{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T21:10:02Z","timestamp":1744233002056,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642305665"},{"type":"electronic","value":"9783642305672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30567-2_19","type":"book-chapter","created":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T07:10:40Z","timestamp":1349075440000},"page":"231-242","source":"Crossref","is-referenced-by-count":9,"title":["Evaluation of Acceleration Algorithm for Biometric Identification"],"prefix":"10.1007","author":[{"given":"Serina","family":"Egawa","sequence":"first","affiliation":[]},{"given":"Ali Ismail","family":"Awad","sequence":"additional","affiliation":[]},{"given":"Kensuke","family":"Baba","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"OpenCV, http:\/\/opencv.willowgarage.com\/wiki\/"},{"key":"19_CR2","unstructured":"PolyU Palmprint Database, http:\/\/www4.comp.polyu.edu.hk\/~biometrics\/"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Chen, J., Moon, Y.-S.: Using SIFT features in palmprint authentication. In: Proc. 19th International Conference on Pattern Recognition, pp. 1\u20134. IEEE (2008)","DOI":"10.1109\/ICPR.2008.4761867"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1145\/355744.355745","volume":"3","author":"J.H. Friedman","year":"1977","unstructured":"Friedman, J.H., Bentley, J.L., Finkel, R.A.: An algorithm for finding best matches in logarithmic expected time. ACM Trans. Math. Softw.\u00a03, 209\u2013226 (1977)","journal-title":"ACM Trans. Math. Softw."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Iannizzotto, G., Rosa, F.L.: A SIFT-based fingerprint verification system using cellular neural networks. In: Pattern Recognition Techniques, Technology and Applications, pp. 523\u2013536. InTech (2008)","DOI":"10.5772\/6256"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/276698.276876","volume-title":"Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC 1998","author":"P. Indyk","year":"1998","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC 1998, pp. 604\u2013613. ACM, New York (1998)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics. Springer (2011)","DOI":"10.1007\/978-0-387-77326-1"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.1016\/j.patcog.2009.01.018","volume":"42","author":"A. Kong","year":"2009","unstructured":"Kong, A., Zhang, D., Kamel, M.: A Survey of Palmprint Recognition. Pattern Recogn.\u00a042, 1408\u20131418 (2009)","journal-title":"Pattern Recogn."},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Lowe, D.G.: Object recognition from local scale-invariant features. In: Proc. IEEE International Conference on Computer Vision, pp. 1150\u20131157 (1999)","DOI":"10.1109\/ICCV.1999.790410"},{"issue":"2","key":"19_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D.G. Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision\u00a060(2), 91\u2013110 (2004)","journal-title":"International Journal of Computer Vision"},{"key":"19_CR11","unstructured":"Maeda, T., Matsushita, M., Sasakawa, K.: Identification algorithm using a matching score matrix. IEICE Transactions on Information and Systems\u00a0E84-D(7), 819\u2013824 (2001)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Morales, A., Ferrer, M.A., Kumar, A.: Improved palmprint authentication using contactless imaging. In: Proc. IEEE Fourth International Conference on Biometrics: Theory Applications and Systems, pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/BTAS.2010.5634472"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Park, U., Pankanti, S., Jain, A.K.: Fingerprint verification using SIFT features. In: Proc. SPIE Defense and Security Symposium (2008)","DOI":"10.1117\/12.778804"},{"issue":"9","key":"19_CR14","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1109\/TPAMI.2003.1227981","volume":"25","author":"D. Zhang","year":"2003","unstructured":"Zhang, D., Kong, W.-K., You, J., Wong, M.: Online palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a025(9), 1041\u20131050 (2003)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"19_CR15","unstructured":"Zhang, D.D.: Palmprint Authentication. Kluwer Academic Publishers (2004)"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30567-2_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T20:55:57Z","timestamp":1744232157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30567-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642305665","9783642305672"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30567-2_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}