{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:04:36Z","timestamp":1760346276586,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/bhi.2012.6211531","type":"proceedings-article","created":{"date-parts":[[2012,6,19]],"date-time":"2012-06-19T17:01:10Z","timestamp":1340125270000},"page":"152-154","source":"Crossref","is-referenced-by-count":4,"title":["A unimodal person authentication system based on signing sound"],"prefix":"10.1109","author":[{"given":"D.","family":"Khazaei","sequence":"first","affiliation":[]},{"given":"K.","family":"Maghooli","sequence":"additional","affiliation":[]},{"given":"F.","family":"Afdideh","sequence":"additional","affiliation":[]},{"given":"H.","family":"Azimi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"3","DOI":"10.1073\/pnas.96.20.11065"},{"year":"2011","key":"2"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1002\/047172842X","author":"mclachlan","year":"2004","journal-title":"Analyzing Microarray Gene Expression Data"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1007\/978-0-387-77326-1"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1142\/9789812776266_0075"},{"key":"6","first-page":"493","article-title":"A New Approach to Signature Verification - Digital Data Acquisition Pen","volume":"11","author":"rohlik","year":"2001","journal-title":"Neural Network World"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1142\/S0218001494000346"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1016\/0031-3203(89)90059-9"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/29.1513"},{"key":"8","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/ICIMP.2010.18","article-title":"Sound-Based Multimodal Person Identification from Signature and Voice","author":"li","year":"2010","journal-title":"Internet Monitoring and Protection (ICIMP) 2010 Fifth International Conference on"}],"event":{"name":"2012 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)","start":{"date-parts":[[2012,1,5]]},"location":"Hong Kong","end":{"date-parts":[[2012,1,7]]}},"container-title":["Proceedings of 2012 IEEE-EMBS International Conference on Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6204368\/6211503\/06211531.pdf?arnumber=6211531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T16:18:12Z","timestamp":1497975492000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6211531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/bhi.2012.6211531","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}