{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:07:34Z","timestamp":1751688454894,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319907741"},{"type":"electronic","value":"9783319907758"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-90775-8_11","type":"book-chapter","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T08:43:57Z","timestamp":1525769037000},"page":"127-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Robust Contactless Fingerprint Enhancement Algorithm"],"prefix":"10.1007","author":[{"given":"Xuefei","family":"Yin","sequence":"first","affiliation":[]},{"given":"Yanming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"11_CR1","unstructured":"Verifinger SDK. http:\/\/www.neurotechnology.com\/verifinger.html"},{"issue":"7","key":"11_CR2","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TPAMI.2002.1017618","volume":"24","author":"AM Bazen","year":"2002","unstructured":"Bazen, A.M., Gerez, S.H.: Systematic methods for the computation of the directional fields and singular points of fingerprints. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 905\u2013919 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"11_CR3","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/TPAMI.2010.52","volume":"32","author":"R Cappelli","year":"2010","unstructured":"Cappelli, R., Ferrara, M., Maltoni, D.: Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32(12), 2128\u20132141 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.patcog.2006.05.036","volume":"40","author":"S Chikkerur","year":"2007","unstructured":"Chikkerur, S., Cartwright, A.N., Govindaraju, V.: Fingerprint enhancement using STFT analysis. Pattern Recogn. 40(1), 198\u2013211 (2007)","journal-title":"Pattern Recogn."},{"issue":"5","key":"11_CR5","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/S0031-3203(98)00107-1","volume":"32","author":"A Farina","year":"1999","unstructured":"Farina, A., Kovacs-Vajna, Z.M., Leone, A.: Fingerprint minutiae extraction from skeletonized binary images. Pattern Recogn. 32(5), 877\u2013889 (1999)","journal-title":"Pattern Recogn."},{"issue":"6","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1109\/TPAMI.2012.213","volume":"35","author":"K He","year":"2013","unstructured":"He, K., Sun, J., Tang, X.: Guided image filtering. IEEE Trans. Pattern Anal. Mach. Intell. 35(6), 1397\u20131409 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"8","key":"11_CR7","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L Hong","year":"1998","unstructured":"Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement: algorithm and performance evaluation. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 777\u2013789 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.eswa.2016.01.050","volume":"54","author":"D Kim","year":"2016","unstructured":"Kim, D., Jung, Y., Toh, K.A., Son, B., Kim, J.: An empirical study on iris recognition in a mobile phone. Expert Syst. Appl. 54, 328\u2013339 (2016)","journal-title":"Expert Syst. Appl."},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25948-0_1","volume-title":"Biometric Authentication","author":"D Maio","year":"2004","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2004: third fingerprint verification competition. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 1\u20137. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25948-0_1"},{"issue":"7","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1016\/j.jvcir.2012.07.004","volume":"23","author":"GKO Michael","year":"2012","unstructured":"Michael, G.K.O., Connie, T., Teoh, A.B.J.: A contactless biometric system using multiple hand features. J. Vis. Commun. Image Represent. 23(7), 1068\u20131084 (2012)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"12","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1016\/j.patrec.2010.05.021","volume":"31","author":"GKO Michael","year":"2010","unstructured":"Michael, G.K.O., Connie, T., Teoh Beng Jin, A.: An innovative contactless palm print and knuckle print recognition system. Pattern Recogn. Lett. 31(12), 1708\u20131719 (2010)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/0031-3203(89)90035-6","volume":"22","author":"JV Nickerson","year":"1989","unstructured":"Nickerson, J.V., O\u2019Gorman, L.: An approach to fingerprint filter design. Pattern Recogn. 22(1), 29\u201338 (1989)","journal-title":"Pattern Recogn."},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.neucom.2015.11.137","volume":"261","author":"BS Oh","year":"2017","unstructured":"Oh, B.S., Oh, K., Teoh, A.B.J., Lin, Z., Toh, K.A.: A gabor-based network for heterogeneous face recognition. Neurocomputing 261, 253\u2013265 (2017)","journal-title":"Neurocomputing"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TSMCB.2012.2208744","volume":"43","author":"JB Shen","year":"2013","unstructured":"Shen, J.B., Yang, X.S., Li, X.L., Jia, Y.D.: Intrinsic image decomposition using optimization and user scribbles. IEEE Trans. Cybern. 43(2), 425\u2013436 (2013)","journal-title":"IEEE Trans. Cybern."},{"issue":"2","key":"11_CR15","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/ip-vis:19949924","volume":"141","author":"BG Sherlock","year":"1994","unstructured":"Sherlock, B.G., Monro, D.M., Millard, K.: Fingerprint enhancement by directional Fourier filtering. IEE Proc. - Vis. Image Sig. Process. 141(2), 87\u201394 (1994)","journal-title":"IEE Proc. - Vis. Image Sig. Process."},{"issue":"4","key":"11_CR16","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/TPAMI.2007.1003","volume":"29","author":"Y Wang","year":"2007","unstructured":"Wang, Y., Hu, J., Phillips, D.: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 573\u2013585 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"11_CR17","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1016\/j.amc.2006.06.082","volume":"185","author":"Y Wang","year":"2007","unstructured":"Wang, Y., Hu, J., Han, F.: Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields. Appl. Math. Comput. 185(2), 823\u2013833 (2007)","journal-title":"Appl. Math. Comput."},{"key":"11_CR18","first-page":"1994","volume":"5493","author":"CI Watson","year":"1994","unstructured":"Watson, C.I., Candela, G.T., Grother, P.J.: Comparison of FFT fingerprint filtering methods for neural network classification. NISTIR 5493, 1994 (1994)","journal-title":"NISTIR"},{"issue":"12","key":"11_CR19","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1016\/S0167-8655(03)00005-9","volume":"24","author":"J Yang","year":"2003","unstructured":"Yang, J., Liu, L., Jiang, T., Fan, Y.: A modified gabor filter design method for fingerprint image enhancement. Pattern Recogn. Lett. 24(12), 1805\u20131817 (2003)","journal-title":"Pattern Recogn. Lett."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Yang, W., Hu, J., Stojmenovic, M.: NDTC: a novel topology-based fingerprint matching algorithm using n-layer delaunay triangulation net check. In: Proceedings of the 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, pp. 866\u2013870 (2012)","DOI":"10.1109\/ICIEA.2012.6360846"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Yin, X., Hu, J., Xu, J.: Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering. In: 2016 IEEE 11th Conference on Industrial Electronics and Applications, pp. 144\u2013149 (2016)","DOI":"10.1109\/ICIEA.2016.7603567"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, W., Hu, J., Petersen, I., Wang, S., Bennamoun, M.: A benchmark 3D fingerprint database. In: 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 935\u2013940 (2014)","DOI":"10.1109\/FSKD.2014.6980965"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1007\/978-3-540-30126-4_91","volume-title":"Image Analysis and Recognition","author":"E Zhu","year":"2004","unstructured":"Zhu, E., Yin, J., Zhang, G.: Fingerprint enhancement using circular gabor filter. In: Campilho, A., Kamel, M. (eds.) ICIAR 2004. LNCS, vol. 3212, pp. 750\u2013758. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30126-4_91"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1016\/B978-0-12-336156-1.50061-6","volume-title":"Graphics Gems","author":"Karel Zuiderveld","year":"1994","unstructured":"Zuiderveld, K.: Contrast Limited Adaptive Histogram Equalization, pp. 474\u2013485. Academic Press Professional, Inc., San Diego (1994)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-90775-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T10:31:06Z","timestamp":1751625066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-90775-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319907741","9783319907758"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-90775-8_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}