{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:19:29Z","timestamp":1725578369860},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195297"},{"type":"electronic","value":"9783642195303"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19530-3_26","type":"book-chapter","created":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T06:42:41Z","timestamp":1299566561000},"page":"286-298","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Preserving Challenges: New Design Aspects for Latent Fingerprint Detection Systems with Contact-Less Sensors for Future Preventive Applications in Airport Luggage Handling"],"prefix":"10.1007","author":[{"given":"Mario","family":"Hildebrandt","sequence":"first","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Pocs","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Ulrich","sequence":"additional","affiliation":[]},{"given":"Ronny","family":"Merkel","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Fries","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","volume-title":"Pattern Recognition for IT Security","author":"M. Leich","year":"2010","unstructured":"Leich, M., Ulrich, M., Hildebrandt, M., Kiltz, S., Vielhauer, C.: Forensic fingerprint detec-tion: Challenges of benchmarking new contact-less fingerprint scanners \u2013 a first proposal. In: Pattern Recognition for IT Security, TU-Darmstadt, Darmstadt (2010)"},{"key":"26_CR2","unstructured":"Data Protection Directive 95\/46\/EC, Council of Europe Convention ETS no. 108; also OECD Guidelines 1980, UN Guidelines 1990; in Germany, since BVerfGE 65, 1"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Jain, A., Feng, J., Nagar, A., Nandakumar, K.: On Matching Latent Fingerprints. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2008, pp. 1\u20138 (2008)","DOI":"10.1109\/CVPRW.2008.4563117"},{"issue":"9","key":"26_CR4","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1364\/JOSAA.23.002137","volume":"23","author":"S.-S. Lin","year":"2006","unstructured":"Lin, S.-S., Yemelyanov, K.M., Pugh, E.N., Engheta, N.: Polarization- and Specular-Reflection-Based, Non-contact Latent Fingerprint Imaging and Lifting. Journal of the Optical Society of America A\u00a023(9), 2137\u20132153 (2006)","journal-title":"Journal of the Optical Society of America A"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Jain, A., Chen, Y., Demirkus, M.: Pores and Ridges: fingerprint Matching Using Level 3 Features. In: 18th International Conference on Pattern Recognition, ICPR 2006, pp. 477\u2013480 (2006)","DOI":"10.1109\/ICPR.2006.938"},{"issue":"2","key":"26_CR6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.4323\/rjlm.2010.149","volume":"18","author":"G. Popa","year":"2010","unstructured":"Popa, G., Potorac, R., Preda, N.: Method for fingerprints age determination. Romanian Journal of Legal Medicine\u00a018(2), 149\u2013154 (2010)","journal-title":"Romanian Journal of Legal Medicine"},{"key":"26_CR7","unstructured":"Engel, A., Masgai, G.: Detektion von Fingerspuren und Windows-Fingerprint-GINA. Entwurf, Implementierung und Evaluierung, Bachelor Thesis, Otto-von-Guericke-University of Magdeburg (2004)"},{"issue":"1","key":"26_CR8","doi-asserted-by":"publisher","first-page":"15307","DOI":"10.1088\/1464-4258\/10\/01\/015307","volume":"10","author":"S.K. Dubey","year":"2008","unstructured":"Dubey, S.K., Mehta, D.S., Anand, A., Shakher, C.: Simultaneous topography and tomo-graphy of latent fingerprints using full-field swept-source optical coherence tomography. Journal of Optics A: Pure and Applied Optics\u00a010(1), 015307\u2013015315 (2008)","journal-title":"Journal of Optics A: Pure and Applied Optics"},{"issue":"7","key":"26_CR9","doi-asserted-by":"publisher","first-page":"77002","DOI":"10.1088\/0957-0233\/20\/7\/077002","volume":"20","author":"K. Kuivalainen","year":"2009","unstructured":"Kuivalainen, K., Peiponen, K.-E., Myller, K.: Application of a diffractive element-based sensor for detection of latent fingerprints from a curved smooth surface. Measurement Science and Technology, vol\u00a020(7), 77002 (2009)","journal-title":"Measurement Science and Technology, vol"},{"key":"26_CR10","unstructured":"EVISCAN by cote:m (2010), \n                    \n                      http:\/\/www.cotem.de\/eviscan_web\/index.html"},{"key":"26_CR11","unstructured":"Chromatic White Light Sensor CWL - Fries Research & Technology - FRT GmbH (2010), \n                    \n                      http:\/\/www.frt-gmbh.com\/en\/products\/sensors\/cwl\/"},{"key":"26_CR12","unstructured":"Singh, M., Singh, D.K., Kalra, P.K.: Fingerprint separation: an application of ICA. In: Proc. SPIE 6982, 69820L (2008)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Chen, F., Feng, J., Zhou, J.: On Separating Overlapped Fingerprints, Biometrics: Theory Applications and Systems (IEEE BTAS 2010), pp. 1\u20136 (2010)","DOI":"10.1109\/BTAS.2010.5634483"},{"issue":"5","key":"26_CR14","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1021\/ac9026077","volume":"82","author":"H.-W. Tang","year":"2010","unstructured":"Tang, H.-W., Lu, W., Che, C.-M., Ng, K.-M.: Gold Nanoparticles and Imaging Mass Spectrometry: Double Imaging of Latent Fingerprints. Anal. Chem.\u00a082(5), 1589\u20131593 (2010)","journal-title":"Anal. Chem."},{"key":"26_CR15","unstructured":"Art. 16 Treaty on the Functioning of the EU; in Germany lately, BVerfG, 2 BvR 1372\/07 (Mikado), para. 18"},{"key":"26_CR16","unstructured":"Article 29 Data Protection Working Party of the EU: Biometrics (WP80), p. 5 (2003), \n                    \n                      http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/docs\/wpdocs\/2003\/wp80_en.pdf"},{"key":"26_CR17","unstructured":"Article 29 Data Protection Working Party of the EU: Concept of personal data (WP136), \n                    \n                      http:\/\/ec.europa.eu\/justice\/policies\/privacy\/docs\/wpdocs\/2007\/wp136_en.pdf"},{"key":"26_CR18","unstructured":"European Court of Human Rights, S and Marper v. UK (30562\/04, 30566\/04), para. 101"},{"key":"26_CR19","unstructured":"BVerfGE (Collection of Federal Constitutional Court descisions) 120, 378 (428), \n                    \n                      http:\/\/www.servat.unibe.ch\/dfr\/"},{"key":"26_CR20","unstructured":"BVerfGE 120, 378 (402); BVerfG, 2 BvR 1345\/03 (IMSI-Catcher), Abs. 65; BVerfGE 115, 320 (342); BVerfGE 115, 166 (188); BVerfGE 113, 29 (46); BVerfGE 65, 1 (42)"},{"key":"26_CR21","unstructured":"Dix in: Ro\u00dfnagel, Handbuch Datenschutzrecht, M\u00fcnchen 2003; Bygrave para. 20; Regan: Legislating Privacy, University of North Carolina Press, pp. 230ff.; Steinm\u00fcller, Informationstechnologie und Gesellschaft, Darmstadt, p. 671; Podlech in: Br\u00fcckner\/Dalichau, Festgabe f\u00fcr Hans Gr\u00fcner, Percha, pp. 452ff.; BVerfGE 65, 1 (43); \u201cscatter,\u201d BVerfGE 120, 378 (402 f.) w. f. r (1995), \n                    \n                      http:\/\/www.austlii.edu.au\/au\/journals\/UNSWLJ\/2001\/6.html"},{"key":"26_CR22","unstructured":"Hornung\/Desoi\/Pocs in: Br\u00f6mme\/Busch, BIOSIG, Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, Bonn, p. 83 (2010)"},{"key":"26_CR23","unstructured":"BVerfG 1 BvR 256\/08, para. 224 (English press release under \u201cData Security\u201d) (March 2, 2010), \n                    \n                      http:\/\/www.bverfg.de\/pressemitteilun-gen\/bvg10-011en.html"}],"container-title":["Lecture Notes in Computer Science","Biometrics and ID Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19530-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T09:53:16Z","timestamp":1558432396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19530-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195297","9783642195303"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19530-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}