{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:37:33Z","timestamp":1742999853084,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319744995"},{"type":"electronic","value":"9783319745008"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74500-8_60","type":"book-chapter","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T00:20:32Z","timestamp":1521505232000},"page":"652-663","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Iris Recognition Algorithm Analysis and Implementation"],"prefix":"10.1007","author":[{"given":"Siham","family":"Kichou","sequence":"first","affiliation":[]},{"given":"Abdessalam Ait","family":"Madi","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Erguig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"60_CR1","unstructured":"Chinese academy of sciences \u2013 institute of automation. Database of greyscale eye images. \nhttp:\/\/www.cbsr.ia.ac.cn\/irisdatabase.htm"},{"key":"60_CR2","unstructured":"Kolodgy, C.: Authentication is something you have, something you know, and something you are when you add biometrics. idc, framingham, ma. Infoworld (2001)"},{"key":"60_CR3","first-page":"101","volume":"9","author":"SP Narote","year":"2009","unstructured":"Narote, S.P., Narote, A.S., Waghmare, L.M.: Iris based recognition system using wavelet transform. Int. J. comput. Sci. Netw. Secur. 9, 101\u2013102 (2009)","journal-title":"Int. J. comput. Sci. Netw. Secur."},{"key":"60_CR4","doi-asserted-by":"crossref","unstructured":"Proenca, H., Alexandre, L.A.: Iris recognition: measuring feature\u2019s quality for the feature selectio in unconstrained image capture environments. In: Proceedings of 2006 International Conference on Computational Intelligence for Homeland Security and Personal Safety, vol. 1, pp. 35\u201340 (2006)","DOI":"10.1109\/CIHSPS.2006.313298"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Proenca, H., Alexandre, L.A.: Iris recognition: an analysis of the aliasing problem in the iris normalization stage. In: Proceedings of 2006 International Conference on Computational Intelligence and Security, vol. 2, pp. 1771\u20131774 (2006)","DOI":"10.1109\/ICCIAS.2006.295366"},{"key":"60_CR6","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J Daugman","year":"1993","unstructured":"Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE. Tans. Pattern Anal. Mach. Intell. 15, 1148\u20131161 (1993)","journal-title":"IEEE. Tans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"60_CR7","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circuits. Syst. Video Technol. 14(1), 21\u201330 (2004)","journal-title":"IEEE Trans. Circuits. Syst. Video Technol."},{"issue":"5","key":"60_CR8","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/TSMCB.2007.903540","volume":"37","author":"J Daugman","year":"2007","unstructured":"Daugman, J.: New methods in iris recognition. IEEE Trans. Syst. Man Cybern. 37(5), 1167\u20131175 (2007)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"60_CR9","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/S0031-3203(02)00030-4","volume":"36","author":"J Daugman","year":"2003","unstructured":"Daugman, J.: The importance of being random: statistical principles of iris recognition. Pattern Recogn. 36, 279\u2013291 (2003)","journal-title":"Pattern Recogn."},{"key":"60_CR10","unstructured":"Masek, L.: Recognition of human iris patterns for biometric identification. M.S. Thesis, University of Western Australia (2003)"},{"key":"60_CR11","unstructured":"Kovesi, P.: Matlab functions for computer vision and image analysis. \nhttp:\/\/www.cs.uwa.edu.au\/~pk\/research\/matlabfns\/index.html"},{"key":"60_CR12","unstructured":"Masek, L., Kovesi, P.: Matlab source code for a biometric identification system based on iris patterns. The School of Computer Science and software Engineering, The University of Western Australia (2003)"},{"key":"60_CR13","unstructured":"Daugman, J.: Biometric personal identification system based on iris analysis. US patent, patent number: 5,291,560 (1994)"},{"key":"60_CR14","unstructured":"Chinese academy of sciences \u2013 institute of automation. Database of 756 greyscale eye images. \nhttp:\/\/www.sinobiometrics.com\n\n version 1.0 (2003)"}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Smart Cities and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74500-8_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T16:06:10Z","timestamp":1521561970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74500-8_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319744995","9783319745008"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74500-8_60","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2018]]}}}