{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:09Z","timestamp":1746115869109,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642420412"},{"type":"electronic","value":"9783642420429"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-42042-9_55","type":"book-chapter","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T14:08:03Z","timestamp":1383055683000},"page":"441-447","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Hand Shape Identification Using Random Forests"],"prefix":"10.1007","author":[{"given":"El-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Chaudhary, D., Sharma, A.: Hand geometry based recognition system. In: Proc. of 3rd Nirma University International Conference on Engineering (2012)","DOI":"10.1109\/NUICONE.2012.6493282"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Fong, L.L., Seng, W.C.: A comparison study on hand recognition approaches. In: Proc. of Int. Conf. Soft Computing and Pattern Recognition, pp. 364\u2013368 (2009)","DOI":"10.1109\/SoCPaR.2009.78"},{"key":"55_CR3","unstructured":"Amayeh, G., Bebis, G., Erol, A., Nicolescu, M.: Peg-free hand shape verification using high order zernike moments. In: Proc. of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2006)"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez, S., Travieso, C., Alonso, J., Ferrer, M.: Automatic biometric identification system by hand geometry. In: Proc. IEEE Annual International Carnahan Conference on Security Technology, pp. 281\u2013284 (2003)","DOI":"10.1109\/CCST.2003.1297573"},{"key":"55_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/3-540-45344-X_48","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"R. Sanchez-Reillo","year":"2001","unstructured":"Sanchez-Reillo, R., Sanchez-Avila, C.: RBF neural networks for hand-based biometric recognition. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol.\u00a02091, pp. 330\u2013335. Springer, Heidelberg (2001)"},{"issue":"11","key":"55_CR6","doi-asserted-by":"publisher","first-page":"2797","DOI":"10.1016\/j.patcog.2009.02.007","volume":"42","author":"D. Nicolae","year":"2009","unstructured":"Nicolae, D.: A survey of biometric technology based on hand shape. Pattern Recognition\u00a042(11), 2797\u20132806 (2009)","journal-title":"Pattern Recognition"},{"key":"55_CR7","unstructured":"Pavesic, N., Ribaric, S., Ribaric, D.: Personal authentication using hand-geometry and palmprint features: the state of the art. In: Proc. of the Workshop on Biometrics (2004)"},{"issue":"3","key":"55_CR8","doi-asserted-by":"publisher","first-page":"2895","DOI":"10.3390\/s130302895","volume":"13","author":"G. Park","year":"2013","unstructured":"Park, G., Kim, S.: Hand biometric recognition based on fused hand geometry and vascular patterns. Sensors\u00a013(3), 2895\u20132910 (2013)","journal-title":"Sensors"},{"key":"55_CR9","unstructured":"Sanchez-Reillo, R.: Hand geometry pattern recognition through gaussian mixture modelling. In: Proc. of 15th Int. Conf. Pattern Recognition (2000)"},{"key":"55_CR10","unstructured":"Jain, A.K., Duta, N.: Deformable matching of hand shapes for user verification. In: Proc. of Int. Conf. on Image Processing (1999)"},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"Morales, A., Ferrer, M.A., Daz, F., Alonso, J.B., Travieso, C.M.: Contact-free hand biometric system for real environments. In: Proc. of the 16th European Signal Processing Conf. (2008)","DOI":"10.5772\/7447"},{"key":"55_CR12","unstructured":"Xin, C., Wu, X., Qiushi, Z., Youbao, T.: A contactless hand shape identification system. In: Proc. of 3rd Int. Conf. on Advanced Computer Control (2011)"},{"issue":"14","key":"55_CR13","doi-asserted-by":"publisher","first-page":"11728","DOI":"10.1016\/j.eswa.2012.04.081","volume":"39","author":"J.M. Guo","year":"2012","unstructured":"Guo, J.M., Hsia, C.H., Liu, Y.F., Yu, J.C., Chu, M.H., Le, T.N.: Contact-free hand geometry-based identification system. Expert Systems with Applications\u00a039(14), 11728\u201311736 (2012)","journal-title":"Expert Systems with Applications"},{"key":"55_CR14","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.imavis.2006.01.020","volume":"24","author":"E. Y\u00f6r\u00fck","year":"2006","unstructured":"Y\u00f6r\u00fck, E., Duta\u01e7aci, H., Sankur, B.: Hand biometrics. Image and Vision Comptuting\u00a024, 483\u2013497 (2006)","journal-title":"Image and Vision Comptuting"},{"issue":"1","key":"55_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Machine Learning\u00a045(1), 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"55_CR16","volume-title":"Classification and Regression Trees","author":"L. Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J., Olshen, R., Stone, C.: Classification and Regression Trees. Chapman & Hall, New York (1984)"},{"issue":"13","key":"55_CR17","doi-asserted-by":"publisher","first-page":"1478","DOI":"10.1016\/j.patrec.2006.02.021","volume":"27","author":"A. Kumar","year":"2006","unstructured":"Kumar, A., Wong, D.C.M., Shen, H.C., Jain, A.K.: Personal authentication using hand images. Pattern Recognition Letters\u00a027(13), 1478\u20131486 (2006)","journal-title":"Pattern Recognition Letters"},{"key":"55_CR18","unstructured":"Sherrod, P.H.: Dtreg: Predictive modeling software (2011)"},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann (2011)","DOI":"10.1016\/B978-0-12-374856-0.00001-8"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-42042-9_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T18:41:23Z","timestamp":1746038483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-42042-9_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642420412","9783642420429"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-42042-9_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}