{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:01:10Z","timestamp":1761058870555},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540896456"},{"type":"electronic","value":"9783540896463"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89646-3_33","type":"book-chapter","created":{"date-parts":[[2008,12,2]],"date-time":"2008-12-02T04:39:28Z","timestamp":1228192768000},"page":"336-345","source":"Crossref","is-referenced-by-count":21,"title":["Sparse Representation for Ear Biometrics"],"prefix":"10.1007","author":[{"given":"Imran","family":"Naseem","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Togneri","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Bennamoun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Wright, J., Yang, A., Ganesh, A., Sastri, S.S., Ma, Y.: Robust face recognition via sparse representation. IEEE Trans. PAMI (2008)","DOI":"10.1109\/AFGR.2008.4813404"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Flynn, P.J., Bowyer, K.W., Phillips, P.J.: Assessment of time dependency in face recognition: An initial study. Audio- and Video-Based Biometric Person Authentication, 44\u201351 (2003)","DOI":"10.1007\/3-540-44887-X_6"},{"issue":"9","key":"33_CR3","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1109\/TPAMI.2003.1227990","volume":"25","author":"K. Chang","year":"2003","unstructured":"Chang, K., Bowyer, K.W., Sarkar, S., Victor, B.: Comparison and combinations of ear and faces images in appearance-based biometrics. IEEE Trans. Pattern Analysis and Machine Intelligences\u00a025(9), 1160\u20131165 (2003)","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligences"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Lu, L., Zhang, X., Zhao, Y., Jia, Y.: Ear recognition based on statistical shape model. In: International Conference on Innovative Computing Information and Control (ICICIC 2006) (2006)","DOI":"10.1109\/ICICIC.2006.445"},{"issue":"11","key":"33_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1049\/ir:20051105","volume":"51","author":"L. Collins","year":"2005","unstructured":"Collins, L.: Earmarked(biometrics). IEE Review\u00a051(11), 38\u201340 (2005)","journal-title":"IEE Review"},{"key":"33_CR6","volume-title":"Ear identification","author":"A. Iannarelli","year":"1989","unstructured":"Iannarelli, A.: Ear identification. Paramount Publishing Company, Freemont (1989)"},{"key":"33_CR7","unstructured":"Hurley, D.J., Arbab-Zavar, B., Nixon, M.S.:The ear as a biometric. In: Handbook of Biometrics (2007)"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Moreno, B., Sanchez, A.: On the use of outer ear images for personal identification in security applications. In: Proc. IEEE 33rd Annual Intl. Conf. on Security Technology, pp. 469\u2013476 (1999)","DOI":"10.1109\/CCST.1999.797956"},{"key":"33_CR9","unstructured":"Iwano, K., Hirose, T., Kamibayashi, E., Furui, S.: Audio-visual person authentication using speech and ear images. In: Proc. of Workshop on Multimodal User Authentication, pp. 85\u201390 (2003)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Arbab-Zavar, B., Nixon, M.S., Hurley, D.J.: On model-based analysis of ear biomtrics. In: IEEE Intl. Conf. on Biometrics: Theory, Applications and Systems (September 2007)","DOI":"10.1109\/BTAS.2007.4401937"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Baraniuk, R.: Compressive sensing. IEEE Signal Processing Magazine\u00a024 (2007)","DOI":"10.1109\/MSP.2007.4286571"},{"issue":"4","key":"33_CR12","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"D. Donoho","year":"2006","unstructured":"Donoho, D.: Compressed sensing. IEEE Trans. Inform. Theory\u00a052(4), 1289\u20131306 (2006)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"33_CR13","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TIT.2005.862083","volume":"52","author":"E. Cand\u00e8s","year":"2006","unstructured":"Cand\u00e8s, E., Romberg, J., Tao, T.: Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inform. Theory\u00a052(2), 489\u2013509 (2006)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"33_CR14","unstructured":"Baraniuk, R., Davenport, M., DeVore, R., Wakin, M.B.: The johnson-lindenstrauss lemma meets compressed sensing (2006), dsp.rice.edu\/cs\/jlcs-v03.pdf"},{"issue":"6","key":"33_CR15","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1002\/cpa.20132","volume":"59","author":"D. Donoho","year":"2006","unstructured":"Donoho, D.: For most large underdetermined systems of linear equations the minimal l 1-norm solution is also the sparsest solution. Comm. on Pure and Applied Math.\u00a059(6), 797\u2013829 (2006)","journal-title":"Comm. on Pure and Applied Math."},{"issue":"8","key":"33_CR16","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1002\/cpa.20124","volume":"59","author":"E. Cand\u00e8s","year":"2006","unstructured":"Cand\u00e8s, E., Romberg, J., Tao, T.: Stable signal recovery from incomplete and inaccurate measurements. Comm. on Pure and Applied Math.\u00a059(8), 1207\u20131223 (2006)","journal-title":"Comm. on Pure and Applied Math."},{"issue":"12","key":"33_CR17","doi-asserted-by":"publisher","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"E. Cand\u00e8s","year":"2006","unstructured":"Cand\u00e8s, E., Tao, T.: Near-optimal signal recovery from random projections: Universal encoding strategies? IEEE Tran. Infm. Theory\u00a052(12), 5406\u20135425 (2006)","journal-title":"IEEE Tran. Infm. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89646-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T18:30:40Z","timestamp":1557945040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89646-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540896456","9783540896463"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89646-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}