{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:43:06Z","timestamp":1743147786889,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557460"},{"type":"electronic","value":"9789811557477"}],"license":[{"start":{"date-parts":[[2020,7,23]],"date-time":"2020-07-23T00:00:00Z","timestamp":1595462400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,23]],"date-time":"2020-07-23T00:00:00Z","timestamp":1595462400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5747-7_5","type":"book-chapter","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T18:03:59Z","timestamp":1595441039000},"page":"67-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fingerprint and Keystroke Dynamics Fusion in Multimodal Biometrics System"],"prefix":"10.1007","author":[{"given":"Maciej","family":"Szymkowski","sequence":"first","affiliation":[]},{"given":"Patryk","family":"Milewski","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Saeed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,23]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Saeed, K., Nagashima, T.: Biometrics and Kansei Engineering. Springer (2012)","DOI":"10.1007\/978-1-4614-5608-7"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Cho, T-H.: Pattern classification methods for keystroke analysis. In: SICE-ICASE International Joint Conference 2006, Proceedings, Bexco, Busan, Korea, 18\u201321 Oct 2006","DOI":"10.1109\/SICE.2006.314667"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Pentel, A.: High precision handedness detection based on short input keystroke dynamics. In: IEEE 2017 8th International Conference on Information, Intelligence, Systems and Applications, IEEE Proceedings, Larnaca, Cyprus, 27\u201330 Aug 2017","DOI":"10.1109\/IISA.2017.8316380"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Meszaros, A., Banko, Z., Czuni, L.: Strengthening passwords by keystroke dynamics. In: 2007 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IEEE Proceedings, Dortmund, Germany, 6\u20138 Aug 2007","DOI":"10.1109\/IDAACS.2007.4488486"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Giroux, S., Wachowiak-Smolikova, R., Wachowiak, M.: Keystroke-based authentication by key press intervals as a complementary behavioral biometric. In: 2009 IEEE International Conference on Systems, Man and Cybernetics, IEEE Proceedings, San Antonio, USA, Oct 2009","DOI":"10.1109\/ICSMC.2009.5346319"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Davoudi, H., Kabir, E.: A new distance measure for free text keystroke authentication. In: 2009 IEEE 14th International CSI Computer Conference, IEEE Proceedings, Teheran, Iran, 1\u20132 July 2009","DOI":"10.1109\/CSICC.2009.5349640"},{"issue":"6","key":"5_CR7","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/TSMCC.2008.2001696","volume":"38","author":"D Hosseinzadeh","year":"2008","unstructured":"Hosseinzadeh, D., Krishnan, S.: Gaussian mixture modeling of keystroke patterns for biometric applications. IEEE Trans. Syst. Man Cybern. 38(6), 816\u2013826 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Kaneko, Y., Kinpara, Y., Shiomi, Y.: A Hamming distance-like filtering in keystroke dynamics. In: 2011 IEEE 9th International Conference on Privacy, Security and Trust, IEEE Proceedings, Montreal, Canada, 19\u201321 July 2011","DOI":"10.1109\/PST.2011.5971969"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Vinoth Kumar, G., Govinth Raj, S., Prasanth, K., Sarathi, S.: Fingerprint based authentication system with keystroke dynamics for realistic user. In: IEEE 2nd International Conference on Current Trends in Engineering and Technology, Proceedings, Coimbatore, India, pp. 206\u2013209, 8 July 2014","DOI":"10.1109\/ICCTET.2014.6966288"},{"key":"5_CR10","unstructured":"Sagayam, K., Ponraj, D., Winston, J., Yaspy J. C., Esther Jeba D., Clara, A.: Authentication of biometric system using fingerprint recognition with euclidean distance and neural network classifier. Int. J. Innov. Technol. Explor. Eng. 8(4), 766\u2013771 (2019)"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.inffus.2018.10.001","volume":"50","author":"R Krish","year":"2019","unstructured":"Krish, R., Fierrez, J., Ramos, D., Alonso-Fernandez, F., Bigun, J.: Improving automated latent fingerprint identification using extended minutiae types. Inf. Fusion 50, 9\u201319 (2019)","journal-title":"Inf. Fusion"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Yu, J., Hu, A., Zhou, F., Xing, Y., Yu, Y., Li, G., Peng, L.: Radio frequency fingerprint identification based on denoising autoencoders. \nhttp:\/\/arxiv.org\/abs\/1907.08809v1\n\n [eess.SP] 20 Jul 2019","DOI":"10.1109\/WiMOB.2019.8923325"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Uliyan, D., Sadeghi, S., Jalab, H.: Anti-spoofing method for fingerprint recognition using patch based deep learning machine. Eng. Sci. Technol. Int. J. \nhttps:\/\/doi.org\/10.1016\/j.jestch.2019.06.005\n\n. July (2019)","DOI":"10.1016\/j.jestch.2019.06.005"},{"issue":"9","key":"5_CR14","doi-asserted-by":"publisher","first-page":"4789","DOI":"10.1007\/s00521-018-3609-8","volume":"31","author":"F Zeng","year":"2019","unstructured":"Zeng, F., Hu, S., Xiao, K.: Research on partial fingerprint recognition algorithm based on deep learning. Neural Comput. Appl. 31(9), 4789\u20134798 (2019)","journal-title":"Neural Comput. Appl."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Singh, M., Girdhar, A.: Fingerprint enhancement using wavelet transformation and differential support vector machine. In: IEEE 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 11\u201312 July 2018","DOI":"10.1109\/ICIRCA.2018.8597376"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.image.2017.08.010","volume":"60","author":"J Li","year":"2018","unstructured":"Li, J., Feng, J., Jay Kuo, C.-C.: Deep convolutional neural network for latent fingerprint enhancement. Sig. Process. Image Commun. 60, 52\u201363 (2018)","journal-title":"Sig. Process. Image Commun."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Panasiuk, P., Szymkowski, M., D\u0105browski, M., Saeed, K.: A multimodal biometric user identification system based on keystroke dynamics and mouse movements. In: Saeed, K., Homenda, W. (eds.) 15th IFIP International Conference on Computer Information Systems and Industrial Management, CISIM 2016, Vilnius, Lithuania, Springer, Sep 2016. Lecture Notes in Computer Science, LNCS-9842, pp. 672\u2013681","DOI":"10.1007\/978-3-319-45378-1_58"},{"key":"5_CR18","unstructured":"Panasiuk, P., Rybnik, M., Saeed, K.: Authentication with dynamics using fixed text keystroke. In: 2009 IEEE International Conference on Biometrics and Kansei Engineering, ICBAKE 2009, Proceedings, Cieszyn, pp. 70\u201375, 25\u201328 June 2009"},{"issue":"3","key":"5_CR19","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/0165-0114(86)90004-7","volume":"18","author":"JC Bezdek","year":"1986","unstructured":"Bezdek, J.C., Chuah, S.K., Leep, D.: Generalized k-Nearest neighbor rules. Fuzzy Sets Syst. 18(3), 237\u2013256 (1986)","journal-title":"Fuzzy Sets Syst."},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1016\/j.phpro.2012.03.206","volume":"25","author":"Y Li","year":"2012","unstructured":"Li, Y., Wu, H.: A clustering method based on k-means algorithm. Phys. Proced. 25, 1104\u20131109 (2012)","journal-title":"Phys. Proced."},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.procs.2017.08.021","volume":"112","author":"A Topirceanu","year":"2017","unstructured":"Topirceanu, A., Grosseck, G.: Decision tree learning used for the classification of student archetypes in online courses. Proced. Comput. Sci. 112, 51\u201360 (2017)","journal-title":"Proced. Comput. Sci."},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"2160","DOI":"10.1016\/j.proeng.2011.08.404","volume":"15","author":"W Zhang","year":"2011","unstructured":"Zhang, W., Gao, F.: An improvement to naive bayes for text classification. Proced. Eng. 15, 2160\u20132164 (2011)","journal-title":"Proced. Eng."},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1016\/j.phpro.2012.03.193","volume":"25","author":"W Xiaohu","year":"2012","unstructured":"Xiaohu, W., Lele, W., Nianfeng, L.: An application of decision tree based on ID3. Phys. Proced. 25, 1017\u20131021 (2012)","journal-title":"Phys. Proced."},{"issue":"2","key":"5_CR24","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1080\/08839514.2018.1447479","volume":"32","author":"A Cherfi","year":"2018","unstructured":"Cherfi, A., Nouira, K., Ferchichi, A.: Very fast C4.5 decision tree algorithm. Appl.Artif. Intell. 32(2), 119\u2013137 (2018)","journal-title":"Appl.Artif. Intell."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Szymkowski, M., Saeed, K.: A novel approach to fingerprint identification using method of sectoralization. In: ICBAKE 2017\u2014International Conference on Biometrics and Kansei Engineering, IEEE Proceedings, Kyoto, Japan, 15\u201317 Sept 2017","DOI":"10.1109\/ICBAKE.2017.8090613"},{"issue":"3","key":"5_CR26","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1134\/S1054661816030020","volume":"26","author":"O Samorodova","year":"2016","unstructured":"Samorodova, O., Samorodov, A.: Fast implementation of the Niblack binarization algorithm for microscope image segmentation. Pattern Recogn. Image Analy. 26(3), 548\u2013551 (2016)","journal-title":"Pattern Recogn. Image Analy."},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Qu, Z., Zhang, L.: Research on image segmentation based on the improved Otsu algorithm (2010). \nhttps:\/\/doi.org\/10.1109\/IHMSC.2010.157","DOI":"10.1109\/IHMSC.2010.157"},{"key":"5_CR28","unstructured":"Eyupoglu, C.: Implementation of Bernsen\u2019s locally adaptive binarization method for gray scale images. In: International Science and Technology Conference, Vienna, Austria, pp. 621\u2013625, 13\u201315 July 2016"},{"issue":"2","key":"5_CR29","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1515\/amcs-2016-0031","volume":"26","author":"M Tab\u0119dzki","year":"2016","unstructured":"Tab\u0119dzki, M., Saeed, K., Szczepa\u0144ski, A.: A modified K3M thinning algorithm. Int. J. Appl. Math. Comput. Sci. 26(2), 439\u2013450 (2016)","journal-title":"Int. J. Appl. Math. Comput. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5747-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T18:05:52Z","timestamp":1595441152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5747-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,23]]},"ISBN":["9789811557460","9789811557477"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5747-7_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,7,23]]},"assertion":[{"value":"23 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}