{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:08:04Z","timestamp":1759385284244,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_25","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T06:01:49Z","timestamp":1188367309000},"page":"232-241","source":"Crossref","is-referenced-by-count":25,"title":["Comparison of Compression Algorithms\u2019 Impact on Iris Recognition Accuracy"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Matschitsch","sequence":"first","affiliation":[]},{"given":"Martin","family":"Tschinder","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","volume-title":"JPEG \u2013 Still image compression standard","author":"W. Pennebaker","year":"1993","unstructured":"Pennebaker, W., Mitchell, J.: JPEG \u2013 Still image compression standard. Van Nostrand Reinhold, New York (1993)"},{"key":"25_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0799-4","volume-title":"JPEG2000 \u2014 Image Compression Fundamentals, Standards and Practice","author":"D. Taubman","year":"2002","unstructured":"Taubman, D., Marcellin, M.: JPEG2000 \u2014 Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"25_CR3","unstructured":"Jerabek, B., Schneider, P., Uhl, A.: Comparison of lossy image compression methods applied to photorealistic and graphical images using public domain sources. Tech. Rep. RIST++15\/98, Research Institute for Softwaretechnology, University of Salzburg (1998)"},{"key":"25_CR4","first-page":"72","volume-title":"Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop","author":"W. Funk","year":"2006","unstructured":"Funk, W., Arnold, M., Busch, C., Munde, A.: Evaluation of image compression algorithms for fingerprint and face recognition systems. In: Cole, J., Wolthusen, S. (eds.) Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, June 2006, pp. 72\u201378. IEEE Computer Society, Los Alamitos (2006)"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/76.499834","volume":"6","author":"A. Said","year":"1996","unstructured":"Said, A., Pearlman, W.A.: A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology\u00a06, 243\u2013249 (1996)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/11552499_16","volume-title":"Pattern Recognition and Image Analysis","author":"K. Delac","year":"2005","unstructured":"Delac, K., Grigic, M., Grigic, S.: Effects of JPEG and JPEG2000 compression on face recognition. In: Singh, S., Singh, M., Apte, C., Perner, P. (eds.) ICAPR 2005. LNCS, vol.\u00a03687, pp. 136\u2013145. Springer, Heidelberg (2005)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"McGarry, D., Arndt, C., McCabe, S., D\u2019Amato, D.: Effects of compression and individual variability on face recognition performance. In: Biometric Technology for Human Identification. Proceedings of SPIE, vol.\u00a05404, pp. 362\u2013372 (August 2004)","DOI":"10.1117\/12.543054"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Mascher-Kampfer, A., St\u00f6gner, H., Uhl, A.: Comparison of Compression Algorithms\u2019 Impact on Fingerprint and Face Recognition Accuracy. In: Visual Computing and Image Processing VCIP 07. Proceedings of SPIE, vol.\u00a06508, pp. 65080N-1\u201365050N-10 (January 2007)","DOI":"10.1117\/12.699199"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Rakshit, S., Monro, D.M.: Effects of Sampling and Compression on Human Iris Verification. In: Proceedings of the IEEE International Conference on Acustics, Speech, and Signal Processing ICASSP 2006. IEEE Signal Processing Society, pp. II-337\u2013II-340 (July 2007)","DOI":"10.1109\/ICASSP.2006.1660348"},{"key":"25_CR10","unstructured":"Ives, R.W., lBonney, B.L., Etter, D.M.: Effect of image compression on iris recognition. In: IMTC 2005 \u2013 Instrumentation and Measurement Technology Conference (May 2005)"},{"issue":"1","key":"25_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J. Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Transactions on Circiuts and Systems for Video Technology\u00a014(1), 21\u201330 (2004)","journal-title":"IEEE Transactions on Circiuts and Systems for Video Technology"},{"key":"25_CR12","unstructured":"von Seelen, U.: IrisCode template compression and its effects on authentication performance. In: Biometrics Consortium Conference 2003 (September 2003)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Beleznai, C., Ramoser, H., Wachmann, B., Birchbauer, J., Bischof, H., Kropatsch, W.: Memory-efficient fingerprint verification. In: ICIP 2001. Proceedings of the IEEE International Conference on Image Processing, Thessaloniki, Greece, vol.\u00a02, pp. 463\u2013466 (October 2001)","DOI":"10.1109\/ICIP.2001.958528"},{"volume-title":"Fractal Image Compression: Theory and Application","year":"1995","key":"25_CR14","unstructured":"Fisher, Y. (ed.): Fractal Image Compression: Theory and Application. Springer, New York (1995)"},{"key":"25_CR15","unstructured":"Masek, L., Kovesi, P.: MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. The School of Computer Science and Software Engineering, The University of Western Australia (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:43:44Z","timestamp":1737398624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}