{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:31:17Z","timestamp":1773840677912,"version":"3.50.1"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001342","name":"South African Department of Science and Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001342","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001332","name":"Council for Scientific and Industrial Research (CSIR), South Africa","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001332","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3062282","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T20:48:46Z","timestamp":1614372526000},"page":"38269-38286","source":"Crossref","is-referenced-by-count":51,"title":["Biometric Recognition of Infants using Fingerprint, Iris, and Ear Biometrics"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7216-654X","authenticated-orcid":false,"given":"Yaseen","family":"Moolla","sequence":"first","affiliation":[]},{"given":"Anton","family":"De Kock","sequence":"additional","affiliation":[]},{"given":"Gugulethu","family":"Mabuza-Hocquet","sequence":"additional","affiliation":[]},{"given":"Cynthia Sthembile","family":"Ntshangase","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1509-4866","authenticated-orcid":false,"given":"Norman","family":"Nelufule","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0527-5340","authenticated-orcid":false,"given":"Portia","family":"Khanyile","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568939"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"279","DOI":"10.4018\/978-1-61520-991-0.ch015","article-title":"Photometric normalization techniques for illumination invariance","author":"\u0161truc","year":"2011","journal-title":"Advances in Face Image Analysis Techniques and Technologies"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2423252"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2013.6607909"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.12"},{"key":"ref77","year":"2020","journal-title":"SecuGen Corporation"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374457-9.00025-1"},{"key":"ref39","first-page":"1","article-title":"Iris recognition based on multichannel Gabor filtering","author":"ma","year":"2002","journal-title":"Proc 5th Asian Conf Comput"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/BF00133570"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACV.1994.341298"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7151"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-017-0423-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2001.1696"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICABCD.2019.8851023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2468195"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAS.2019.8703520"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00030-4"},{"key":"ref35","first-page":"5","article-title":"Recognising persons by their iris patterns","author":"daugman","year":"2005","journal-title":"Advances in Biometric Person Authentication"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884092"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639346"},{"key":"ref62","article-title":"Infant-prints: Fingerprints for reducing infant mortality","author":"engelsma","year":"2019","journal-title":"arXiv 1904 01091"},{"key":"ref61","first-page":"1","article-title":"Fingerprint match in box","author":"engelsma","year":"2016","journal-title":"Proc IEEE 9th Int Conf Biometrics Theory Appl Syst (BTAS)"},{"key":"ref63","year":"2019","journal-title":"NEC Fingerprint Identification Contributes to the Provision of Legal Identity for Newborn Children in Developing Countries"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2016.7913232"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.12688\/gatesopenres.12914.2"},{"key":"ref27","first-page":"1989","article-title":"Ear recognition for newborns","author":"tiwari","year":"2015","journal-title":"Proc 2nd Int Conf Comput Sustain Global Develop (INDIACom)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996252"},{"key":"ref66","article-title":"Contactless fingerprint technologies assessment","author":"wiggin","year":"2014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5220\/0005342201710179"},{"key":"ref67","article-title":"Usability testing of a contactless fingerprint device: Part 1","author":"stanton","year":"2016"},{"key":"ref68","article-title":"Usability testing of a contactless fingerprint device: Part 2","author":"stanton","year":"2016"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1117\/12.828523"},{"key":"ref2","year":"2017","journal-title":"Recommendations for Reliable Breeder Documents Restoring e-Passport Confidence and Leveraging Extended Border Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909612"},{"key":"ref20","first-page":"1","article-title":"Quantifying the dermatoglyphic growth patterns in children through adolescence","author":"schneider","year":"2013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117475"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG.2016.7736909"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5121\/sipij.2012.3309"},{"key":"ref23","first-page":"1","article-title":"Newborn&#x2019;s ear recognition: Can it be done?","author":"tiwari","year":"2011","journal-title":"Proc Int Conf Image Process"},{"key":"ref26","first-page":"1","article-title":"Ear recognition for young children: What has been done?","author":"ntshangase","year":"2019","journal-title":"Proc Int Multidisciplinary Inf Technol Eng Conf (IMITEC 2019)"},{"key":"ref25","author":"lovett","year":"2018","journal-title":"AI-powered biometric recognition company Element lands 12M"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-009-0184-0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70796"},{"key":"ref59","year":"2020","journal-title":"FBI Biometrics Specifications"},{"key":"ref58","year":"2017","journal-title":"Element Inc & Global Good Fund to Create Biometric Health ID System for Infants & Children"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/BIOMS.2014.6951528"},{"key":"ref56","first-page":"89","article-title":"Multimodal database of newborns for biometric recognition","volume":"5","author":"tiwari","year":"2013","journal-title":"International Journal of Bio- Science and Bio- Technology"},{"key":"ref55","first-page":"98","article-title":"The ear of the newborn as an identification constant","volume":"16","author":"fields","year":"1960","journal-title":"Obstetrics Gynecol"},{"key":"ref54","first-page":"17","article-title":"Biometrics for child vaccination and welfare: Persistence of fingerprint recognition for infants and toddlers","author":"jain","year":"2015"},{"key":"ref53","first-page":"1357","article-title":"Feature quality based score level fusion using relative entropy measure for iris recognition","volume":"11","author":"nelufule","year":"2015","journal-title":"Int J Innov Comput Inf Control"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00103-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2538744"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272750"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.2009.00534.x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2003.818026"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1836","DOI":"10.21437\/Interspeech.2012-401","article-title":"Speaker recognition for children&#x2019;s speech","author":"safavi","year":"2012","journal-title":"Proc INTERSPEECH"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738861"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0530-9"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27863-6_22"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CICT.2013.6558146"},{"key":"ref81","year":"2018"},{"key":"ref17","first-page":"200","article-title":"Newborn&#x2019;s biometric identification: Can it be done?","author":"weingaertner","year":"2011","journal-title":"Proc VISAPP"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339069"},{"key":"ref83","first-page":"34","article-title":"Damage invariant and high security acquisition of the internal fingerprint using optical coherence tomography","author":"darlow","year":"2016","journal-title":"Proc World Congr Internet Secur (WorldCIS)"},{"key":"ref19","first-page":"1","author":"den haartog","year":"2005","journal-title":"Minister Interfaces Kindgdom Relations"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.infbeh.2018.09.010"},{"key":"ref4","year":"2016","journal-title":"Matric Pupil Gets Back His Identity"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2143406"},{"key":"ref6","article-title":"Biometrics fundamentals","author":"sussman","year":"2012","journal-title":"IEEE Certified Biometrics Professional (CBP) Learning System Module 1 Biometrics Fundamentals"},{"key":"ref5","year":"2006","journal-title":"A Message for Parents How to Protect Your Kids with ID Kits"},{"key":"ref85","author":"larson","year":"2015","journal-title":"A Guide to the Project Management Body of Knowledge PMBOK Guide"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5120\/8194-1569"},{"key":"ref7","first-page":"201","article-title":"Integrating faces and soft-biometrics for newborn recognition","volume":"2","author":"tiwari","year":"2012","journal-title":"Int J Adv Comput Eng Archit"},{"key":"ref49","first-page":"1","article-title":"Improving iris recognition accuracy by score based fusion method","volume":"1","author":"gawande","year":"2010","journal-title":"Int J Adv Technol"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545742"},{"key":"ref46","first-page":"1","article-title":"Improving iris recognition accuracy by score based fusion method","volume":"43","author":"wang","year":"2012","journal-title":"Pattern Recognit"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2010.5516900"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"2211","DOI":"10.1109\/TPAMI.2008.240","article-title":"Ordinal measures for iris recognition","volume":"31","author":"sun","year":"2009","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/282589"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CCPR.2009.5344030"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.021"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1109\/TIFS.2014.2339496","article-title":"Efficient and accurate at-a-distance iris recognition using geometric key-based iris encoding","volume":"9","author":"encoding","year":"2014","journal-title":"IEEE Trans Inf Forensics Security"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09364994.pdf?arnumber=9364994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T05:45:30Z","timestamp":1671428730000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9364994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3062282","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}