{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:28:38Z","timestamp":1767338918696},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T00:00:00Z","timestamp":1415923200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s11760-014-0714-8","type":"journal-article","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T20:59:30Z","timestamp":1415998770000},"page":"145-152","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Dorsal hand vein recognition based on directional filter bank"],"prefix":"10.1007","volume":"10","author":[{"given":"Jen-Chun","family":"Lee","sequence":"first","affiliation":[]},{"given":"Tsung-Ming","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Chien-Ping","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,14]]},"reference":[{"key":"714_CR1","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Bolle, R., Pankanti, S.: Biometrics Personal Identification in Networked Society. Kluwer, Massachusetts (1999)","DOI":"10.1007\/b117227"},{"key":"714_CR2","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821381","volume-title":"Vein Pattern Recognition: A Privacy-Enhancing Biometric","author":"C Wilson","year":"2010","unstructured":"Wilson, C.: Vein Pattern Recognition: A Privacy-Enhancing Biometric. CRC Press Publishers, Boca Raton (2010)"},{"key":"714_CR3","doi-asserted-by":"crossref","unstructured":"Cross, J.M., Smith, C.L.: Thermographic imaging of subcutaneous vascular network of the back of the hand for biometric identification. In: Proceedings of IEEE 29th International Carnahan Conference on Security Technology (1995)","DOI":"10.1109\/CCST.1995.524729"},{"key":"714_CR4","doi-asserted-by":"crossref","unstructured":"Wang, L., Leedham, G., Cho, D.S.: Infrared imaging of hand vein patterns for biometric purposes. The Institution of Engineering and Technology. Comput. Vis. 1, 113\u2013122 (2007)","DOI":"10.1049\/iet-cvi:20070009"},{"issue":"3","key":"714_CR5","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1016\/j.patcog.2007.07.012","volume":"41","author":"L Wang","year":"2008","unstructured":"Wang, L., Leedham, G., Cho, D.S.: Minutiae feature analysis for infrared hand vein pattern biometrics. Pattern Recognit. 41(3), 920\u2013929 (2008)","journal-title":"Pattern Recognit."},{"key":"714_CR6","doi-asserted-by":"crossref","first-page":"2127","DOI":"10.1109\/TIP.2009.2023153","volume":"18","author":"A Kumar","year":"2009","unstructured":"Kumar, A., Prathyusha, K.V.: Personal authentication using hand vein triangulation and knuckle shape. IEEE Trans. Image Process. 18, 2127\u20132136 (2009)","journal-title":"IEEE Trans. Image Process."},{"key":"714_CR7","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.csi.2009.11.008","volume":"32","author":"S Crisan","year":"2010","unstructured":"Crisan, S., Tarnovan, I.G., Crisan, T.E.: Radiation optimization and image processing algorithms in the identification of hand vein patterns. Comput. Stand. Interfaces 32, 130\u2013140 (2010)","journal-title":"Comput. Stand. Interfaces"},{"key":"714_CR8","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1049\/iet-bmt.2011.0013","volume":"1","author":"D Hartung","year":"2012","unstructured":"Hartung, D., Aastrup Olsen, M., Thanh Nguyen, H.: Comprehensive analysis of spectral minutiae for vein pattern recognition. IET Biom. 1, 25\u201336 (2012)","journal-title":"IET Biom."},{"key":"714_CR9","first-page":"1001","volume":"49","author":"MM Khan","year":"2009","unstructured":"Khan, M.M., Subramanian, R.K.: Low dimensional representation of dorsal hand vein features using principle component analysis (PCA). World Acad. Sci. Eng. Technol. 49, 1001\u20131007 (2009)","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"714_CR10","first-page":"067205-1","volume":"47","author":"CB Hsu","year":"2011","unstructured":"Hsu, C.B., Hao, S.S., Lee, J.C.: Personal authentication through dorsal hand vein patterns. Opt. Eng. 47, 067205-1\u2013067205-10 (2011)","journal-title":"Opt. Eng."},{"issue":"2","key":"714_CR11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/TCSVT.2003.821975","volume":"14","author":"CL Lin","year":"2004","unstructured":"Lin, C.L., Fan, K.C.: Biometric verification using thermal images of palm-dorsa vein patterns. IEEE Trans. Circuits Syst. Video Technol. 14(2), 199\u2013213 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"714_CR12","first-page":"33","volume":"9","author":"CL Deepika","year":"2009","unstructured":"Deepika, C.L., Kandaswamy, A.: An algorithm for improved accuracy in unimodal biometric systems through fusion of multiple feature sets. ICGST-GVIP J. 9, 33\u201340 (2009)","journal-title":"ICGST-GVIP J."},{"key":"714_CR13","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1049\/iet-cvi.2010.0175","volume":"5","author":"A Yuksel","year":"2011","unstructured":"Yuksel, A., Akarun, L., Sankur, B.: Hand vein biometry based on geometry and appearance method. IET Comput. Vis. 5, 398\u2013406 (2011)","journal-title":"IET Comput. Vis."},{"key":"714_CR14","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1166\/asl.2012.2488","volume":"8","author":"CB Hsu","year":"2012","unstructured":"Hsu, C.B., Lee, J.C., Hao, S.S., Kuei, P.Y.: Dorsal Hand vein recognition using Gabor feature-based 2-directional 2-dimensional principal component analysis. Adv. Sci. Lett. 8, 813\u2013817 (2012)","journal-title":"Adv. Sci. Lett."},{"key":"714_CR15","unstructured":"Bozkurt, A., Suhre, A., Cetin, E.A.: Multi-scale directional filtering based method for follicular lymphoma grading. Signal Image Video Process. 8, 1\u20138 (2014)"},{"key":"714_CR16","doi-asserted-by":"crossref","first-page":"2339","DOI":"10.1016\/S0031-3203(03)00121-3","volume":"36","author":"WK Kong","year":"2003","unstructured":"Kong, W.K., Zhang, D., Li, W.: Palmprint feature extraction using 2-D Gabor filters. Pattern Recognit. 36, 2339\u20132347 (2003)","journal-title":"Pattern Recognit."},{"key":"714_CR17","doi-asserted-by":"crossref","unstructured":"Kong, W.K., Zhang, D.: Competitive coding scheme for palmprint verification. In: Proceedings of International Conference on Pattern Recognition 1, 520\u2013523 (2004)","DOI":"10.1109\/ICPR.2004.1334184"},{"issue":"3","key":"714_CR18","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1016\/j.patcog.2005.08.014","volume":"39","author":"A Kong","year":"2006","unstructured":"Kong, A., Zhang, D., Kamel, M.: Palmprint identification using feature-level fusion. Pattern Recognit. 39(3), 478\u2013487 (2006)","journal-title":"Pattern Recognit."},{"key":"714_CR19","doi-asserted-by":"crossref","unstructured":"Basu, M.: Gaussian-based edge-detection methods-a survey. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 32(3), 252\u2013260 (2002)","DOI":"10.1109\/TSMCC.2002.804448"},{"issue":"11","key":"714_CR20","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"JG Daugman","year":"1993","unstructured":"Daugman, J.G.: High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. 15(11), 1148\u20131161 (1993)","journal-title":"IEEE Trans. Pattern Anal."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0714-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-014-0714-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0714-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T11:33:10Z","timestamp":1566041590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-014-0714-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,14]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["714"],"URL":"https:\/\/doi.org\/10.1007\/s11760-014-0714-8","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,14]]}}}