{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:55:57Z","timestamp":1771332957475,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642545672","type":"print"},{"value":"9783642545689","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_16","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"250-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Remote Biometrics for Robust Persistent Authentication"],"prefix":"10.1007","author":[{"given":"Mads I.","family":"Ingwar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian D.","family":"Jensen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"16_CR1","unstructured":"Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Computer Vision and Pattern Recognition (2001)"},{"key":"16_CR2","unstructured":"Jones, M., Viola, P.: Robust real-time object detection. In: Workshop on Statistical and Computational Theories of Vision (2001)"},{"key":"16_CR3","first-page":"1","volume":"1","author":"M Weiser","year":"1996","unstructured":"Weiser, M., Brown, J.: Designing calm technology. PowerGrid J. 1, 1\u20135 (1996)","journal-title":"PowerGrid J."},{"issue":"3","key":"16_CR4","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st century. Scientific American 265(3), 66\u201375 (1991)","journal-title":"Scientific American"},{"key":"16_CR5","unstructured":"Kirschmeyer, M., Hansen, M.S.: Persistent authentication in smart environments. IMM-THESIS: 2008\u201316, Technical University of Denmark (2008)"},{"key":"16_CR6","unstructured":"Ingwar, M.I., Jensen, C.D.: Towards secure intelligent buildings. In: Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES\u201911) (2011)"},{"key":"16_CR7","series-title":"IFIP AICT","first-page":"177","volume-title":"IFIPTM 2013","author":"CD Jensen","year":"2013","unstructured":"Jensen, C.D., Geneser, K., Willemoes-Wissing, I.C.: Sensor enhanced access control: extending traditional access control models with context-awareness. In: Fern\u00e1ndez-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IFIP AICT, vol. 401, pp. 177\u2013192. Springer, Heidelberg (2013)"},{"issue":"3","key":"16_CR8","first-page":"985","volume":"95","author":"S Cole","year":"2005","unstructured":"Cole, S.: More than Zero: accounting for error in latent fingerprint identification. J. Crim. Law Criminol. (1973-) 95(3), 985\u20131078 (2005)","journal-title":"J. Crim. Law Criminol. (1973-)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Ingwar, M.I., Ahmed, N., Jensen, C.D.: Error-rate-based fusion of biometric experts. In: PST2013 International Conference on Privacy, Security and Trust (PST) (2013)","DOI":"10.1109\/PST.2013.6596059"},{"key":"16_CR10","unstructured":"Fisher, R.: CAVIAR Test Case Scenarios (2004)"},{"issue":"3","key":"16_CR11","first-page":"13","volume":"2","author":"D Bhattacharyya","year":"2009","unstructured":"Bhattacharyya, D.: Biometric authentication: a review. Int. J. u-and e-Service 2(3), 13\u201328 (2009)","journal-title":"Int. J. u-and e-Service"},{"issue":"1","key":"16_CR12","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71\u201386 (1991)","journal-title":"J. Cogn. Neurosci."},{"issue":"2","key":"16_CR13","first-page":"179","volume":"7","author":"R Fisher","year":"1936","unstructured":"Fisher, R.: The use of multiple measurements in taxonomic problems. Ann. Hum. Genet. 7(2), 179\u2013188 (1936)","journal-title":"Ann. Hum. Genet."},{"issue":"7","key":"16_CR14","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"P Belhumeur","year":"1997","unstructured":"Belhumeur, P., Hespanha, J., Kriegman, D.: Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19(7), 711\u2013720 (1997)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"7","key":"16_CR15","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/34.598229","volume":"19","author":"Y Adini","year":"1997","unstructured":"Adini, Y., Moses, Y., Ullman, S.: Face recognition: the problem of compensating for changes in illumination direction. Pattern Anal. Mach. Intell. 19(7), 721\u2013732 (1997)","journal-title":"Pattern Anal. Mach. Intell."},{"issue":"9","key":"16_CR16","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/2.410146","volume":"28","author":"M Flickner","year":"1995","unstructured":"Flickner, M., Sawhney, H., Niblack, W.: Query by image and video content: the QBIC system. Computer 28(9), 23\u201332 (1995)","journal-title":"Computer"},{"issue":"3","key":"16_CR17","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1016\/j.patcog.2006.06.010","volume":"40","author":"P Kakumanu","year":"2007","unstructured":"Kakumanu, P., Makrogiannis, S., Bourbakis, N.: A survey of skin-color modeling and detection methods. Pattern Recogn. 40(3), 1106\u20131122 (2007)","journal-title":"Pattern Recogn."},{"issue":"12","key":"16_CR18","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021\u20132040 (2003)","journal-title":"Proc. IEEE"},{"key":"16_CR19","first-page":"246","volume":"2","author":"C Stauffer","year":"1999","unstructured":"Stauffer, C., Grimson, W.: Adaptive background mixture models for real-time tracking. Comput. Vis. Pattern Recogn. 2, 246\u2013252 (1999)","journal-title":"Comput. Vis. Pattern Recogn."},{"issue":"8","key":"16_CR20","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/34.868677","volume":"22","author":"C Stauffer","year":"2000","unstructured":"Stauffer, C., Grimson, W.: Learning patterns of activity using real-time tracking. IEEE Trans. Pattern Anal. Mach. Intell. 22(8), 747\u2013757 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1115\/1.3662552","volume":"82","author":"R Kalman","year":"1960","unstructured":"Kalman, R.: A new approach to linear filtering and prediction problems. J. Basic Eng. 82, 35\u201345 (1960)","journal-title":"J. Basic Eng."},{"key":"16_CR22","unstructured":"Welch, G., Bishop, G.: An introduction to the Kalman filter. Technical report, University of North Carolina (1995)"},{"key":"16_CR23","unstructured":"Farneback, G.: Fast and accurate motion estimation using orientation tensors and parametric motion models. In: Proceedings of 15th International Conference on Pattern Recognition (2000)"},{"key":"16_CR24","unstructured":"Farneback, G.: Very high accuracy velocity estimation using orientation tensors, parametric motion, and simultaneous segmentation of the motion field. In: Proceedings of the Eighth International Conference on Computer Vision 2001, ICCV 2001 (2001)"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Corner, M., Noble, B.: Zero-interaction authentication. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 1\u201311 (2002)","DOI":"10.1145\/570645.570647"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Noble, B.D., Corner, M.D.: The case for transient authentication. In: Proceedings of the 10th Workshop on ACM SIGOPS European Workshop: Beyond the PC - EW10 , p. 24 (2002)","DOI":"10.1145\/1133373.1133377"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Corner, M., Noble, B.: Protecting applications with transient authentication. In: International Conference on Mobile Systems, Applications, and Services (MobiSys) (2003)","DOI":"10.1145\/1066116.1066117"},{"key":"16_CR28","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-39653-6_8","volume-title":"UbiComp 2003","author":"JE Bardram","year":"2003","unstructured":"Bardram, J.E., Kj\u00e6r, R.E., Pedersen, M.\u00d8.: Context-aware user authentication - supporting proximity-based login in pervasive computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 107\u2013123. Springer, Heidelberg (2003)"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Klosterman, A., Ganger, G.: Secure continuous biometric-enhanced authentication. Technical report, Parallel Data Laboratory (2000)","DOI":"10.21236\/ADA382238"},{"key":"16_CR30","unstructured":"Altinok, A., Turk, M.: Temporal integration for continuous multimodal biometrics. In: Proceedings of the Workshop on Multimodal User Authentication (1) (2003)"},{"issue":"4","key":"16_CR31","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/TPAMI.2007.1010","volume":"29","author":"T Sim","year":"2007","unstructured":"Sim, T., Zhang, S.: Continuous verification using multimodal biometrics. Pattern Anal. Mach. Intell. 29(4), 562\u2013570 (2007)","journal-title":"Pattern Anal. Mach. Intell."},{"key":"16_CR32","unstructured":"Muncaster, J., Turk, M.: Continuous multimodal authentication using dynamic Bayesian networks. In: Proceedings of the 2nd Workshop of Multimodal User Authentication (2006)"},{"issue":"4","key":"16_CR33","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TIFS.2010.2075927","volume":"5","author":"K Niinuma","year":"2010","unstructured":"Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Trans. Inf. Forensics Secur. 5(4), 771\u2013780 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:17:03Z","timestamp":1676377023000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}