{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T17:26:31Z","timestamp":1649179591999},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,2,27]],"date-time":"2011-02-27T00:00:00Z","timestamp":1298764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s11623-011-0044-8","type":"journal-article","created":{"date-parts":[[2011,2,26]],"date-time":"2011-02-26T11:18:43Z","timestamp":1298719123000},"page":"169-173","source":"Crossref","is-referenced-by-count":0,"title":["Personenerkennung mittels 3D Handgeometrie"],"prefix":"10.1007","volume":"35","author":[{"given":"Martin","family":"Drahansk\u00fd","sequence":"first","affiliation":[]},{"given":"Radim","family":"Dvo\u0159\u00e1k","sequence":"additional","affiliation":[]},{"given":"Jan","family":"V\u00e1\u0148a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,27]]},"reference":[{"issue":"4","key":"44_CR1","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1561\/0100000004","volume":"1","author":"Imre Csisz\u00e1r","year":"2004","unstructured":"Csisz\u00e1r I. und Shields P.C.: Information Theory and Statistics: A Tutorial, Foundations and Trends\u2122 in Communications and Information Theory, 2004, Bd. 4.","journal-title":"Foundations and Trends\u2122 in Communications and Information Theory"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Malassiotis S., Aifanti N. und Strintzis M.G.: Personal authentication using 3-D finger geometry, IEEE Transactions on Information Forensics and Security, 2006, Bd. 1.","DOI":"10.1109\/TIFS.2005.863508"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Sidlauskas D. und Tamer S.: Hand Geometry Recognition, Handbook of Biometrics, Springer US, 2008, S. 91\u2013107.","DOI":"10.1007\/978-0-387-71041-9_5"},{"key":"44_CR4","unstructured":"Jain A.K., Ross A. und Pankanti S.: A Prototype Hand Geometry-based Verification System, Washington D.C., 1999."},{"key":"44_CR5","unstructured":"Zhang L., Curless B. und Seitz S.M.: Rapid Shape Acquisition Using Color Structured Light and Multi-pass Dynamic Programming, IEEE CS, 2002, The 1st IEEE International Symposium on 3D Data Processing, Visualization and Transmission. S. 24\u201336."},{"key":"44_CR6","first-page":"240","volume-title":"Lecture Notes in Computer Science","author":"S. Winkelbach","year":"2002","unstructured":"Winkelbach S. und Wahl F.M.: Shape From Single Stripe Pattern Illumination, Springer, 2002, Pattern Recognition, S. 240\u2013247."},{"key":"44_CR7","first-page":"7372","volume":"2","author":"H.B. Kehre","year":"2010","unstructured":"Kehre, H.B., et al.: Performance Comparison of Image Transforms for Palm Print Recognition with Fractional Coefficients of Transformed Palm Print Images, International Journal of Engineering and Science and Technology, Vol. 2, 2010, S. 7372\u20137379.","journal-title":"International Journal of Engineering and Science and Technology"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0044-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0044-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0044-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0044-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T17:59:37Z","timestamp":1560016777000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0044-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,27]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["44"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0044-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,27]]}}}