{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:54:20Z","timestamp":1725483260954},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540710776"},{"type":"electronic","value":"9783540710783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-71078-3_7","type":"book-chapter","created":{"date-parts":[[2007,5,4]],"date-time":"2007-05-04T01:41:33Z","timestamp":1178242893000},"page":"175-199","source":"Crossref","is-referenced-by-count":4,"title":["Fingerprint Recognition Using a Hierarchical Approach"],"prefix":"10.1007","author":[{"given":"Chengfeng","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuan","family":"Luo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marina L.","family":"Gavrilova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jon","family":"Rokne","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1_7","unstructured":"Asker M.B, Gerben T.B., Verwaaijen, Sabih H.G., Leo P.J. and Berend J.Z. 2000, A Correlation-Based Fingerprint Verification System, Proceedings of ProRISC 2000 Workshop on Circuits, Systems, and Signal Processing, the Netherlands, pp. 205-213."},{"key":"7_CR2_7","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2003","unstructured":"Maltoni, D. Jain A.K., and Maio D.s 2003, Handbook of Fingerprint Recognition, Springer-Verlag."},{"key":"7_CR3_7","unstructured":"Bebis G., Deaconu T., and Georiopoulous M. 1999, Fingerprint identification using Delaunay triangulation, ICIIS99, Maryland, pp. 452-459."},{"key":"7_CR4_7","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/83.841531","volume":"9","author":"AK Jain","year":"2000","unstructured":"Jain A.K., Salil P., Hong L., and Pankanti S. 2000, Filterbank-Based Finger-print Matching, IEEE Transactions On Image Processing, vol. 9, pp. 846-859.","journal-title":"IEEE Transactions On Image Processing"},{"key":"7_CR5_7","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1109\/ICNN.1993.298852","volume":"3","author":"M Kamijo","year":"1993","unstructured":"Kamijo M. 1993, Classifying Fingerprint Images using Neural Network: Deriving the Classification State, IEEE International Conference on Neural Network, vol. 3, pp. 1932-1937.","journal-title":"IEEE International Conference on Neural Network"},{"key":"7_CR6_7","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu N. 1979, A Threshold Selection Method from Gray-Level Histograms, IEEE Transactions on Systems, Man, and Cybernetics, vol. 9, pp. 62-66.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"7_CR7_7","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TPAMI.1980.4767009","volume":"2","author":"K Rao","year":"1980","unstructured":"Rao K. and Balck K. 1980, Type Classification of Fingerprints: A Syntactic Approach, TPAMI, vol. 2, pp. 223-231.","journal-title":"TPAMI"},{"key":"7_CR8_7","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/TPAMI.2003.1195995","volume":"25","author":"B Bhanu","year":"2003","unstructured":"Bhanu B. and Tan X. 2003, Fingerprint Indexing Based on Novel Features of Minutiae Triplets, TPAMI, vol. 25, pp. 616-622.","journal-title":"TPAMI"},{"key":"7_CR9_7","unstructured":"Wang C.F. and Gavrilova M.L. 2004, A Multi-Resolution Approach to Singular Point Detection in Fingerprint Images, Proceedings of the International Conference on Artificial Intelligence, vol. 1, Las Vegas, Nevada, USA, pp. 506-514."},{"key":"7_CR10_7","doi-asserted-by":"crossref","unstructured":"Wang F., Zou X., Luo Y., and Hu J. 2004, A Hierarchy Approach for Singular Point Detection in Fingerprint Images, Proceedings of the first International Conference on Biometric Authentication (ICBA04), vol. 1, HongKong, pp. 359-365.","DOI":"10.1007\/978-3-540-25948-0_50"},{"key":"7_CR11_7","first-page":"242","volume":"3","author":"P Ramo","year":"2001","unstructured":"Ramo P., Tico M., Onnia V., and Saarinen J. 2001, Optimized singular point detection algorithm for fingerprint images, Proceedings. International Conference on Image Processing, vol. 3, pp. 242-245.","journal-title":"Proceedings. International Conference on Image Processing"},{"key":"7_CR12_7","doi-asserted-by":"crossref","unstructured":"Cappelli R., Maio D. and Maltoni D. 2001, Modelling Plastic Distortion in Fingerprint Images, ICAPR, LNCS 2013, pp. 369-376.","DOI":"10.1007\/3-540-44732-6_38"},{"key":"7_CR13_7","unstructured":"Cormen T., Leiserson C., Rivest R., and Stein C. 2002, Introduction to Algorithm, The MIT Press."},{"key":"7_CR14_7","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S0262-8856(00)00057-3","volume":"19","author":"M Fornefett","year":"2001","unstructured":"Fornefett M., Rohr K. and Stiehl H.S. 2001, Radial basis functions with compact support for elastic registration of medical images, Image and Vision Computing, vol. 19, pp. 87-96.","journal-title":"Image and Vision Computing"},{"key":"7_CR15_7","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"AK Jain","year":"1997","unstructured":"Jain A.K., Hong L., and Bolle R. 1997, On-line fingerprint verification, TPAMI, vol. 19, pp. 302-314.","journal-title":"TPAMI"},{"key":"7_CR16_7","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1109\/34.531800","volume":"18","author":"NK Ratha","year":"1996","unstructured":"Ratha N.K., Karu K., Chen S., and Jain A.K. 1996, A Real-Time Matching System for Large Fingerprint Databases, TPAMI, vol. 18, pp. 799-813.","journal-title":"TPAMI"},{"key":"7_CR17_7","first-page":"6","volume":"9","author":"CF Wang","year":"2003","unstructured":"Wang C.F. and Hu Z.Y. 2003, Imange Based Rendering under Varying Illumination, the Journal of High Technology Letters, vol. 9, pp. 6-11.","journal-title":"the Journal of High Technology Letters"},{"key":"7_CR18_7","volume-title":"Concepts and Applications of Voronoi Diagrams","author":"A Okabe","year":"1992","unstructured":"Okabe A., Boots B., and Sugihara K. 1992, Concepts and Applications of Voronoi Diagrams, Wiley Publishing, Chichester, England."},{"key":"7_CR19_7","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/0031-3203(95)00106-9","volume":"18","author":"K Karu","year":"1996","unstructured":"Karu K. and Jain A.K. 1996, Fingerprint Classification, Pattern Recognition, vol. 18, pp. 389-404.","journal-title":"Pattern Recognition"},{"key":"7_CR20_7","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","volume":"8","author":"J Canny","year":"1986","unstructured":"Canny J. 1986, A Computational Approach to Edge Detection, TPAMI, vol. 8, pp. 679-698.","journal-title":"TPAMI"}],"container-title":["Studies in Computational Intelligence","Computational Intelligence in Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71078-3_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:36:47Z","timestamp":1620016607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71078-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540710776","9783540710783"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71078-3_7","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2007]]}}}