{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:17:23Z","timestamp":1761581843275,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T00:00:00Z","timestamp":1548115200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s11042-019-7156-9","type":"journal-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T06:26:28Z","timestamp":1560493588000},"page":"14045-14065","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["F-FID: fast fuzzy-based iris de-noising for mobile security applications"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4042-3000","authenticated-orcid":false,"given":"Silvio","family":"Barra","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Bisogni","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Nappi","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Ricciardi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,22]]},"reference":[{"key":"7156_CR1","doi-asserted-by":"publisher","unstructured":"Abate A, Barra S, Gallo L, Narducci F (2016) Skipsom: skewness kurtosis of iris pixels in self organizing maps for iris recognition on mobile devices. In: 2016 23rd international conference on pattern recognition (ICPR), pp 155\u2013159. \n                    https:\/\/doi.org\/10.1109\/ICPR.2016.7899625","DOI":"10.1109\/ICPR.2016.7899625"},{"key":"7156_CR2","doi-asserted-by":"crossref","unstructured":"Abate AF, Barra S, D\u2019Aniello F, Narducci F (2017) Two-tier image features clustering for iris recognition on mobile. In: Petrosino A, Loia V, Pedrycz W (eds) Fuzzy logic and soft computing applications. Springer International Publishing, Cham, pp 260\u2013269","DOI":"10.1007\/978-3-319-52962-2_23"},{"key":"7156_CR3","doi-asserted-by":"crossref","unstructured":"Abate AF, Barra S, Fenu G, Nappi M, Narducci F (2017) A lightweight mamdani fuzzy controller for noise removal on iris images. In: Battiato S, Gallo G, Schettini R, Stanco F (eds) Image analysis and processing - ICIAP 2017. Springer International Publishing, Cham, pp 93\u2013103","DOI":"10.1007\/978-3-319-68548-9_9"},{"key":"7156_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.patrec.2017.02.002","volume":"91","author":"AF Abate","year":"2017","unstructured":"Abate AF, Barra S, Gallo L, Narducci F (2017) Kurtosis and skewness at pixel level as input for SOM networks to iris recognition on mobile devices. Pattern Recogn Lett 91:37\u201343. \n                    https:\/\/doi.org\/10.1016\/j.patrec.2017.02.002","journal-title":"Pattern Recogn Lett"},{"issue":"99","key":"7156_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSMC.2017.2698258","volume":"PP","author":"AF Abate","year":"2017","unstructured":"Abate AF, Nappi M, Ricciardi S (2017) I-am: implicitly authenticate me person authentication on mobile devices through ear shape and arm gesture. IEEE Trans Syst Man Cybern Syst Hum PP(99):1\u201313. \n                    https:\/\/doi.org\/10.1109\/TSMC.2017.2698258","journal-title":"IEEE Trans Syst Man Cybern Syst Hum"},{"key":"7156_CR6","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-030-01689-0_21","volume":"11161 LNCS","author":"A Abate","year":"2018","unstructured":"Abate A, Barra S, Casanova A, Fenu G, Marras M (2018) Iris quality assessment: a statistical approach for biometric security applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11161 LNCS:270\u2013278. \n                    https:\/\/doi.org\/10.1007\/978-3-030-01689-0_21","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"7156_CR7","doi-asserted-by":"publisher","unstructured":"Barpanda SS, Sa PK, Marques O, Majhi B, Bakshi S (2017) Iris recognition with tunable filter bank based feature. Multimed Tools Appl. \n                    https:\/\/doi.org\/10.1007\/s11042-017-4668-z","DOI":"10.1007\/s11042-017-4668-z"},{"key":"7156_CR8","doi-asserted-by":"crossref","unstructured":"Barra S, De Marsico M, Cantoni V, Riccio D (2014) Using mutual information for multi-anchor tracking of human beings. In: Cantoni V, Dimov D, Tistarelli M (eds) Biometric authentication. Springer International Publishing, Cham, pp 28\u201339","DOI":"10.1007\/978-3-319-13386-7_3"},{"key":"7156_CR9","doi-asserted-by":"publisher","unstructured":"Barra S, De Marsico M, Nappi M, Riccio D (2014) Complex numbers as a compact way to represent scores and their reliability in recognition by multi-biometric fusion. Int J Pattern Recognit Artif Intell 28(7). \n                    https:\/\/doi.org\/10.1142\/S0218001414600039","DOI":"10.1142\/S0218001414600039"},{"key":"7156_CR10","doi-asserted-by":"publisher","unstructured":"Barra S, Casanova A, Narducci F, Ricciardi S (2015) Ubiquitous iris recognition by means of mobile devices. Pattern Recogn Lett 57:66\u201373. Mobile Iris {CHallenge} Evaluation part I (MICHE I). \n                    https:\/\/doi.org\/10.1016\/j.patrec.2014.10.011\n                    \n                  .","DOI":"10.1016\/j.patrec.2014.10.011"},{"key":"7156_CR11","doi-asserted-by":"crossref","unstructured":"Bowyer KW, Hollingsworth KP, Flynn PJ (2013) A survey of iris biometrics research: 2008\u20132010. In: Handbook of iris recognition. Springer, pp 15\u201354","DOI":"10.1007\/978-1-4471-4402-1_2"},{"key":"7156_CR12","unstructured":"Chaskar U, Sutaone M, Shah N, et al. (2012) Iris image quality assessment for biometric application"},{"key":"7156_CR13","unstructured":"Chen LC, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2014) Semantic image segmentation with deep convolutional nets and fully connected crfs. arXiv:\n                    1412.7062"},{"key":"7156_CR14","doi-asserted-by":"publisher","unstructured":"Clarke N, Furnell S (2007) Advanced user authentication for mobile devices. Comput Secur 26(2):109\u2013119. \n                    https:\/\/doi.org\/10.1016\/j.cose.2006.08.008\n                    \n                  . \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404806001428","DOI":"10.1016\/j.cose.2006.08.008"},{"issue":"11","key":"7156_CR15","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"JG Daugman","year":"1993","unstructured":"Daugman JG (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15(11):1148\u20131161","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"7156_CR16","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1023\/A:1012365806338","volume":"45","author":"J Daugman","year":"2001","unstructured":"Daugman J (2001) Statistical richness of visual phase information: update on recognizing persons by iris patterns. Int J Comput Vis 45(1):25\u201338. \n                    https:\/\/doi.org\/10.1023\/A:1012365806338\n                    \n                  . Cited By 286","journal-title":"Int J Comput Vis"},{"key":"7156_CR17","doi-asserted-by":"publisher","unstructured":"Daugman J (2009) How iris recognition works. \n                    https:\/\/doi.org\/10.1016\/B978-0-12-374457-9.00025-1\n                    \n                  . Cited By 3","DOI":"10.1016\/B978-0-12-374457-9.00025-1"},{"key":"7156_CR18","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.patrec.2015.02.009","volume":"57","author":"M Marsico De","year":"2015","unstructured":"De Marsico M, Nappi M, Riccio D, Wechsler H (2015) Mobile iris challenge evaluation (miche)-i, biometric iris dataset and protocols. Pattern Recogn Lett 57:17\u201323","journal-title":"Pattern Recogn Lett"},{"key":"7156_CR19","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.patcog.2017.08.028","volume":"74","author":"M Marsico De","year":"2018","unstructured":"De Marsico M, Nappi M, Narducci F, Proen\u00e7a H (2018) Insights into the results of miche i - mobile iris challenge evaluation. Pattern Recogn 74:286\u2013304. \n                    https:\/\/doi.org\/10.1016\/j.patcog.2017.08.028","journal-title":"Pattern Recogn"},{"issue":"1","key":"7156_CR20","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/TSMCB.2010.2045371","volume":"41","author":"Y Du","year":"2011","unstructured":"Du Y, Arslanturk E, Zhou Z, Belcher C (2011) Video-based noncooperative iris image segmentation. IEEE Trans Syst Man Cybern B Cybern 41 (1):64\u201374. \n                    https:\/\/doi.org\/10.1109\/TSMCB.2010.2045371","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"issue":"2","key":"7156_CR21","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3844\/jcssp.2010.217.223","volume":"6","author":"A El-Zaart","year":"2010","unstructured":"El-Zaart A (2010) Skin images segmentation. J Comput Sci 6(2):217\u2013223","journal-title":"J Comput Sci"},{"key":"7156_CR22","doi-asserted-by":"publisher","unstructured":"Elrefaei LA, Hamid DH, Bayazed AA, Bushnak SS, aasher SY (2017) Developing iris recognition system for smartphone security. Multimed Tools Appl. \n                    https:\/\/doi.org\/10.1007\/s11042-017-5049-3","DOI":"10.1007\/s11042-017-5049-3"},{"key":"7156_CR23","doi-asserted-by":"publisher","unstructured":"Haindl M, Krupi\u010dka M (2015) Unsupervised detection of non-iris occlusions. Pattern Recogn Lett 57:60\u201365. \n                    https:\/\/doi.org\/10.1016\/j.patrec.2015.02.012\n                    \n                  . Mobile Iris {CHallenge} Evaluation part I (MICHE I)","DOI":"10.1016\/j.patrec.2015.02.012"},{"key":"7156_CR24","doi-asserted-by":"publisher","unstructured":"Hofbauer H, Alonso-Fernandez F, Wild P, Bigun J, Uhl A (2014) A ground truth for iris segmentation. In: 2014 22nd international conference on pattern recognition, pp 527\u2013532. \n                    https:\/\/doi.org\/10.1109\/ICPR.2014.101","DOI":"10.1109\/ICPR.2014.101"},{"key":"7156_CR25","doi-asserted-by":"publisher","unstructured":"Jarjes AA, Wang K, Mohammed GJ (2011) Improved greedy snake model for detecting accurate pupil contour. In: 2011 3rd international conference on advanced computer control, pp 515\u2013519. \n                    https:\/\/doi.org\/10.1109\/ICACC.2011.6016466","DOI":"10.1109\/ICACC.2011.6016466"},{"key":"7156_CR26","doi-asserted-by":"publisher","unstructured":"Jayalakshmi S, Sundaresan M (2013) A survey on iris segmentation methods. In: 2013 international conference on pattern recognition, informatics and mobile engineering, pp 418\u2013423. \n                    https:\/\/doi.org\/10.1109\/ICPRIME.2013.6496513","DOI":"10.1109\/ICPRIME.2013.6496513"},{"issue":"2","key":"7156_CR27","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.imavis.2009.04.001","volume":"28","author":"DS Jeong","year":"2010","unstructured":"Jeong DS, Hwang JW, Kang BJ, Park KR, Won CS, Park DK, Kim J (2010) A new iris segmentation method for non-ideal iris images. Image Vision Comput 28(2):254\u2013260. \n                    https:\/\/doi.org\/10.1016\/j.imavis.2009.04.001","journal-title":"Image Vision Comput"},{"issue":"8","key":"7156_CR28","first-page":"56","volume":"2","author":"V Kumar","year":"2012","unstructured":"Kumar V, Gupta P (2012) Importance of statistical measures in digital image processing. Int J Emerg Technol Adv Eng 2(8):56\u201362","journal-title":"Int J Emerg Technol Adv Eng"},{"key":"7156_CR29","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-28457-1_8","volume-title":"Iris segmentation: state of the art and innovative methods","author":"RD Labati","year":"2012","unstructured":"Labati RD, Genovese A, Piuri V, Scotti F (2012) Iris segmentation: state of the art and innovative methods. Springer, Berlin, pp 151\u2013182. \n                    https:\/\/doi.org\/10.1007\/978-3-642-28457-1_8"},{"issue":"3-4","key":"7156_CR30","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/0165-1765(84)90126-5","volume":"15","author":"RI Lerman","year":"1984","unstructured":"Lerman RI, Yitzhaki S (1984) A note on the calculation and interpretation of the gini index. Econ Lett 15(3-4):363\u2013368","journal-title":"Econ Lett"},{"key":"7156_CR31","doi-asserted-by":"crossref","unstructured":"Liu Z, Li X, Luo P, Loy CC, Tang X (2015) Semantic image segmentation via deep parsing network. In: Proceedings of the IEEE international conference on computer vision, pp 1377\u20131385","DOI":"10.1109\/ICCV.2015.162"},{"key":"7156_CR32","doi-asserted-by":"crossref","unstructured":"Makinana S, Malumedzha T, Nelwamondo FV (2014) Iris image quality assessment based on quality parameters. In: Nguyen NT, Attachoo B, Trawi\u0144ski B, Somboonviwat K (eds) Intelligent information and database systems. Springer International Publishing, Cham, pp 571\u2013580","DOI":"10.1007\/978-3-319-05476-6_58"},{"issue":"1","key":"7156_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"EH Mamdani","year":"1975","unstructured":"Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man Mach Stud 7(1):1\u201313","journal-title":"Int J Man Mach Stud"},{"issue":"9","key":"7156_CR34","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1016\/0031-3203(93)90135-J","volume":"26","author":"NR Pal","year":"1993","unstructured":"Pal NR, Pal SK (1993) A review on image segmentation techniques. Pattern Recogn 26(9):1277\u20131294","journal-title":"Pattern Recogn"},{"issue":"8","key":"7156_CR35","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/TPAMI.2009.140","volume":"32","author":"H Proenca","year":"2010","unstructured":"Proenca H (2010) Iris recognition: on the segmentation of degraded images acquired in the visible wavelength. IEEE Trans Pattern Anal Mach Intell 32(8):1502\u20131516. \n                    https:\/\/doi.org\/10.1109\/TPAMI.2009.140","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"8","key":"7156_CR36","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1109\/TPAMI.2009.66","volume":"32","author":"H Proenca","year":"2010","unstructured":"Proenca H, Filipe S, Santos R, Oliveira J, Alexandre LA (2010) The ubiris. v2: a database of visible wavelength iris images captured on-the-move and at-a-distance. IEEE Trans Pattern Anal Mach Intell 32(8):1529\u20131535","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"7156_CR37","first-page":"37","volume":"6","author":"RM Rad","year":"2013","unstructured":"Rad RM, Attar A, Atani RE (2013) A comprehensive layer based encryption method for visual data. Int J Signal Process Image Process Pattern Recogn 6(1):37\u201348","journal-title":"Int J Signal Process Image Process Pattern Recogn"},{"key":"7156_CR38","doi-asserted-by":"publisher","unstructured":"Ross A, Shah S (2006) Segmenting non-ideal irises using geodesic active contours. \n                    https:\/\/doi.org\/10.1109\/BCC.2006.4341625\n                    \n                  . Cited By 14","DOI":"10.1109\/BCC.2006.4341625"},{"issue":"1","key":"7156_CR39","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/0022-0531(72)90167-6","volume":"4","author":"E Sheshinski","year":"1972","unstructured":"Sheshinski E, et al. (1972) Relation between a social welfare function and the gini index of income inequality. J Econ Theory 4(1):98\u2013100","journal-title":"J Econ Theory"},{"key":"7156_CR40","unstructured":"Tian QC, Pan Q, Cheng YM, Gao QX (2004) Fast algorithm and application of hough transform in iris segmentation: 3977\u20133980. Cited By 41"},{"issue":"4","key":"7156_CR41","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1109\/TSMCB.2008.922059","volume":"38","author":"M Vatsa","year":"2008","unstructured":"Vatsa M, Singh R, Noore A (2008) Improving iris recognition performance using segmentation, quality enhancement, match score fusion, and indexing. IEEE Trans Syst Man Cybern B Cybern 38(4):1021\u20131035. \n                    https:\/\/doi.org\/10.1109\/TSMCB.2008.922059","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"7156_CR42","doi-asserted-by":"publisher","unstructured":"Wan Y, Clutter ML, Mei B, Siry JP (2015) Assessing the role of U.S. timberland assets in a mixed portfolio under the mean-conditional value at risk framework. Forest Policy Econ 50:118\u2013126. \n                    https:\/\/doi.org\/10.1016\/j.forpol.2014.06.002","DOI":"10.1016\/j.forpol.2014.06.002"},{"issue":"3","key":"7156_CR43","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1007\/s11042-012-1278-7","volume":"71","author":"N Wang","year":"2014","unstructured":"Wang N, Li Q, Abd El-Latif AA, Zhang T, Niu X (2014) Toward accurate localization and high recognition performance for noisy iris images. Multimed Tools Appl 71(3):1411\u20131430. \n                    https:\/\/doi.org\/10.1007\/s11042-012-1278-7","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7156-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7156-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7156-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T20:15:29Z","timestamp":1579637729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7156-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,22]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["7156"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7156-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,1,22]]},"assertion":[{"value":"1 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}