{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:13:07Z","timestamp":1746072787185,"version":"3.40.4"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,4,19]],"date-time":"2013-04-19T00:00:00Z","timestamp":1366329600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1007\/s11760-013-0469-7","type":"journal-article","created":{"date-parts":[[2013,4,18]],"date-time":"2013-04-18T07:27:43Z","timestamp":1366270063000},"page":"633-645","source":"Crossref","is-referenced-by-count":12,"title":["Authentication using Finger Knuckle Prints"],"prefix":"10.1007","volume":"7","author":[{"given":"Chetana","family":"Hegde","sequence":"first","affiliation":[]},{"given":"P. Deepa","family":"Shenoy","sequence":"additional","affiliation":[]},{"given":"K. R.","family":"Venugopal","sequence":"additional","affiliation":[]},{"given":"L. M.","family":"Patnaik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,19]]},"reference":[{"key":"469_CR1","doi-asserted-by":"crossref","unstructured":"Lingyu, W., Leedham, G.: Near and far infrared imaging for vein pattern biometrics. In: Proceedings of IEEE International Conference on Video and Signal Based Surveillance (AVSS 06), pp. 52\u201352 (2006)","DOI":"10.1109\/AVSS.2006.80"},{"key":"469_CR2","unstructured":"Jain, A. K., Ross, A. A.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. Special Issue Image Video Based Biometr. 14(1), 4\u201320 (2004)"},{"key":"469_CR3","doi-asserted-by":"crossref","unstructured":"Pankanti, S., Prabhakar, S., Jain, A. K.: On the individuality of fingerprints. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR-2001), pp. 805\u2013812 (2001)","DOI":"10.1109\/CVPR.2001.990563"},{"key":"469_CR4","doi-asserted-by":"crossref","unstructured":"Hegde, C., Prabhu, R., Sagar, D.S., Vishnu Prasad, K., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Authentication of damaged hand vein patterns by modularization. In: Proceedings of IEEE Region 10 Conference (TENCON-2009), November (2009)","DOI":"10.1109\/TENCON.2009.5395822"},{"key":"469_CR5","doi-asserted-by":"crossref","unstructured":"Hegde, C., Manu, S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Secure authentication using image processing and visual cryptography for banking applications. In: Proceedings of 16th International Conference on Advanced Computing (ADCOM 2008), pp. 65\u201372 (2008)","DOI":"10.1109\/ADCOM.2008.4760429"},{"key":"469_CR6","doi-asserted-by":"crossref","unstructured":"Boles, W.: A security system based on human iris identification using wavelet transforms. In: Proceedings of First International Conference on Knowledge-Based Intelligent Electronics Systems (1997)","DOI":"10.1109\/KES.1997.619433"},{"key":"469_CR7","unstructured":"Hegde, C., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Ear pattern recognition using centroids and cross-points for robust authentication. In: Proceedings of 2nd International Conference on Intelligent Human and Computer Interaction (IHCI 2010), pp. 378\u2013384 (2010)"},{"key":"469_CR8","doi-asserted-by":"crossref","unstructured":"Hegde, C., Prabhu, R., Sagar, D.S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Human authentication based on ECG waves using Radon transform. In: Proceedings of International Conference Security Technology-Special Session on Biometrics Security and Technology (SecTech-BTS-2010), pp. 197\u2013206 (2010)","DOI":"10.1007\/978-3-642-17610-4_22"},{"key":"469_CR9","unstructured":"Hegde, C., Prabhu, R., Sagar, D.S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Statistical analysis for human authentication using ECG Waves. In: Proceedings of 5th International Conference Information Systems, Technology and Management (ICISTM-2011), pp. 287\u2013298, (2011)"},{"issue":"3","key":"469_CR10","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s11760-011-0252-6","volume":"5","author":"Hegde Chetana","year":"2011","unstructured":"Chetana, Hegde, Rahul, Prabhu, Deepa, Shenoy P.: Heartbeat biometrics for human authentication. Springer Signal Image Video Process. J. Special Issue Unconstrained Biometr Adv Trends 5(3), 485\u2013493 (2011)","journal-title":"Springer Signal Image Video Process. J. Special Issue Unconstrained Biometr Adv Trends"},{"issue":"3","key":"469_CR11","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cviu.2005.06.003","volume":"100","author":"DL Woodard","year":"2005","unstructured":"Woodard, D.L., Flynn, P.J.: Finger surface as a biometric identifier. Comput. Vision Image Underst. 100(3), 357\u2013384 (2005)","journal-title":"Comput. Vision Image Underst."},{"issue":"20","key":"469_CR12","first-page":"1","volume":"45","author":"Kumar Ajay","year":"2009","unstructured":"Ajay, Kumar, Yingbo, Zhou: Personal identification using Finger Knuckle orientation features. Electron. Lett. 45(20), 1\u20138 (2009)","journal-title":"Electron. Lett."},{"issue":"1","key":"469_CR13","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/TIFS.2008.2011089","volume":"4","author":"Kumar Ajay","year":"2009","unstructured":"Ajay, Kumar, Ravikanth, Ch.: Personal authentication using Finger Knuckle surface. IEEE Trans. Inf. Forensics Security 4(1), 98\u2013110 (2009)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"469_CR14","doi-asserted-by":"crossref","unstructured":"Woodard, D.L., Flynn, P.J.: Personal identification utilizing Finger surface features. In: Proceedings of Computer Vision and, Pattern Recognition (CVPR-2005), pp. 1030\u20131036 (2005)","DOI":"10.1109\/CVPR.2005.273"},{"key":"469_CR15","doi-asserted-by":"crossref","unstructured":"Ravikanth, Ch., Kumar, A.: Biometric authentication using Finger-back surface. In: Proceedings of Computer Vision and, Pattern Recognition (CVPR-2007), pp. 1\u20136 (2007)","DOI":"10.1109\/CVPR.2007.383390"},{"key":"469_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, L., Zhang, L., Zhang, D., Zhu, H.: Online Finger knuckle print verification for personal authentication. Pattern Recognit. 43(7), 2560\u20132571 (2010)","DOI":"10.1016\/j.patcog.2010.01.020"},{"key":"469_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, L., Zhang, L., Zhang, D.: Finger Knuckle Print: A new biometric identifier. In: Proceedings of IEEE International Conference on Image Processing (2009)","DOI":"10.1109\/ICIP.2009.5413734"},{"key":"469_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, L., Zhang, L., Zhang, D.: Finger Knuckle Print verification based on band-limited phase-only correlation. In: Proceedings of 13th International Conference on Computer Analysis of Images and Patterns, pp. 141\u2013148 (2009)","DOI":"10.1007\/978-3-642-03767-2_17"},{"issue":"9","key":"469_CR19","doi-asserted-by":"crossref","first-page":"1990","DOI":"10.1016\/j.patcog.2010.06.007","volume":"44","author":"Zhang Lin","year":"2011","unstructured":"Lin, Zhang, Lei, Zhang, David, Zhang, Hailong, Zhu: Ensemble of local and global information for Finger Knuckle Print recognition. Pattern Recognit. 44(9), 1990\u20131998 (2011)","journal-title":"Pattern Recognit."},{"key":"469_CR20","unstructured":"PolyU FKP Database, http:\/\/www.comp.polyu.edu.hk\/biometrics\/FKP.htm"},{"key":"469_CR21","doi-asserted-by":"crossref","unstructured":"Hegde C., Phanindra J., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Human authentication using Finger Knuckle Print. In: Proceedings of ACM, Compute 2011 (2011)","DOI":"10.1145\/1980422.1980431"},{"key":"469_CR22","doi-asserted-by":"crossref","unstructured":"Hegde, C., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: FKP biometrics for human authentication using Gabor wavelets. In: Proceedings of TENCON 2011\u2014IEEE Region10 Conference, pp. 1149\u20131153 (2011)","DOI":"10.1109\/TENCON.2011.6129292"},{"key":"469_CR23","unstructured":"Ariyapreechakul, P., Covavisaruch, N.: Personal verification and identification via iris pattern using radon transform. In: Proceedings of First National Conference on Computing and Information Technology, pp. 287\u2013292 (2005)"},{"key":"469_CR24","unstructured":"Loy, G.: Fast computation of the Gabor wavelet transform. In: Proceedings of Digital Image Computing Techniques and Applications (DICTA-2002), pp. 21\u201327, (2002)"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-013-0469-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-013-0469-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-013-0469-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T05:35:48Z","timestamp":1745991348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-013-0469-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,19]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["469"],"URL":"https:\/\/doi.org\/10.1007\/s11760-013-0469-7","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2013,4,19]]}}}