaming. Springer, B\u00fccher (2012)"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10700-008-9034-1","volume":"7","author":"A Azzini","year":"2008","unstructured":"Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optim. Decis. Making 7(3), 215\u2013302 (2008). 1568\u20134539","journal-title":"Fuzzy Optim. Decis. Making"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: Proceedings of the 2010 ACM Workshop on Multimedia and Security, pp. 231\u2013240, New York, NY, USA, September 2010","DOI":"10.1145\/1854229.1854270"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Barni, M., Bianchi, T., Catalano, D., Raimondo, M.D., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: A privacy-compliant fingerprint recognition system based on homomorphic encryption and FingerCode templates. In: Proceedings of the 2010 IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp. 1\u20137, Washington, DC, USA, September 2010","DOI":"10.1109\/BTAS.2010.5634527"},{"key":"2_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5632-2","volume-title":"3D Surface Reconstruction: Multi-scale Hierarchical Approaches","author":"F Bellocchio","year":"2013","unstructured":"Bellocchio, F., Borghese, N.A., Ferrari, S., Piuri, V.: 3D Surface Reconstruction: Multi-scale Hierarchical Approaches. Springer, New York (2013)"},{"issue":"9","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.1109\/TNNLS.2012.2205018","volume":"23","author":"F Bellocchio","year":"2012","unstructured":"Bellocchio, F., Ferrari, S., Piuri, V., Borghese, N.A.: Hierarchical approach for multiscale support vector regression. IEEE Trans. Neural Netw. Learn. Syst. 23(9), 1448\u20131460 (2012)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Bianchi, T., Donida Labati, R., Piuri, V., Piva, A., Scotti, F., Turchi, S.: Implementing FingerCode-based identity matching in the encrypted domain. In: Proceedings of the 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), pp. 15\u201321, Taranto, Italy, September 2010","DOI":"10.1109\/BIOMS.2010.5610445"},{"key":"2_CR12","unstructured":"Boeing: current market outlook: 2014\u20132033 (2014). http:\/\/www.boeing.com"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Bonissi, A., Donida Labati, R., Perico, L., Sassi, R., Scotti, F., Sparagino, L.: A preliminary study on continuous authentication methods for photoplethysmographic biometrics. In: Proceedings of the 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), pp. 28\u201333, Napoli, Italy, September 2013","DOI":"10.1109\/BIOMS.2013.6656145"},{"key":"2_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4402-1","volume-title":"Handbook of Iris Recognition","author":"MJ Burge","year":"2013","unstructured":"Burge, M.J., Bowyer, K.: Handbook of Iris Recognition. Springer Science and Business Media, Heidelberg (2013)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sana, D., Sassi, R., Scotti, F.: Personal identification and verification using multimodal biometric data. In: Proceedings of the 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety (CIHSPS), pp. 41\u201345, Alexandria, VA, USA, October 2006","DOI":"10.1109\/CIHSPS.2006.313309"},{"key":"2_CR16","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy issues in biometric identification. In: Touch Briefings, pp. 40\u201342 (2006)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: A biometric verification system addressing privacy concerns. In: Proceedings of the 2007 International Conference on Computational Intelligence and Security (CIS), pp. 594\u2013598, Harbin, China, December 2007","DOI":"10.1109\/CIS.2007.117"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-aware biometrics: design and implementation of a multimodal verification system. In: Proceedings of the 2008 Annual Computer Security Applications Confernece (ACSAC), pp. 130\u2013139, Anaheim, CA, USA, December 2008","DOI":"10.1109\/ACSAC.2008.13"},{"key":"2_CR19","series-title":"Advances in Soft Computing","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-3-540-88181-0_29","volume-title":"Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS)","author":"S Cimato","year":"2009","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: A multi-biometric verification system for the privacy protection of iris templates. In: Corchado, E., Zunino, R., Gastaldo, P., Herrero, A. (eds.) Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS). Advances in Soft Computing, vol. 53, pp. 227\u2013234. Springer, Heidelberg (2009)"},{"key":"2_CR20","series-title":"Computational Intelligence","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1002\/9780470522356.ch25","volume-title":"Biometrics: Theory, Methods, and Applications","author":"S Cimato","year":"2009","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy in biometrics. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications. Computational Intelligence, pp. 633\u2013654. Wiley-IEEE Press, New York (2009)"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"98","DOI":"10.2174\/2213275910801020098","volume":"1","author":"S Cimato","year":"2008","unstructured":"Cimato, S., Sassi, R., Scotti, F.: Biometrics and privacy. Recent Pat. Comput. Sci. 1, 98\u2013109 (2008). 1874-4796","journal-title":"Recent Pat. Comput. Sci."},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Cuesta Cantarero, D., Perez Herrero, D.A., Martin Mendez, F.: A multi-modal biometric fusion implementation for ABC systems. In: Proceedings of the 2013 European Intelligence and Security Informatics Conference (EISIC), pp. 277\u2013280, Uppsala, Sweden, August 2013","DOI":"10.1109\/EISIC.2013.71"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Mu\u00f1oz, E., Piuri, V., Scotti, F., Sforza, G.: Advanced design of automated border control gates: biometric system techniques and research trends. In: Proceedings of the 2015 IEEE International Symposium on Systems Engineering (ISSE), Rome, Italy, September 2015","DOI":"10.1109\/SysEng.2015.7302791"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Mu\u00f1oz, E., Piuri, V., Scotti, F., Sforza, G.: Automatic classification of acquisition problems affecting fingerprint images in automated border controls. In: Proceedings of the 2015 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM 2015), Cape Town, South Africa, December 2015","DOI":"10.1109\/SSCI.2015.60"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Measurement of the principal singular point in contact and contactless fingerprint images by using computational intelligence techniques. In: Proceedings of the 2010 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA), pp. 18\u201323, Taranto, Italy, September 2010","DOI":"10.1109\/CIMSA.2010.5611769"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Fast 3-D fingertip reconstruction using a single two-view structured light acquisition. In: Proceedings of the 2011 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), pp. 1\u20138, Milan, Italy, September 2011. ISBN: 978-1-4577-0765-0","DOI":"10.1109\/BIOMS.2011.6053684"},{"key":"2_CR27","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-28457-1_8","volume-title":"Cross Disciplinary Biometric Systems","author":"RD Labati","year":"2012","unstructured":"Labati, R.D., Genovese, A., Piuri, V., Scotti, F.: Iris segmentation: state of the art and innovative methods. In: Liu, C., Mago, V.K. (eds.) Cross Disciplinary Biometric Systems. ISRL, vol. 37, pp. 151\u2013182. Springer, Heidelberg (2012)"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Quality measurement of unwrapped three-dimensional fingerprints: a neural networks approach. In: Proceedings of the 2012 IEEE-INNS International Joint Conference on Neural Networks (IJCNN), pp. 1123\u20131130, Brisbane, Australia, June 2012","DOI":"10.1109\/IJCNN.2012.6252519"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Two-view contactless fingerprint acquisition systems: a case study for clay artworks. In: Proceedings of the 2012 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), pp. 1\u20138, Salerno, Italy, September 2012","DOI":"10.1109\/BIOMS.2012.6345775"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Virtual environment for 3-D synthetic fingerprints. In: Proceedings of the 2012 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems (VECIMS), pp. 48\u201353, Tianjin, China, July 2012","DOI":"10.1109\/VECIMS.2012.6273188"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Weight estimation from frame sequences using computational intelligence techniques. In: Proceedings of the 2012 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA), pp. 29\u201334, Tianjin, China, July 2012","DOI":"10.1109\/CIMSA.2012.6269603"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Accurate 3D fingerprint virtual environment for biometric technology evaluations and experiment design. In: Proceedings of the 2013 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA), pp. 43\u201348, Milan, Italy, July 2013","DOI":"10.1109\/CIVEMSA.2013.6617393"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Contactless fingerprint recognition: a neural approach for perspective and rotation effects reduction. In: Proceedings of the IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), pp. 22\u201330, Singapore, April 2013","DOI":"10.1109\/CIBIM.2013.6607909"},{"issue":"3","key":"2_CR34","first-page":"325","volume":"15","author":"R Donida Labati","year":"2014","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Touchless fingerprint biometrics: a survey on 2D and 3D technologies. J. Internet Technol. 15(3), 325\u2013332 (2014)","journal-title":"J. Internet Technol."},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Toward unconstrained fingerprint recognition: a fully-touchless 3-D system based on two views on the move. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2015)","DOI":"10.1109\/TSMC.2015.2423252"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Piuri, V., Sassi, R., Sforza, G., Scotti, F.: Adaptive ECG biometric recognition: a study on re-enrollment methods for QRS signals. In: Proceedings of the IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), pp. 30\u201337, Orlando, FL, USA, December 2014","DOI":"10.1109\/CIBIM.2014.7015440"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Piuri, V., Scotti, F.: Neural-based iterative approach for iris detection in iris recognition systems. In: Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA), pp. 1\u20136, Ottawa, Canada, July 2009","DOI":"10.1109\/CISDA.2009.5356533"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Piuri, V., Scotti, F.: Neural-based quality measurement of fingerprint images in contactless biometric systems. In: Proceedings of the 2010 IEEE-INNS International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138, Barcelona, Spain, July 2010","DOI":"10.1109\/IJCNN.2010.5596694"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Donida Labati, R., Piuri, V., Scotti, F.: A neural-based minutiae pair identification method for touchless fingeprint images. In: Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), pp. 96\u2013102, Paris, France, April 2011","DOI":"10.1109\/CIBIM.2011.5949224"},{"key":"2_CR40","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-35755-8_1","volume-title":"E-Business and Telecommunications","author":"RD Labati","year":"2012","unstructured":"Labati, R.D., Piuri, V., Scotti, F.: Biometric privacy protection: guidelines and technologies. In: Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds.) ICETE 2011. CCIS, vol. 314, pp. 3\u201319. Springer, Heidelberg (2012)"},{"key":"2_CR41","series-title":"Security, Privacy and Trust","doi-asserted-by":"crossref","DOI":"10.1201\/b18789","volume-title":"Touchless Fingerprint Biometrics","author":"R Donida Labati","year":"2015","unstructured":"Donida Labati, R., Piuri, V., Scotti, F.: Touchless Fingerprint Biometrics. Security, Privacy and Trust. CRC Press, Hoboken (2015)"},{"issue":"2","key":"2_CR42","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.imavis.2009.05.004","volume":"28","author":"R Donida Labati","year":"2010","unstructured":"Donida Labati, R., Scotti, F.: Noisy iris segmentation with boundary regularization and reflections removal. Image Vis. Comput. Spec. Iss. Iris Images Segmentation 28(2), 270\u2013277 (2010)","journal-title":"Image Vis. Comput. Spec. Iss. Iris Images Segmentation"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"El-Abed, M., Giot, R., Hemery, B., Rosenberger, C.: A study of users\u2019 acceptance and satisfaction of biometric systems. In: Proceedings of the 2010 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 170\u2013178, San Jose, CA, USA, October 2010","DOI":"10.1109\/CCST.2010.5678678"},{"key":"2_CR44","unstructured":"European commission: proposal for a regulation of the european parliament and of the council establishing a registered traveller programme (2013). http:\/\/ec.europa.eu"},{"key":"2_CR45","unstructured":"European commission: proposal for a regulation of the european parliament and of the council establishing an entry\/exit system (EES) to register entry and exit data of third country nationals crossing the external borders of the member states of the European union (2013)"},{"key":"2_CR46","unstructured":"European parliament: regulation (EC) no. 767\/2008 of the European parliament and of the council of 9 July 2008 concerning the visa information system (VIS) and the exchange of data between member states on short-stay visas (2008)"},{"issue":"2","key":"2_CR47","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/TNN.2009.2036438","volume":"21","author":"S Ferrari","year":"2010","unstructured":"Ferrari, S., Bellocchio, F., Piuri, V., Alberto Borghese, A.: A hierarchical RBF online learning algorithm for real-time 3-D scanner. IEEE Trans. Neural Netw. 21(2), 275\u2013285 (2010)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"1","key":"2_CR48","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TNN.2006.886854","volume":"18","author":"S Ferrari","year":"2007","unstructured":"Ferrari, S., Ferrigno, G., Piuri, V., Alberto Borghese, N.: Reducing and filtering point clouds with enhanced vector quantization. IEEE Trans. Neural Netw. 18(1), 161\u2013177 (2007)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"4","key":"2_CR49","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1109\/TIM.2005.851471","volume":"54","author":"S Ferrari","year":"2005","unstructured":"Ferrari, S., Frosio, I., Piuri, V., Alberto Borghese, N.: Automatic multiscale meshing through HRBF networks. IEEE Trans. Instrum. Measur. 54(4), 1463\u20131470 (2005)","journal-title":"IEEE Trans. Instrum. Measur."},{"key":"2_CR50","unstructured":"Frontex agency: best practice operational guidelines for automated border control (ABC) systems. Technical report, European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union (2012). http:\/\/frontex.europa.eu"},{"key":"2_CR51","unstructured":"Frontex agency: best practice technical guidelines for automated border control (ABC) systems. Technical report, European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union (2012). http:\/\/frontex.europa.eu"},{"key":"2_CR52","doi-asserted-by":"crossref","unstructured":"Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Accuracy and performance of biometric systems. In: Proceedings of the 2004 IEEE Instrumentation and Measurement Technology Conference (IMTC), pp. 510\u2013515, Como, Italy, May 2004","DOI":"10.1109\/IMTC.2004.1351099"},{"issue":"4","key":"2_CR53","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/TIM.2005.851087","volume":"54","author":"M Gamassi","year":"2005","unstructured":"Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Quality assessment of biometric systems: a comprehensive perspective based on accuracy and performance measurement. IEEE Trans. Instrum. Measur. 54(4), 1489\u20131496 (2005)","journal-title":"IEEE Trans. Instrum. Measur."},{"key":"2_CR54","doi-asserted-by":"crossref","unstructured":"Gamassi, M., Piuri, V., Sana, D., Scotti, F.: A high-level optimum design methodology for multimodal biometric systems. In: Proceedings of the 2004 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety (CHISPS), pp. 117\u2013124, Venice, Italy, July 2004","DOI":"10.1109\/CIHSPS.2004.1360221"},{"key":"2_CR55","unstructured":"Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proceedings of the Workshop RoboCare, CNR, Rome, Italy, May 2005"},{"issue":"2","key":"2_CR56","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MIM.2006.1634984","volume":"9","author":"M Gamassi","year":"2006","unstructured":"Gamassi, M., Piuri, V., Sana, D., Scotti, F., Scotti, O.: Scalable distributed biometric systems - advanced techniques for security and safety. IEEE Instrum. Measur. Mag. 9(2), 21\u201328 (2006)","journal-title":"IEEE Instrum. Measur. Mag."},{"key":"2_CR57","doi-asserted-by":"crossref","unstructured":"Gamassi, M., Piuri, V., Sana, D., Scotti, O., Scotti, F.: A multi-modal multi-paradigm agent-based approach to design scalable distributed biometric systems. In: Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety (CIHSPS), pp. 65\u201370, Orlando, FL, USA, April 2005","DOI":"10.1109\/CIHSPS.2005.1500613"},{"key":"2_CR58","doi-asserted-by":"crossref","unstructured":"Gamassi, M., Piuri, V., Scotti, F.: Fingerprint local analysis for high-performance minutiae extraction. In: Proceedings of the 2005 IEEE International Conference on Image Processing (ICIP), vol. 3, pp. 265\u2013268, Genoa, Italy, September 2005","DOI":"10.1109\/ICIP.2005.1530379"},{"key":"2_CR59","series-title":"Advances in Information Security","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-10365-5","volume-title":"Touchless Palmprint Recognition Systems","author":"A Genovese","year":"2014","unstructured":"Genovese, A., Piuri, V., Scotti, F.: Touchless Palmprint Recognition Systems. Advances in Information Security, vol. 60. Springer, Switzerland (2014)"},{"key":"2_CR60","doi-asserted-by":"crossref","unstructured":"Gorodnichy, D., Yanushkevich, S., Shmerko, V.: Automated border control: problem formalization. In: Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), pp. 118\u2013125, Orlando, FL, USA, December 2014","DOI":"10.1109\/CIBIM.2014.7015452"},{"key":"2_CR61","unstructured":"International civil aviation organization: Doc 9303, machine readable travel documents. Part 1, vol. 2 (2006). http:\/\/www.icao.int\/publications\/pages\/publication.aspx?docnum=9303"},{"key":"2_CR62","unstructured":"International organization for standardization (ISO: ISO\/IEC 24722:2007, Information technology - Biometrics - Multimodal and other multibiometric fusion (2007)"},{"key":"2_CR63","unstructured":"International Organization for Standardization (ISO): ISO\/IEC 19794\u20134:2011, Information technology - Biometric data interchange formats - Part 4: finger image data (2011)"},{"key":"2_CR64","unstructured":"International organization for standardization (ISO): ISO\/IEC 19794\u20135:2011, Information technology - Biometric data interchange formats - Part 5: face image data (2011)"},{"key":"2_CR65","unstructured":"International organization for standardization (ISO): ISO\/IEC 19794\u20136:2011, Information technology - Biometric data interchange formats - Part 6: Iris image data (2011)"},{"issue":"1","key":"2_CR66","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/962081.962102","volume":"47","author":"AK Jain","year":"2004","unstructured":"Jain, A.K., Ross, A.: Multibiometric systems. Commun. ACM 47(1), 34\u201340 (2004)","journal-title":"Commun. ACM"},{"key":"2_CR67","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2009","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, 2nd edn. Springer, London (2009)","edition":"2"},{"issue":"2","key":"2_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2617756","volume":"47","author":"E Marasco","year":"2014","unstructured":"Marasco, E., Ross, A.: A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. 47(2), 1\u201336 (2014)","journal-title":"ACM Comput. Surv."},{"key":"2_CR69","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8","volume-title":"Handbook of Biometric Anti-spoofing: Trusted Biometrics Under Spoofing Attacks","author":"S Marcel","year":"2014","unstructured":"Marcel, S., Nixon, M.S., Li, S.Z.: Handbook of Biometric Anti-spoofing: Trusted Biometrics Under Spoofing Attacks. Advances in Computer Vision and Pattern Recognition. Springer, London (2014)"},{"issue":"11","key":"2_CR70","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1109\/JPROC.2006.884091","volume":"94","author":"JR Matey","year":"2006","unstructured":"Matey, J.R., Naroditsky, O., Hanna, K., Kolczynski, R., LoIacono, D.J., Mangru, S., Tinker, M., Zappia, T.M., Zhao, W.Y.: Iris on the move: acquisition of images for iris recognition in less constrained environments. Proc. IEEE 94(11), 1936\u20131947 (2006)","journal-title":"Proc. IEEE"},{"key":"2_CR71","doi-asserted-by":"crossref","unstructured":"Palmer, A.J., Hurrey, C.: Ten reasons why IRIS needed 20:20 foresight: some lessons for introducing biometric border control systems. In: Proceedings of the 2012 European Intelligence and Security Informatics Conference (EISIC), pp. 311\u2013316, Odense, Denmark (2012)","DOI":"10.1109\/EISIC.2012.31"},{"key":"2_CR72","doi-asserted-by":"crossref","unstructured":"Piuri, V., Scotti, F.: Fingerprint biometrics via low-cost sensors and webcams. In: Proceedings of the 2008 IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20136, Washington, DC, USA, September 2008","DOI":"10.1109\/BTAS.2008.4699379"},{"key":"2_CR73","doi-asserted-by":"crossref","unstructured":"Reid, D., Samangooei, S., Chen, C., Nixon, M.S., Ross, A.: Soft biometrics for surveillance: an overview. In: Machine Learning: Theory and Applications, vol. 31, pp. 327\u2013352. Elsevier (2013)","DOI":"10.1016\/B978-0-444-53859-8.00013-8"},{"key":"2_CR74","series-title":"International Series on Biometrics","volume-title":"Handbook of Multibiometrics","author":"A Ross","year":"2006","unstructured":"Ross, A., Nandakumar, K., Jain, A.: Handbook of Multibiometrics. International Series on Biometrics, vol. 6. Springer, USA (2006)"},{"key":"2_CR75","doi-asserted-by":"crossref","unstructured":"Scotti, F.: Computational intelligence techniques for reflections identification in iris biometric images. In: Proceedings of the 2007 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA), pp. 84\u201388, Ostuni, Italy, June 2007","DOI":"10.1109\/CIMSA.2007.4362544"},{"issue":"7","key":"2_CR76","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TIM.2009.2030866","volume":"59","author":"F Scotti","year":"2010","unstructured":"Scotti, F., Piuri, V.: Adaptive reflection detection and location in iris biometric images by using computational intelligence techniques. IEEE Trans. Instrum. Measur. 59(7), 1825\u20131833 (2010)","journal-title":"IEEE Trans. Instrum. Measur."},{"key":"2_CR77","doi-asserted-by":"crossref","unstructured":"Snelick, R., Indovina, M., Yen, J., Mink, A.: Multimodal biometrics: issues in design and testing. In: Proceedings of the ACM International Conference on Multimodal Interfaces (ICMI), pp. 68\u201372, Vancouver BC, Canada, November 2003","DOI":"10.1145\/958432.958447"},{"key":"2_CR78","unstructured":"Spreeuwers, L.J., Hendrikse, A.J., Gerritsen, K.J.: Evaluation of automatic face recognition for automatic border control on actual data recorded of travellers at Schiphol airport. In: Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20136, Darmstadt, Germany, September 2012"},{"key":"2_CR79","unstructured":"Unisys: entry-exit feasibility study - final report. Technical report, European Commission (2008). http:\/\/www.europarl.europa.eu"},{"key":"2_CR80","unstructured":"Wei, H., Chen, L., Ferryman, J.: Biometrics in ABC: counter-spoofing research. In: Proceedings of the Frontex Global Conference on Future Developments of Automated Border Control (ABC), Warsaw, Poland (2013)"},{"key":"2_CR81","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7400-5","volume-title":"3D Biometrics: Systems and Applications","author":"D Zhang","year":"2013","unstructured":"Zhang, D., Lu, G.: 3D Biometrics: Systems and Applications. Springer Publishing Company, Incorporated, New York (2013)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T20:20:29Z","timestamp":1748722829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":81,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}