{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T21:51:10Z","timestamp":1774389070587,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2004,8,28]],"date-time":"2004-08-28T00:00:00Z","timestamp":1093651200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2004,12]]},"DOI":"10.1007\/s10044-004-0223-4","type":"journal-article","created":{"date-parts":[[2004,8,27]],"date-time":"2004-08-27T15:42:31Z","timestamp":1093621351000},"page":"255-268","source":"Crossref","is-referenced-by-count":40,"title":["PalmHashing: a novel approach for dual-factor authentication"],"prefix":"10.1007","volume":"7","author":[{"given":"Tee","family":"Connie","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrew","family":"Teoh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Goh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Ngo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2004,8,28]]},"reference":[{"key":"223_CR1","doi-asserted-by":"crossref","first-page":"2727","DOI":"10.1016\/S0031-3203(01)00247-3","volume":"35","author":"RM Bolle","year":"2002","unstructured":"Bolle RM, Connel JH, Ratha NK (2002) Biometric perils and patches. Pattern Recognit 35:2727\u20132738","journal-title":"Pattern Recognit"},{"key":"223_CR2","unstructured":"Daugman J (2000) Biometric decision landscapes. Technical report no. TR482, Cambridge University Computer Laboratory, Cambridge, UK, p 482"},{"issue":"1","key":"223_CR3","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman J (2004) How iris recognition works. IEEE Trans Circuits Syst Video Technol 14(1):21\u201330","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"223_CR4","unstructured":"Bolle RM, Pakanti S, Ratha NK (2000) Evaluating techniques for biometrics based authentication systems (FRR). In: Proceedings of the 15th IAPR international conference on pattern recognition, Barcelona, Spain, September 2000, vol 2, pp 835\u2013841"},{"key":"223_CR5","unstructured":"Luciano R (2002) Denial of access in biometrics-based authentication systems. In: Proceedings of the international conference on infrastructure security (InfraSec 2002), Bristol, UK, October 2002, pp 19\u201329"},{"key":"223_CR6","doi-asserted-by":"crossref","unstructured":"Ross A, Jain AK, Qian JZ (2001) Information fusion in biometrics. In: Proceedings of the 3rd international conference on audio- and video-based biometric person authentication (AVBPA 2001), Halmstad, Sweden, June 2001, pp 354\u2013359","DOI":"10.1007\/3-540-45344-X_52"},{"key":"223_CR7","doi-asserted-by":"crossref","unstructured":"Marcialis GL, Fabio R (2003) Experimental results on fusion of multiple fingerprint matchers. In: Proceedings of the 4th international conference on audio- and video-based biometric person authentication (AVBPA 2003), Guildford, Surrey, UK, June 2003, pp 814\u2013820","DOI":"10.1007\/3-540-44887-X_94"},{"key":"223_CR8","doi-asserted-by":"crossref","unstructured":"Wang Y, Tan T, Jain AK (2003) Combining face and iris biometrics for identity verification. In: Proceedings of the 4th international conference on audio- and video-based biometric person authentication (AVBPA 2003), Guildford, Surrey, UK, June 2003, pp 805\u2013813","DOI":"10.1007\/3-540-44887-X_93"},{"key":"223_CR9","doi-asserted-by":"crossref","unstructured":"Isobe Y, Seto Y, Kataoka M (2001) Development of personal authentication system using fingerprint with digital signature technologies. In: Proceedings of the 34th annual Hawaii international conference on system sciences (HICSS-34), Maui, Hawaii, January 2001, pp 4039\u20134047","DOI":"10.1109\/HICSS.2001.927272"},{"key":"223_CR10","doi-asserted-by":"crossref","unstructured":"Armington J, Purdy H, Paul K, Richard M (2002) Biometric authentication in infrastructure security. In: Proceedings of the international conference on infrastructure security (InfraSec 2002), Bristol, UK, October 2002, pp 1\u201318","DOI":"10.1007\/3-540-45831-X_1"},{"key":"223_CR11","unstructured":"Raul SR (2001) Including biometric authentication in a smart card operating system. In: Proceedings of the 3rd international conference on audio- and video-based biometric personal authentication (AVBPA 2001), Halmstad, Sweden, June 2001, pp 342\u2013347"},{"key":"223_CR12","unstructured":"Purdy H, John A (2003) A dual-factor authentication system featuring speaker verification and token technology. In: Proceedings of the 4th international conference on audio- and video-based biometric person authentication (AVBPA 2003), Guildford, Surrey, UK, June 2003, pp 814\u2013820"},{"issue":"9\u201310","key":"223_CR13","first-page":"1473","volume":"24","author":"G Lu","year":"2003","unstructured":"Lu G, David Z, Wang K (2003) Palmprint recognition using eigenpalms features. Pattern Recognit Lett 24(9\u201310):1473\u20131477","journal-title":"Pattern Recognit Lett"},{"issue":"15","key":"223_CR14","doi-asserted-by":"crossref","first-page":"2829","DOI":"10.1016\/S0167-8655(03)00141-7","volume":"24","author":"X Wu","year":"2003","unstructured":"Wu X, David Z, Wang K (2003) Fisherpalms based on palmprint recognition. Pattern Recognit Lett 24(15):2829\u20132838","journal-title":"Pattern Recognit Lett"},{"issue":"10","key":"223_CR15","doi-asserted-by":"crossref","first-page":"2339","DOI":"10.1016\/S0031-3203(03)00121-3","volume":"36","author":"WK Kong","year":"2003","unstructured":"Kong WK, Zhang D, Li W (2003) Palmprint feature extraction using 2-D Gabor filters. Pattern Recognit Lett 36(10):2339\u20132347","journal-title":"Pattern Recognit Lett"},{"key":"223_CR16","doi-asserted-by":"crossref","unstructured":"Funada J, Ohta N, Mizoguchi M, Temma T, Nakanishi K, Murai A, Sugiuchi T, Wakabayashi T, Yamada Y (1998) Feature extraction method for palmprint considering elimination of creases. In: Proceedings of the 14th international conference on pattern recognition (ICPR\u201998), Brisbane, Australia, August 1998, vol 2, pp 1849\u20131854","DOI":"10.1109\/ICPR.1998.712091"},{"key":"223_CR17","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1016\/S0031-3203(98)00117-4","volume":"32","author":"D Zhang","year":"1999","unstructured":"Zhang D, Shu W (1999) Two novel characteristics in palmprint verification: datum point invariance and line feature matching. Pattern Recognit 32:691\u2013702","journal-title":"Pattern Recognit"},{"key":"223_CR18","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/S0167-8655(01)00179-9","volume":"23","author":"N Duta","year":"2002","unstructured":"Duta N, Jain AK, Mardia KV (2002) Matching of palmprint. Pattern Recognit Lett 23:477\u2013485","journal-title":"Pattern Recognit Lett"},{"issue":"1","key":"223_CR19","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"MA Turk","year":"1991","unstructured":"Turk MA, Pentland AP (1991) Eigenfaces for recognition. J Cogn Neuro-Sci 3(1):71\u201386","journal-title":"J Cogn Neuro-Sci"},{"issue":"10","key":"223_CR20","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.1016\/S0031-3203(03)00044-X","volume":"36","author":"X Wang","year":"2003","unstructured":"Wang X, Kuldip KP (2003) Feature extraction and dimensionality reduction algorithms and their applications in vowel recognition. Pattern Recognit 36(10):2429\u20132439","journal-title":"Pattern Recognit"},{"key":"223_CR21","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes A, Oorschot PV, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca Raton, Florida"},{"key":"223_CR22","unstructured":"Tee C, Goh M, Teoh A, Ngo D (2003) An automated biometric palmprint verification system. In: Proceedings of the 3rd international symposium on information and communications technologies (ISICT 2003), Songkla, Thailand, September 2003, vol 2, pp 714\u2013719"},{"key":"223_CR23","unstructured":"Tee C, Teoh BJ, Goh M, Ngo CL (2003) Palmprint verification using PCA on wavelet subband. In: Proceedings of the 3rd international conference on advances in strategic technologies (ICAST 2003), Kuala Lumpur, Malaysia, August 2003, vol 2, pp 737\u2013742"},{"key":"223_CR24","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"PN Belhumeur","year":"1997","unstructured":"Belhumeur PN, Hespanha JP, Kriegman DJ (1997) Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans Pattern Anal Machine Intell 19:711\u2013720","journal-title":"IEEE Trans Pattern Anal Machine Intell"},{"key":"223_CR25","volume-title":"A wavelet tour of signal processing","author":"S Mallat","year":"1998","unstructured":"Mallat S (1998) A wavelet tour of signal processing. Academic Press, San Diego"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-004-0223-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-004-0223-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-004-0223-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T04:02:23Z","timestamp":1559102543000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-004-0223-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,28]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,12]]}},"alternative-id":["223"],"URL":"https:\/\/doi.org\/10.1007\/s10044-004-0223-4","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,8,28]]}}}