{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:14:39Z","timestamp":1725574479773},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240297"},{"type":"electronic","value":"9783540305484"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30548-4_58","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T01:24:10Z","timestamp":1294449850000},"page":"516-524","source":"Crossref","is-referenced-by-count":7,"title":["An Improved Method for Singularity Detection of Fingerprint Images"],"prefix":"10.1007","author":[{"given":"Hongwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yilong","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Guozhen","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"58_CR1","first-page":"29","volume":"38","author":"Y.L. Yin","year":"2002","unstructured":"Yin, Y.L., Ning, X.B., Zhang, X.M.: Development and applica\u00action of automatic fingerprint identification technology. Journal of Nanjing University (Natural Sciences Edition)\u00a038(1), 29\u201335 (2002) (in Chinese)","journal-title":"Journal of Nanjing University (Natural Sciences Edition)"},{"key":"58_CR2","unstructured":"Jain, A.K., Prabhakar, S., Hong, L.: A multi-channel approach to fingerprint classification. In: Proceedings of the Indian Conference on Computer Vision, Graphics, and Images Processing (ICVGIP 1998), New Delhi, pp. 153\u2013158 (1998)"},{"issue":"3","key":"58_CR3","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/0031-3203(84)90079-7","volume":"17","author":"M. Kawagoe","year":"1984","unstructured":"Kawagoe, M., Tojo, A.: Fingerprint pattern classification. Pattern Recognition\u00a017(3), 295\u2013303 (1984)","journal-title":"Pattern Recognition"},{"key":"58_CR4","doi-asserted-by":"crossref","unstructured":"Maio, D., Maltoni, D.: A structural approach to fingerprint classification. In: Proceedings of the 13th International Conference on Pattern Recognition (ICPR), Vienna, pp. 578\u2013585 (1996)","DOI":"10.1109\/ICPR.1996.547013"},{"issue":"3","key":"58_CR5","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/0031-3203(95)00106-9","volume":"29","author":"K. Karu","year":"1996","unstructured":"Karu, K., Jain, A.K.: Fingerprint classification. Pattern Recognition\u00a029(3), 389\u2013404 (1996)","journal-title":"Pattern Recognition"},{"issue":"2","key":"58_CR6","first-page":"67","volume":"67","author":"A.K. Jain","year":"2001","unstructured":"Jain, A.K., Prabhakar, S., Pankanti, S.: Matching and classification: A case study in fingerprint domain. Proceedings of the INSA-A (Indian National Science Academy)\u00a067(2), 67\u201385 (2001)","journal-title":"Proceedings of the INSA-A (Indian National Science Academy)"},{"issue":"10","key":"58_CR7","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/S0167-8655(97)00127-X","volume":"18","author":"A. Lumini","year":"1997","unstructured":"Lumini, A., Maio, D., Maltoni, D.: Continuous vs. exclusive classification for fingerprint retrieval. Pattern Recognition Letters\u00a018(10), 1027\u20131034 (1997)","journal-title":"Pattern Recognition Letters"},{"key":"58_CR8","unstructured":"Cheng, J.G., Tian, J., Ren, Q., Zhang, T.H.: Singular point-based fingerprint classification. In: Zhou, H. (ed.) Proceedings of the 2nd Workshop on Biometrics in Conjunction with the 6th International Conference for Young Computer Scientists, pp. S4-27\u2013S4-34 (2001)"},{"issue":"2","key":"58_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/0031-3203(92)90096-2","volume":"25","author":"V.S. Srinivasan","year":"1992","unstructured":"Srinivasan, V.S., Murthy, N.N.: Detection of singular points in fingerprint images. Pattern Recognition\u00a025(2), 139\u2013153 (1992)","journal-title":"Pattern Recognition"},{"key":"58_CR10","unstructured":"Bazen, A.M., Gerez, S.H.: Extraction of singular points from directional fields of fingerprints. In: Annual CTIT Workshop, Enschede (2001)"},{"key":"58_CR11","unstructured":"Zhang, W.W., Wang, S., Wang, Y.S.: Corner detection based singularity detection of fingerprint image. In: Zhou, H. (ed.) Proceedings of the 2nd Workshop on Biometrics in Conjunction with the 6th International Conference for Young Computer Scientists, pp. S4-51\u2013S4-56 (2001)"},{"issue":"8","key":"58_CR12","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/34.531800","volume":"18","author":"N. Ratha","year":"1996","unstructured":"Ratha, N., Karu, K., Chen, S., Jain, A.K.: A real-time matching system for large fingerprint database. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a018(8), 799\u2013813 (1996)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"58_CR13","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A.K. Jain","year":"1997","unstructured":"Jain, A.K., Hong, L., Bolle, R.: On-Line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a019(4), 302\u2013314 (1997)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"6","key":"58_CR14","first-page":"1082","volume":"14","author":"T.Z. Tan","year":"2003","unstructured":"Tan, T.Z., Xin-Bao, N., Yi-Long, Y., Xiao-Si, Z., Yun, C.: A Method for Singular\u00acity Detection in Fingerprint Images. Journal of Software\u00a014(6), 1082\u20131088 (2003)","journal-title":"Journal of Software"},{"key":"58_CR15","volume-title":"Classification and uses of fingerprints","author":"E.R. Henry","year":"1990","unstructured":"Henry, E.R.: Classification and uses of fingerprints. George Routeledge and Sons, London (1990)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometric Person Authentication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30548-4_58.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:28:46Z","timestamp":1620012526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30548-4_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240297","9783540305484"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30548-4_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}