{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:08:19Z","timestamp":1725491299497},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540743767"},{"type":"electronic","value":"9783540743774"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74377-4_63","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T01:38:34Z","timestamp":1189561114000},"page":"605-615","source":"Crossref","is-referenced-by-count":0,"title":["A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication"],"prefix":"10.1007","author":[{"given":"Sung Bum","family":"Pan","sequence":"first","affiliation":[]},{"given":"Daesung","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Kichul","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yongwha","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2003","unstructured":"Maltoni, D. et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)"},{"key":"63_CR2","doi-asserted-by":"publisher","first-page":"2727","DOI":"10.1016\/S0031-3203(01)00247-3","volume":"35","author":"R. Bolle","year":"2002","unstructured":"Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition\u00a035, 2727\u20132738 (2002)","journal-title":"Pattern Recognition"},{"key":"63_CR3","doi-asserted-by":"crossref","unstructured":"Ratha, N., Connell, J., Bolle, R.: An Analysis of Minutiae Matching Strength. In: Proc. of AVBPA 2001, pp. 223\u2013228 (2001)","DOI":"10.1007\/3-540-45344-X_32"},{"key":"63_CR4","unstructured":"X9.84: Biometrics Information Management and Security For The Financial Services Industry. ANSI (2000)"},{"key":"63_CR5","first-page":"108","volume":"1","author":"Y. Moon","year":"2000","unstructured":"Moon, Y. et al.: Collaborative Fingerprint Authentication by Smart Card and a Trusted Host. Electrical and Computer Engineering\u00a01, 108\u2013112 (2000)","journal-title":"Electrical and Computer Engineering"},{"key":"63_CR6","doi-asserted-by":"crossref","unstructured":"Hachez, G., Koeune, F., Quisquater, J.: Biometrics, Access Control, Smart Cards: A Not So Simple Combination. In: Proc. of 4th Working Conf. on Smart Card Research and Advanced Applications, pp. 273\u2013288 (2000)","DOI":"10.1007\/978-0-387-35528-3_16"},{"key":"63_CR7","unstructured":"Moon, D., et al.: Performance Analysis of the Match-on-Card System for the Fingerprint Authentication. In: Proc. of International Workshop on Information Security Applications, pp. 449\u2013459 (2001)"},{"issue":"2","key":"63_CR8","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TCE.2003.1209540","volume":"49","author":"S. Pan","year":"2003","unstructured":"Pan, S. et al.: An Ultra-Low Memory Fingerprint Matching Algorithm and Its Implementation on a 32-bit Smart Card. IEEE Tr. Consumer Electronics\u00a049(2), 453\u2013459 (2003)","journal-title":"IEEE Tr. Consumer Electronics"},{"key":"63_CR9","unstructured":"Kim, M., et al.: A Hardware Implementation for Fingerprint-based Match-on-Card. In: Proc. of International Workshop on Information Security Applications, pp. 743\u2013752 (2003)"},{"key":"63_CR10","unstructured":"Rila, L., Mitchell, C.: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. In: Proc. of CARDIS, pp. 19\u201328 (2002)"},{"issue":"1","key":"63_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/34.566808","volume":"19","author":"D. Maio","year":"1997","unstructured":"Maio, D., Maltoni, D.: Direct Gray-Scale Minutiae Detection in Fingerprints. IEEE Trans. on Pattern Analysis Machine Intelligence\u00a019(1), 27\u201340 (1997)","journal-title":"IEEE Trans. on Pattern Analysis Machine Intelligence"},{"key":"63_CR12","unstructured":"ARM limited: AMBA Specification, Rev. 2.0 (1999)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74377-4_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:21:42Z","timestamp":1619504502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74377-4_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540743767","9783540743774"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74377-4_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}