{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:03:29Z","timestamp":1725494609745},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540767244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76725-1_19","type":"book-chapter","created":{"date-parts":[[2007,11,12]],"date-time":"2007-11-12T15:02:53Z","timestamp":1194879773000},"page":"172-181","source":"Crossref","is-referenced-by-count":3,"title":["A Multiple Substructure Matching Algorithm for Fingerprint Verification"],"prefix":"10.1007","author":[{"given":"Mabel Iglesias","family":"Ham","sequence":"first","affiliation":[]},{"given":"Yilian Baz\u00e1n","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Edel B. Garc\u00eda","family":"Reyes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Federal Bureau of Investigation: The Science of Fingerprints: Classification and Uses. Washington, D.C.: U.S. Government Printing Office (1984)"},{"issue":"11","key":"19_CR2","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1109\/34.888711","volume":"22","author":"Z.M. Kovacs-Vajna","year":"2000","unstructured":"Kovacs-Vajna, Z.M.: A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Trans. PAMI\u00a022(11), 1266\u20131276 (2000)","journal-title":"IEEE Trans. PAMI"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/11527923_28","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"H. Deng","year":"2005","unstructured":"Deng, H., Huo, O.: Minutiae Matching Based Fingerprint Verification Using Delaunay Triangulation and Aligned- Edge-Guided Triangle Matching. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.\u00a03546, pp. 270\u2013278. Springer, Heidelberg (2005)"},{"key":"19_CR4","unstructured":"Jiang, X., Yau, W.Y.: Fingerprint minutiae matching based on the local and global structures. In: Proc. Internat. Conf. on Pattern Recognition, pp. 1038\u20131104 (2000)"},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0031-3203(86)90017-8","volume":"19","author":"D.K. Isenor","year":"1986","unstructured":"Isenor, D.K., Zaky, S.G.: Fingerprint Identification Using Graph Matching. Pattern Recognition\u00a019(2), 113\u2013122 (1986)","journal-title":"Pattern Recognition"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Chikkerur, S., Govindaraju, V.: K-plet and CBFS: A graph based fingerprint representation and matching algorithm. In: International Conference on Biometrics (2006)","DOI":"10.1007\/11608288_42"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Ratha, N., Bolle, R., Pandit, V., Vaish, V.: Robust fingerprint authentication using local structural similarity. In: 15th IEEE Workshop on Applications of Computer Vision, pp. 29\u201334 (2000)","DOI":"10.1109\/WACV.2000.895399"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Bebis, G., Deaconu, T., Georgiopoulos, M.: Fingerprint identification using Delaunay triangulation. In: Int. Conf. on Information Intelligence and Systems, pp. 452\u2013459 (1999)","DOI":"10.1109\/ICIIS.1999.810315"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-540-25948-0_34","volume-title":"Biometric Authentication","author":"G. Parziale","year":"2004","unstructured":"Parziale, G., Niel, A.: A Fingerprint Matching Using Minutiae Triangulation. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol.\u00a03072, pp. 241\u2013248. Springer, Heidelberg (2004)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Guibas, L., Stolfi, J.: Primitives for the Manipulation of General Subdivisions and the Computation of Voronoi Diagrams. ACT TOG\u00a04(2) (1985)","DOI":"10.1145\/282918.282923"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Sloan, S.W., Houlsby, G.T.: An Implementation of Watson\u2019s Algorithm for Computing 2-D Delaunay Triangulations. Advanced Engineering Software 6(4) (1984)","DOI":"10.1016\/0141-1195(84)90003-2"},{"issue":"5","key":"19_CR12","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/0031-3203(91)90050-F","volume":"24","author":"M. Tuceryan","year":"1991","unstructured":"Tuceryan, M., Chorzempa, T.: Relative Sensitivity of a Family of Closest-Point Graphs in Computer Vision Applications. Pattern Recognition\u00a024(5), 361\u2013373 (1991)","journal-title":"Pattern Recognition"},{"key":"19_CR13","unstructured":"FVC2004. Fingerprint Verification Competition, url: http:\/\/bias.csr.unibo.it\/fvc2004\/"},{"key":"19_CR14","unstructured":"Feng, Y., Feng, J., Chen, X., Song, Z.: A novel fingerprint matching scheme based on local structure compatibility. In: Int. Conf. on Pattern Recognition (2006)"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76725-1_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:36:28Z","timestamp":1619519788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76725-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540767244"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76725-1_19","relation":{},"subject":[]}}