{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:16:35Z","timestamp":1738131395815,"version":"3.33.0"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s11623-008-0033-8","type":"journal-article","created":{"date-parts":[[2008,3,11]],"date-time":"2008-03-11T09:04:13Z","timestamp":1205226253000},"page":"204-214","source":"Crossref","is-referenced-by-count":1,"title":["Multibiometrics for face recognition"],"prefix":"10.1007","volume":"32","author":[{"given":"Raymond","family":"Veldhuis","sequence":"first","affiliation":[]},{"given":"Farzin","family":"Deravi","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"EU FP6 Project. 3d face. http:\/\/www.3dface.org\/ ."},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Q. Tao and R.N.J. Veldhuis. Optimal decision fusion for a face verification system. In Proceedings ICB 2007, pages 958\u2013967, Seoul, August 2007.","DOI":"10.1007\/978-3-540-74549-5_100"},{"key":"33_CR3","unstructured":"Q. Tao, R. van Rootseler, R. Veldhuis, S. Gehlen, and F. Weber. Optimal decision fusion and its application on 3d face recognition. In BIOSIG 2007: Biometrics and Electronic Signatures, pages 15\u201324, Darmstadt, Germany, July 2007."},{"key":"33_CR4","unstructured":"A. Ross, K. Nandakumar, and A. Jain. Handbook of Multibiometrics, 1st Edition. Springer, 2006."},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"B. Ulery, A. Hicklin, C. Watson, W. Fellner, and P. Hallinan. NISTIR 7346: Studies of biometric fusion. NIST internal report, National Institute of Standards and Technology, 2006.","DOI":"10.6028\/NIST.IR.7346"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"A. Ross and R. Govindarajan. Feature level fusion using hand and face biometrics. In Proc. SPIE Conference on Biometric Technology for Human Identification, Orlando, USA, 2005.","DOI":"10.1117\/12.606093"},{"issue":"12","key":"33_CR7","doi-asserted-by":"crossref","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A.K. Jain","year":"2005","unstructured":"A.K. Jain, K. Nandakumar, and A. Ross. Score normalization in multimodal biometric systems. Pattern Recognition, 38(12):2270\u20132285, 2005.","journal-title":"Pattern Recognition"},{"issue":"6","key":"33_CR8","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1109\/3468.798073","volume":"29","author":"V. Chatzis","year":"1999","unstructured":"V. Chatzis, A. G. Bors, and I. Pitas. Multimodal decision-level fusion for person authentication. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 29(6):674\u2013681, 1999.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"M. H\u00fcsken, M. Brauckmann, S. Gehlen, and C. Von der Malsburg. Strategies and benefits of fusion of 2D and 3D face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2005, volume 3, pages 174\u2013181, 2005.","DOI":"10.1109\/CVPR.2005.584"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Q. Tao and R. Veldhuis. Verifying a user in a personal face space. In 9th Int. Conf. Control, Automation, Robotics, and Vision, Singapore, 2006.","DOI":"10.1109\/ICARCV.2006.345479"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"P.J. Phillips, P.J. Flynn, T. Scruggs, K.W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek. Overview of the face recognition grand challenge. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2005, volume 1, pages 947\u2013954, 2005.","DOI":"10.1109\/CVPR.2005.268"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-008-0033-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-008-0033-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-008-0033-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T01:27:38Z","timestamp":1738114058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-008-0033-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["33"],"URL":"https:\/\/doi.org\/10.1007\/s11623-008-0033-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2008,3]]}}}