{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:32:54Z","timestamp":1767339174064},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319979083"},{"type":"electronic","value":"9783319979090"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97909-0_4","type":"book-chapter","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T04:02:46Z","timestamp":1533700966000},"page":"29-37","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Finger Vein Recognition Based on Weighted Graph Structural Feature Encoding"],"prefix":"10.1007","author":[{"given":"Shuyi","family":"Li","sequence":"first","affiliation":[]},{"given":"Haigang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guimin","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Jinfeng","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,9]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s00138-004-0149-2","volume":"15","author":"N Miura","year":"2004","unstructured":"Miura, N., Nagasaka, A., Miyatake, T.: Feature Extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Mach. Vis. Appl. 15, 194\u2013203 (2004)","journal-title":"Mach. Vis. Appl."},{"issue":"12","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1016\/j.patrec.2012.04.018","volume":"33","author":"JF Yang","year":"2012","unstructured":"Yang, J.F., Shi, Y.H.: Finger-vein ROI localization and vein ridge enhancement. PRL 33(12), 1569\u20131579 (2012)","journal-title":"PRL"},{"key":"4_CR3","doi-asserted-by":"crossref","first-page":"34","DOI":"10.4103\/0974-8490.199782","volume":"66","author":"JF Yang","year":"2017","unstructured":"Yang, J.F., Shi, Y.H., Jia, G.M.: Finger-vein image matching based on adaptive curve transformation. PR 66, 34\u201343 (2017)","journal-title":"PR"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1007\/978-3-642-38631-2_71","volume-title":"Network and System Security","author":"W Yang","year":"2013","unstructured":"Yang, W., Hu, J., Wang, S.: A finger-vein based cancellable bio-cryptosystem. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 784\u2013790. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38631-2_71"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-33191-6_3","volume-title":"Advances in Visual Computing","author":"H-G Kim","year":"2012","unstructured":"Kim, H.-G., Lee, E.J., Yoon, G.-J., Yang, S.-D., Lee, E.C., Yoon, S.M.: Illumination normalization for SIFT based finger vein authentication. In: Bebis, G., et al. (eds.) ISVC 2012. LNCS, vol. 7432, pp. 21\u201330. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33191-6_3"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"3627","DOI":"10.3390\/s120303627","volume":"12","author":"JF Yang","year":"2012","unstructured":"Yang, J.F., Zhang, B., Shi, Y.H.: Scattering removal for finger-vein image restoration. Sensors 12(3), 3627\u20133640 (2012)","journal-title":"Sensors"},{"issue":"9","key":"4_CR7","doi-asserted-by":"publisher","first-page":"4483","DOI":"10.1109\/TIP.2017.2705424","volume":"26","author":"W Jia","year":"2017","unstructured":"Jia, W., Zhang, B., Lu, J.T., et al.: Palmprint recognition based on complete direction representation. IEEE Trans. Image Process. 26(9), 4483\u20134498 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-21605-3_19","volume-title":"Human-Computer Interaction. Interaction Techniques and Environments","author":"EEA Abusham","year":"2011","unstructured":"Abusham, E.E.A., Bashir, H.K.: Face recognition using local graph structure (LGS). In: Jacko, J.A. (ed.) HCI 2011. LNCS, vol. 6762, pp. 169\u2013175. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21605-3_19"},{"issue":"14","key":"4_CR9","doi-asserted-by":"publisher","first-page":"6131","DOI":"10.1016\/j.eswa.2014.04.006","volume":"41","author":"MFA Abdullah","year":"2014","unstructured":"Abdullah, M.F.A., Sayeed, M.S., Muthu, K.S., et al.: Face recognition with symmetric local graph structure (SLGS). Expert Syst. Appl. 41(14), 6131\u20136137 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"4_CR10","first-page":"4126","volume":"9","author":"S Dong","year":"2015","unstructured":"Dong, S., Yang, J.C., Chen, Y., et al.: Finger vein recognition based on multi-orientation weighted symmetric local graph structure. KSII Trans. Internet Inf. Syst. 9(10), 4126\u20134142 (2015)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Yang, J.F., Yang, J.: Multi-channel gabor filter design for finger-vein image enhancement. In: Fifth ICIG. IEEE Computer Society, pp. 87\u201391 (2009)","DOI":"10.1109\/ICIG.2009.170"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/978-3-642-12307-8_35","volume-title":"Computer Vision \u2013 ACCV 2009","author":"J Yang","year":"2010","unstructured":"Yang, J., Shi, Y., Yang, J.: Finger-vein recognition based on a bank of gabor filters. In: Zha, H., Taniguchi, R.-I., Maybank, S. (eds.) ACCV 2009. LNCS, vol. 5994, pp. 374\u2013383. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12307-8_35"},{"issue":"4","key":"4_CR13","first-page":"783","volume":"17","author":"JF Yang","year":"2014","unstructured":"Yang, J.F., Shi, Y.H.: Finger-vein network enhancement and segmentation. PAA 17(4), 783\u2013797 (2014)","journal-title":"PAA"},{"issue":"3","key":"4_CR14","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/TSMC.2013.2258010","volume":"44","author":"W Jia","year":"2014","unstructured":"Jia, W., Hu, R.X., Lei, Y.K., et al.: Histogram of oriented lines for palmprint recognition. IEEE Trans. Syst. Man Cybern. 44(3), 385\u2013395 (2014)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"C","key":"4_CR15","first-page":"26","volume":"50","author":"YT Luo","year":"2014","unstructured":"Luo, Y.T., Zhao, L.Y., Zhang, B., et al.: Local line directional pattern for palmprint recognition. PR 50(C), 26\u201344 (2014)","journal-title":"PR"},{"issue":"1","key":"4_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/BF00130487","volume":"7","author":"MJ Swain","year":"1991","unstructured":"Swain, M.J., Ballard, D.H.: Color indexing. IJCV 7(1), 11\u201332 (1991)","journal-title":"IJCV"},{"issue":"5","key":"4_CR17","doi-asserted-by":"publisher","first-page":"1766","DOI":"10.3837\/tiis.2014.05.015","volume":"8","author":"Y Lu","year":"2014","unstructured":"Lu, Y., Yoon, S., Xie, S.J., et al.: Finger vein recognition using generalized local line binary pattern. KSII Trans. Internet Inf. Syst. 8(5), 1766\u20131784 (2014)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"8","key":"4_CR18","doi-asserted-by":"publisher","first-page":"1816","DOI":"10.1109\/TIFS.2017.2689724","volume":"12","author":"H Qin","year":"2017","unstructured":"Qin, H., EI-Yacoubi, M.A.: Deep representation-based feature extraction and recovering for finger-vein verification. IEEE Trans. Inf. Forensics Secur. 12(8), 1816\u20131829 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97909-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T22:23:36Z","timestamp":1661725416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97909-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319979083","9783319979090"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97909-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}