{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:27:59Z","timestamp":1775744879434,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s10044-011-0248-4","type":"journal-article","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T04:37:45Z","timestamp":1318826265000},"page":"73-85","source":"Crossref","is-referenced-by-count":59,"title":["Contactless palmprint and knuckle biometrics for mobile devices"],"prefix":"10.1007","volume":"15","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,10,18]]},"reference":[{"key":"248_CR1","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1016\/S0031-3203(01)00100-5","volume":"35","author":"J You","year":"2002","unstructured":"You J, Li W, Zhang D (2002) Hierarchical palmprint identification via multiple feature extraction. Pattern Recognit 35:847\u2013859","journal-title":"Pattern Recognit"},{"key":"248_CR2","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/S0031-3203(02)00037-7","volume":"36","author":"CC Han","year":"2003","unstructured":"Han CC, Cheng HL, Lin CL, Fan KC (2003) Personal authentication using palmprint features. Pattern Recognit 36:371\u2013381","journal-title":"Pattern Recognit"},{"key":"248_CR3","doi-asserted-by":"crossref","first-page":"1170","DOI":"10.1007\/978-3-540-74171-8_119","volume-title":"Advanced intelligent computing theories and applications. With aspects of theoretical and methodological issues, LNCS 4681","author":"M Chora\u015b","year":"2007","unstructured":"Chora\u015b M (2007) Intelligent computing for automated biometrics, criminal and forensic applications. In: Huang DS et\u00a0al (eds) Advanced intelligent computing theories and applications. With aspects of theoretical and methodological issues, LNCS 4681. Springer, Berlin, pp 1170\u20131181"},{"key":"248_CR4","doi-asserted-by":"crossref","unstructured":"Yue F, Zuo W, Wang K, Zhang D (2008) A performance evaluation of filter design and coding schemes for palmprint recognition. In Proc. of ICPR","DOI":"10.1109\/ICPR.2008.4761845"},{"key":"248_CR5","doi-asserted-by":"crossref","unstructured":"Zuo W, Lin Z, Guo Z, Zhang D (2010) The multiscale competitive code via sparse representation for palmprint verification. In: Proc. of CVPR, pp 2265\u20132272","DOI":"10.1109\/CVPR.2010.5539909"},{"key":"248_CR6","unstructured":"Sun Z, Tan T, Yang Y, Li SZ (2005) Ordinal palmprint representation for personal identification. In: Proc. of CVPR 2005, vol 1, pp 279\u2013284"},{"issue":"3","key":"248_CR7","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1109\/TIFS.2007.902039","volume":"2","author":"PH Hennings-Yeomans","year":"2007","unstructured":"Hennings-Yeomans PH, Kumar BVK, Savvides M (2007) Palmprint classification using multiple advanced correlation filters and palm-specific segmentation. IEEE Trans Info Forensics Secur 2(3):613\u2013622","journal-title":"IEEE Trans Info Forensics Secur"},{"key":"248_CR8","doi-asserted-by":"crossref","unstructured":"Kumar A, Zhang D (2007) Biometric recognition using entropy-based discretization. In: Proc. of IEEE international conference on acoustics, speech and signal processing, ICASSP, pp 125\u2013128","DOI":"10.1109\/ICASSP.2007.366188"},{"issue":"8","key":"248_CR9","doi-asserted-by":"crossref","first-page":"2454","DOI":"10.1109\/TIP.2006.875214","volume":"15","author":"A Kumar","year":"2006","unstructured":"Kumar A, Zhang D (2006) Personal recognition using shape and texture. IEEE Trans Image Process 15(8):2454\u20132461","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"248_CR10","first-page":"58","volume":"5","author":"R Kozik","year":"2010","unstructured":"Kozik R, Chora\u015b M (2010) Combined shape and texture information for palmprint biometrics. J Inf Assur Secur 5(1):58\u201363","journal-title":"J Inf Assur Secur"},{"key":"248_CR11","doi-asserted-by":"crossref","unstructured":"Fratric I, Ribaric S (2009) Real-time model-based hand localization for unsupervised palmar image acquisition. In: Tistarelli M, Nixon MS (eds) Advances in Biometrics, LNCS 5558. Springer, Berlin, pp 1280\u20131289","DOI":"10.1007\/978-3-642-01793-3_129"},{"key":"248_CR12","doi-asserted-by":"crossref","unstructured":"Methani C, Namboodiri AM (2009) Pose invariant palmprint recognition. In: Tistarelli M, Nixon MS (eds) Advances in biometrics, LNCS 5558. Springer, Berlin, pp 577\u2013586","DOI":"10.1007\/978-3-642-01793-3_59"},{"key":"248_CR13","unstructured":"Doublet J, Lepetit O, Revenu M (2007) Contact less palmprint authentication using circular Gabor filter and approximated string matching. In: Proc. of signal and image processing (SIP), Honolulu"},{"key":"248_CR14","unstructured":"Han Y, Tan T, Sun Z, Hao Y (2007) Embedded palmprint recognition system on mobile devices. In: Proc. of ICB, LNCS"},{"key":"248_CR15","doi-asserted-by":"crossref","unstructured":"Chora\u015b M (2007) Emerging methods of biometrics human identification. In: Proc. of ICICIC 2007. IEEE CS Press, Kummamoto","DOI":"10.1109\/ICICIC.2007.283"},{"key":"248_CR16","unstructured":"Morales A, Ferrer MA, Travieso CM, Alonso JB (2007) A knuckles texture verification method in a transformed domain. In: Proc. of 1st Spanish workshop on biometrics (on CD), Girona"},{"issue":"1","key":"248_CR17","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/TIFS.2008.2011089","volume":"4","author":"A Kumar","year":"2009","unstructured":"Kumar A, Ravikanth Ch (2009) Personal authentication using finger knuckle surface. IEEE Trans Inf Forensics Secur 4(1):98\u2013110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"248_CR18","doi-asserted-by":"crossref","unstructured":"Kumar A, Zhou Y (2009) Human Identification using knuckle codes. In: Proc. of BTAS","DOI":"10.1109\/BTAS.2009.5339021"},{"issue":"1","key":"248_CR19","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/TIFS.2008.2011089","volume":"4","author":"A Kumar","year":"2009","unstructured":"Kumar A, Ravikanth Ch (2009) Personal authentication using finger knuckle surface. IEEE Trans Inf Forensics Secur 4(1):98\u2013110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"248_CR20","doi-asserted-by":"crossref","unstructured":"Kumar A, Zhou Y (2009) Personal identification using finger knuckle orientation features. Electron Lett 45(20):1023\u20131025","DOI":"10.1049\/el.2009.1435"},{"issue":"7","key":"248_CR21","doi-asserted-by":"crossref","first-page":"2560","DOI":"10.1016\/j.patcog.2010.01.020","volume":"43","author":"L Zhang","year":"2010","unstructured":"Zhang L, Zhang L, Zhang D, Hailong Zhu H (2010) Online finger\u2013knuckle\u2013print verification for personal authentication. Pattern Recognit 43(7):2560\u20132571","journal-title":"Pattern Recognit"},{"key":"248_CR22","doi-asserted-by":"crossref","unstructured":"Zhang L, Zhang L, Zhang D (2009) Finger\u2013knuckle\u2013print verification based on band-limited phase-only correlation. In: Proceedings of the 13th international conference on computer analysis of images and patterns, pp 141\u2013148","DOI":"10.1007\/978-3-642-03767-2_17"},{"key":"248_CR23","doi-asserted-by":"crossref","unstructured":"Matas J, Galambos C, Kittler JV (2000) Robust detection of lines using the progressive probabilistic Hough transform. CVIU 78(1):119\u2013137","DOI":"10.1006\/cviu.1999.0831"},{"key":"248_CR24","doi-asserted-by":"crossref","unstructured":"Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: Proc. of European conference on computer vision, vol 1, pp 404\u2013417","DOI":"10.1007\/11744023_32"},{"key":"248_CR25","doi-asserted-by":"crossref","unstructured":"Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: Proc. of computer vision and pattern recognition, CVPR 2001, vol 1, pp 511\u2013518","DOI":"10.1109\/CVPR.2001.990517"},{"key":"248_CR26","unstructured":"Kumar A, Shen HC (2003) Recognition of Palmprint using Eigenpalms. In: Proc. of CVPRIP 2003, Cary (North Carolina)"},{"key":"248_CR27","doi-asserted-by":"crossref","unstructured":"Guo SY, Kong YG, Tang Q, Zhang F (2008) Probabilistic Hough transform for line detection utilizing surround suppression. In: Proc. of international conference on machine learning and cybernetics, 2008, vol 5, pp 2993\u20132998","DOI":"10.1109\/ICMLC.2008.4620920"},{"issue":"3","key":"248_CR28","first-page":"158","volume":"148","author":"C Galambos","year":"2001","unstructured":"Galambos C, Kittler J, Matas J (2001) Gradient based progressive probabilistic Hough transform, vision, image and signal processing. IEE Proc 148(3):158\u2013165","journal-title":"IEE Proc"},{"key":"248_CR29","unstructured":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2009\u20132014, White Paper, 2010"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s10044-011-0248-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T06:04:22Z","timestamp":1639202662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-011-0248-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,18]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["248"],"URL":"https:\/\/doi.org\/10.1007\/s10044-011-0248-4","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,18]]}}}