{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:50:16Z","timestamp":1729637416608,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/btas.2012.6374559","type":"proceedings-article","created":{"date-parts":[[2012,12,12]],"date-time":"2012-12-12T17:01:55Z","timestamp":1355331715000},"page":"69-76","source":"Crossref","is-referenced-by-count":10,"title":["Towards optimal countermeasures against wolves and lambs in biometrics"],"prefix":"10.1109","author":[{"given":"Takao","family":"Murakami","sequence":"first","affiliation":[]},{"given":"Kenta","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"816","article-title":"A biometric menagerie index for characterising template\/modelspecific variation","author":"poh","year":"2009","journal-title":"Proceedings of the Third International Conference on Advances in Biometrics (ICB '09)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.291"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/BSYM.2008.4655517"},{"journal-title":"Encyclopedia of Biometrics","year":"2009","author":"jain","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(02)00407-7"},{"journal-title":"CASIA-FingerprintV5","year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e91-d.5.1380"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.013"},{"journal-title":"Sequential Analysis","year":"1947","author":"wald","key":"20"},{"journal-title":"Pattern Recognition and Machine Learning","year":"0","author":"bishop","key":"22"},{"key":"23","article-title":"A contribution to multi-modal identity verification using decision fusion","author":"verlinde","year":"0","journal-title":"Proceedings of PROMOPTICA 2000"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.363"},{"key":"25","first-page":"1184","article-title":"A metric of information gained through biometric systems","author":"takahashi","year":"2010","journal-title":"Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010)"},{"year":"0","key":"26"},{"key":"3","first-page":"806","article-title":"Theoretical framework for constructing matching algorithms in biometric authentication systems","author":"inuma","year":"2009","journal-title":"Proceedings of the 3rd International Conference on Biometrics (ICB 2009)"},{"key":"2","first-page":"1221","article-title":"Multimodal biometrics: An overview","author":"ross","year":"0","journal-title":"Proceedings of the 12th European Signal Pocessing Conference (EUSIPCO) 2004"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2009.5386482"},{"key":"1","first-page":"1351","article-title":"Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation","author":"doddington","year":"1998","journal-title":"Proceedings of the Fifth International Conference on Spoken Language Processing (ICSLP 1998)"},{"key":"7","first-page":"264","article-title":"Exploiting the \"Doddington zoo\" effect in biometric fusion","author":"ross","year":"0","journal-title":"Proceedings of the 3rd IEEE International Conference on Biometrics Theory Applications and Systems (BTAS '09) 2009"},{"key":"6","first-page":"614","article-title":"On the use of log-likelihood ratio based modelspecific score normalisation in biometric authentication","author":"poh","year":"0","journal-title":"Proceedings of the International Conference on Biometrics (ICB '07) 2007"},{"key":"5","first-page":"401","article-title":"User-specific score normalization and fusion for biometric person recognition","author":"poh","year":"2010","journal-title":"Advanced Topics in Biometrics"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04391-8_38"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2010.01.028"},{"key":"8","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1117\/12.538894","article-title":"A secure and userfriendly multimodal biometric system","volume":"5404","author":"takahashi","year":"2004","journal-title":"Proceedings of SPIE"}],"event":{"name":"2012 IEEE Fifth International Conference On Biometrics: Theory, Applications And Systems (BTAS)","start":{"date-parts":[[2012,9,23]]},"location":"Arlington, VA, USA","end":{"date-parts":[[2012,9,27]]}},"container-title":["2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362322\/6374538\/06374559.pdf?arnumber=6374559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T00:02:40Z","timestamp":1498003360000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6374559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/btas.2012.6374559","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}