{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T09:03:19Z","timestamp":1725872599277},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319483078"},{"type":"electronic","value":"9783319483085"}],"license":[{"start":{"date-parts":[[2016,10,18]],"date-time":"2016-10-18T00:00:00Z","timestamp":1476748800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-48308-5_68","type":"book-chapter","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T21:54:37Z","timestamp":1480456477000},"page":"714-722","source":"Crossref","is-referenced-by-count":1,"title":["Fingerprint Identification Using Hierarchical Matching and Topological Structures"],"prefix":"10.1007","author":[{"given":"M.","family":"Elmouhtadi","sequence":"first","affiliation":[]},{"given":"S.","family":"El fkihi","sequence":"additional","affiliation":[]},{"given":"D.","family":"Aboutajdine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,18]]},"reference":[{"issue":"4","key":"68_CR1","first-page":"55","volume":"1","author":"DA Kumar","year":"2013","unstructured":"Kumar, D.A., Begum, T.U.S.: A comparative study on fingerprint matching algorithms for EVM. J. Comput. Sci. Appl. 1(4), 55\u201360 (2013)","journal-title":"J. Comput. Sci. Appl."},{"key":"68_CR2","volume-title":"Handbook for Image and Video Processing","author":"A Jain","year":"2000","unstructured":"Jain, A., Pankanti, S.: Fingerprint classification and matching. In: Bovik, A. (ed.) Handbook for Image and Video Processing. Academic Press, London (2000)"},{"key":"68_CR3","unstructured":"de Boer, J., Bazen, A.M., Gerez, S.H.: Indexing fingerprint databases based on multiple features (2001)"},{"key":"68_CR4","doi-asserted-by":"publisher","unstructured":"Zaeri, N.: Minutiae-based fingerprint extraction and recognition, biometrics. In: Yang, J. (ed.) InTech (2011). DOI: 10.5772\/17527 . http:\/\/www.intechopen.com\/books\/biometrics\/minutiae-based-fingerprint-extraction-and-recognition","DOI":"10.5772\/17527"},{"issue":"7","key":"68_CR5","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TPAMI.2002.1017618","volume":"24","author":"AM Bazen","year":"2002","unstructured":"Bazen, A.M., Gerez, S.H.: Systematic methods for the computation of the directional fields and singular points of fingerprints. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 905\u2013919 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"7","key":"68_CR6","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/TPAMI.2008.188","volume":"31","author":"J Zhou","year":"2009","unstructured":"Zhou, J., Chen, F., Gu, J.: A novel algorithm for detecting singular points from fingerprint images. IEEE Trans. Pattern Anal. Mach. Intell. 31(7), 1239\u20131250 (2009)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"6","key":"68_CR7","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1016\/j.patcog.2006.11.007","volume":"40","author":"M Liu","year":"2007","unstructured":"Liu, M., Jiang, X., Chichung Kot, A.: Efficient fingerprint search based on database clustering. Pattern Recogn. 40(6), 1793\u20131803 (2007)","journal-title":"Pattern Recogn."},{"issue":"8","key":"68_CR8","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1109\/34.531800","volume":"18","author":"NK Ratha","year":"1996","unstructured":"Ratha, N.K., Karu, K., Chen, S., Jain, A.K.: A real-time matching system for large fingerprint databases. IEEE Trans. Pattern Anal. Mach. Intell. 18(8), 799\u2013813 (1996)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"68_CR9","unstructured":"U. S. F. B. of Investigation, The science of fingerprints: classification and uses. United States Dept. of Justice, Federal Bureau of Investigation (1979)"},{"issue":"1","key":"68_CR10","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1117\/1.1631315","volume":"13","author":"M Sezgin","year":"2004","unstructured":"Sezgin, M., Sankur, B.: Survey over image thresholding techniques and quantitative performance evaluation. J. Electr. Imaging 13(1), 146\u2013165 (2004)","journal-title":"J. Electr. Imaging"},{"key":"68_CR11","volume-title":"Algorithms for Image Processing and Computer Vision, ser. IT Pro","author":"J Parker","year":"2010","unstructured":"Parker, J.: Algorithms for Image Processing and Computer Vision, ser. IT Pro. Wiley, Indianapolis (2010)"},{"issue":"5","key":"68_CR12","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1016\/j.eswa.2012.09.018","volume":"40","author":"A Munoz-Briseno","year":"2013","unstructured":"Munoz-Briseno, A., Alonso, G., Palancar, J.H.: Fingerprint indexing with bad quality areas. Expert Syst. Appl. 40(5), 1839\u20131846 (2013)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"68_CR13","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1134\/S1054661806040092","volume":"16","author":"AE Hassanien","year":"2006","unstructured":"Hassanien, A.E.: Hiding iris data for authentication of digital images using wavelet theory. Int. J. Pattern Recogn. Image Anal. 16(4), 637\u2013643 (2006)","journal-title":"Int. J. Pattern Recogn. Image Anal."},{"issue":"3","key":"68_CR14","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/34.990140","volume":"24","author":"D Maio","year":"2002","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: fingerprint verification competition. IEEE Trans. Pattern Anal. Mach. Intell. 24(3), 402\u2013412 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"68_CR15","doi-asserted-by":"crossref","first-page":"187","DOI":"10.15388\/Informatica.2006.132","volume":"17","author":"AE Hassanien","year":"2006","unstructured":"Hassanien, A.E.: A copyright protection using watermarking algorithm. Informatica 17(2), 187\u2013198 (2006)","journal-title":"Informatica"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48308-5_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T16:05:53Z","timestamp":1601222753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48308-5_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,18]]},"ISBN":["9783319483078","9783319483085"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48308-5_68","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,10,18]]}}}