{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:21:31Z","timestamp":1725888091696},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_15","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:14:39Z","timestamp":1494645279000},"page":"85-90","source":"Crossref","is-referenced-by-count":1,"title":["Thumb Biometric Using Scale Invariant Feature Transform"],"prefix":"10.1007","author":[{"given":"Naeun","family":"Lim","sequence":"first","affiliation":[]},{"given":"Daejune","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Kun Ha","family":"Suh","sequence":"additional","affiliation":[]},{"given":"Eui Chul","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"15_CR1","first-page":"20","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14, 20\u201344 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"15_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2008\/657081","volume":"2008","author":"A.K Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagr, A.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008, 1\u201317 (2008)","journal-title":"EURASIP J. Adv. Sig. Process."},{"key":"15_CR3","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14, 21\u201330 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"15_CR4","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1002\/ima.20193","volume":"19","author":"EC Lee","year":"2009","unstructured":"Lee, E.C., Lee, H.C., Park, K.R.: Thumb vein recognition using minutia based alignment and local binary pattern based feature extraction. Int. J. Imaging Syst. Technol. 19, 179\u2013186 (2009)","journal-title":"Int. J. Imaging Syst. Technol."},{"key":"15_CR5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.15207\/JKCS.2015.6.3.097","volume":"6","author":"SH Lee","year":"2015","unstructured":"Lee, S.H., Lee, D.W.: FinTech-conversions of finance industry based on ICT. Korea Convergence Soc. 6, 97\u2013102 (2015)","journal-title":"Korea Convergence Soc."},{"key":"15_CR6","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miler, E.: Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical report 1, 07\u201349, University of Massachusetts, Amherst (2007)"},{"key":"15_CR7","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1016\/j.patcog.2007.07.012","volume":"41","author":"L Wang","year":"2008","unstructured":"Wang, L., Leedham, G., Cho, D.S.Y.: Minutiae feature analysis for infrared hand vein pattern biometrics. Pattern Recogn. 41, 920\u2013929 (2008)","journal-title":"Pattern Recogn."},{"key":"15_CR8","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1109\/TIP.2010.2042645","volume":"19","author":"X Tan","year":"2010","unstructured":"Tan, X., Triggs, W.: Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans. Image Process. 19, 1635\u20131650 (2010)","journal-title":"IEEE Trans. Image Process."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Bicego, M., Lagorio, A., Grosoo, E., Tistarelli, M.: On the use of SIFT features for face authentication. 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW 2006). IEEE (2006)","DOI":"10.1109\/CVPRW.2006.149"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:18:08Z","timestamp":1494645488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_15","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}